Read Two Chapters from Extending and Embedding Perl

Read Two Chapters from Extending and Embedding Perl

Extending and Embedding Perl by Tim Jenness and Simon Cozens explains how to expand the functionality and usefulness of the Perl programming language and how to use Perl from C programs. It begins simply but also covers complex issues using real code examples from the Perl source. The book discusses how to write interfaces to C libraries (as well as C++ and Fortran libraries). It shows you how to implement Perl callbacks for C libraries, how to pass Perl hashes and arrays between Perl and C, and how to use the Perl Data Language infrastructure to improve the speed of array operations.

Chapter 2: “Extending Perl: an Introduction,” requires minimal knowledge of Cand leads you through the stages of creating a simple module and building an interface to simple C functions.
Download the PDF of Chapter 2

Chapter 8: “Embedding Perl in C,” teaches you how to embed aPerl interpreter in a simple application, preparing the goround for aworked example in the following chapter where we demonstrate how to embedPerl into the mutt mailer.
Download the PDF of Chapter 8

Reproduced from Extending and Embedding Perl by permission of ManningPublications Co. ISBN 1-930110-82-0 copyright 2003. All rights reserved. Forfurther information go to www.manning.com/jenness.

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved