Perl module P775
Exercises, examples and other material relating to training module P775. This module is presented on Private Courses and Specially Run Courses only
BackgroundThis module pulls together many of the security aspects of Perl - taking our generalised module that looks at programming issues relating to secure coding in general and interpretting them for how the particular general issues apply in Perl. Further material on your course will look at relevant specific matters under individually titled sections.
Some modules are available for download as a sample of our material or under an Open Training Notes License for free download from [here].
Topics covered in this module
Overview of security and Perl
Real, effective ID and suidperl.
Cleaning up your path.
Backtics, evals, execs and subshells.
Command line switches.
Public, protected, private - not in Perl; OO Perl security issues.
Magic in opens, globs, and other wild cards.
Temporary files, lock files and file locking.
Networking matters, process forking and threads.
Sorts that give varying results.
Resource hogs and efficiency matters.
If you are looking for a complete course and not just a information on a single subject, visit our Listing and schedule page.
Well House Consultants specialise in training courses in Ruby, Lua, Python, Perl, PHP, and MySQL. We run Private Courses throughout the UK (and beyond for longer courses), and Public Courses at our training centre in Melksham, Wiltshire, England. It's surprisingly cost effective to come on our public courses - even if you live in a different country or continent to us.
We have a technical library of over 700 books on the subjects on which we teach. These books are available for reference at our training centre.
PH: 01225 708225 • FAX: 01225 793803 • EMAIL: email@example.com • WEB: http://www.wellho.net • SKYPE: wellho
PAGE: http://www.wellho.net/resources/P775.html • PAGE BUILT: Mon Feb 8 18:55:24 2016 • BUILD SYSTEM: WomanWithCat