Exercises, examples and other material relating to training module P775. This module is presented on Private Courses
and Specially Run Courses
This module pulls together many of the security aspects of Perl -
taking our generalised module that looks at programming issues relating
to secure coding in general and interpretting them for how the particular
general issues apply in Perl. Further material on your course will look
at relevant specific matters under individually titled sections.
Some modules are available for download
as a sample of our material or under an Open Training Notes License
for free download from [here]
Topics covered in this module
Overview of security and Perl
Real, effective ID and suidperl.
Cleaning up your path.
Backtics, evals, execs and subshells.
Command line switches.
Public, protected, private - not in Perl; OO Perl security issues.
Magic in opens, globs, and other wild cards.
Temporary files, lock files and file locking.
Networking matters, process forking and threads.
Sorts that give varying results.
Resource hogs and efficiency matters.
If you are looking for a complete course and not just a information on a single subject, visit our Listing and schedule
Well House Consultants specialise in training courses in
. We run
throughout the UK (and beyond for longer courses), and
at our training centre in Melksham, Wiltshire, England.
It's surprisingly cost effective to come on our public courses -
even if you live in a different
country or continent to us
We have a technical library of over 700 books on the subjects on which we teach.
These books are available for reference at our training centre.