Programming Perl

 in
If Perl is your first programming language, you will most likely want to start somewhere else—this book could lead to hopeless confusion.
  • ISBN: 1-56592-149-6

  • Publisher: O'Reilly & Associates

  • Price: $39.95

  • Authors: Larry Wall, Tom Christiansen, Randal Schwartz

  • Reviewer: Phil Hughes

Programming Perl is the second edition, updated to cover Perl 5, of “The Camel Book”--the one with a camel on the cover.

This book is not a tutorial. If Perl is your first programming language, you will most likely want to start somewhere else—this book could lead to hopeless confusion.

Rather than the newbie, this book is intended for someone who is at least very familiar with Unix utilities, such as awk and sed, and even better, someone with a language such as C under his belt. In fact, C programmers will see similarities between this book and “K & R”.

Perl Programming begins with an overview of basic concepts. After that, get ready for serious work. The second chapter, titled “The Gory Details”, is exactly that—it covers the whole language in about 100 pages.

The next chapter, which is also about 100 pages, describes the functions available to the Perl programmer. C programmers would think of this as the library. Included for each function is its name, its arguments and a textual description of what it does along with appropriate examples.

The Perl language primarily deals in simple, flat data structures, but this approach doesn't work in every case. Chapter Four describes how to deal with more complicated data by using references and nested data structures.

At this point, less than half way through the book, you have seen all of the language and all the built-in functions. However, if you want to become a truly proficient Perl programmer, there's a lot more to learn; e.g., how to produce good modular code. The book therefore goes on to cover modules and packages as well as interaction with the shell and other languages. This section sets the groundwork for the standard Perl library, which is a set of Perl code included with each Perl distribution, the subject of discussion for 150 pages of the book.

The final two chapters cover debugging and error messages. In addition to how to use the debugger, common mistakes, efficiency and style are covered.

Let me note the humor content—a surprising feature in what should be a dry technical manual on a language—which is generally manifest in explanations of some obtuse detail or presentation of background information. While some might find this distracting, I found it a pleasant diversion from a lot of otherwise necessarily dry material. If a humorous bit is long, it is generally in a footnote that can easily be skipped. My only criticism of this book is that it seems to make Perl seem more complicated than it is. It is hard to put my finger on exactly why I feel this way, but perhaps it is because the book tends to tell you everything about a particular command or capability at once. This is just how the book is organized, and it makes sense for a reference work. In other words, I can't see an alternative presentation format that might improve the book as a tutorial that would not destroy the reference value.

This book is well-written, clear and accurate. While there are close to 650 pages, it contains no fluff. While the Perl language is fairly simple, its real power is in its functions and libraries, which are covered thoroughly. A two-word description of this book is “comprehensive reference”. If you are going to be programming with Perl, this book should be in your library.

Phil Hughes is the Publisher of Linux Journal.

______________________

Phil Hughes

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix