Publisher: O'Reilly & Associates
Authors: Larry Wall, Tom Christiansen, Randal Schwartz
Reviewer: Phil Hughes
Programming Perl is the second edition, updated to cover Perl 5, of “The Camel Book”--the one with a camel on the cover.
This book is not a tutorial. If Perl is your first programming language, you will most likely want to start somewhere else—this book could lead to hopeless confusion.
Rather than the newbie, this book is intended for someone who is at least very familiar with Unix utilities, such as awk and sed, and even better, someone with a language such as C under his belt. In fact, C programmers will see similarities between this book and “K & R”.
Perl Programming begins with an overview of basic concepts. After that, get ready for serious work. The second chapter, titled “The Gory Details”, is exactly that—it covers the whole language in about 100 pages.
The next chapter, which is also about 100 pages, describes the functions available to the Perl programmer. C programmers would think of this as the library. Included for each function is its name, its arguments and a textual description of what it does along with appropriate examples.
The Perl language primarily deals in simple, flat data structures, but this approach doesn't work in every case. Chapter Four describes how to deal with more complicated data by using references and nested data structures.
At this point, less than half way through the book, you have seen all of the language and all the built-in functions. However, if you want to become a truly proficient Perl programmer, there's a lot more to learn; e.g., how to produce good modular code. The book therefore goes on to cover modules and packages as well as interaction with the shell and other languages. This section sets the groundwork for the standard Perl library, which is a set of Perl code included with each Perl distribution, the subject of discussion for 150 pages of the book.
The final two chapters cover debugging and error messages. In addition to how to use the debugger, common mistakes, efficiency and style are covered.
Let me note the humor content—a surprising feature in what should be a dry technical manual on a language—which is generally manifest in explanations of some obtuse detail or presentation of background information. While some might find this distracting, I found it a pleasant diversion from a lot of otherwise necessarily dry material. If a humorous bit is long, it is generally in a footnote that can easily be skipped. My only criticism of this book is that it seems to make Perl seem more complicated than it is. It is hard to put my finger on exactly why I feel this way, but perhaps it is because the book tends to tell you everything about a particular command or capability at once. This is just how the book is organized, and it makes sense for a reference work. In other words, I can't see an alternative presentation format that might improve the book as a tutorial that would not destroy the reference value.
This book is well-written, clear and accurate. While there are close to 650 pages, it contains no fluff. While the Perl language is fairly simple, its real power is in its functions and libraries, which are covered thoroughly. A two-word description of this book is “comprehensive reference”. If you are going to be programming with Perl, this book should be in your library.
Phil Hughes is the Publisher of Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide