1. Tricks of the Wizards
2. What We'll See
3. Prerequisites
4. Warning
5. Warning #2
6. Principles Of Magic
7. The Magic Path to Enlightenment

9. Making Things Appear to Be What They're Not
10. Accept no substitutes
11. Globs
14. Operations with Globs
16. Aliasing
18. Exportation
20. croak
21. Forced Importing / Aliasing
23. (No) Globs in Perl 6
25. Passing Filehandles
29. Globjects
39. Wrappers
41. Stash Walking
42. Miscellaneous Applications of Globs
44. Read-Only Constants Continued
45. A Templating System

51. Making Things Appear to Be What They're Not
52. Ties
53. Ties: Trivial (Annoying) Example
54. How to Tie
55. Tied Scalar Example
57. Tied Hash Example
59. CGI.pm
60. Exporting a Tied Variable
61. Config.pm
63. Magical Exporter Variable
64. Exporting a Magical Variable
66. Magical Exporter Variable
67. Tied Arrays
69. Tied Filehandles
74. Missing tie Methods
75. The Mother of All Bizarre tie Tricks

77. Making Things Appear to Be What They're Not
78. What's a Filter?
79. Filter::Simple
81. Filter::Util::Call
86. "Only perl can parse Perl"
88. Function Tracing Again
89. Function Tracing
90. Internationalization
92. Perl6::Variables

95. Making Things Appear to Be What They're Not
96. What is Autoloading?
97. Simple AUTOLOAD Example
100. Magic goto
101. Brief Digression: Tracing Again
102. Case-Insensitive Function Calls
103. Function Call Caching
104. Typical AUTOLOAD Use: Accessor Methods
105. Direct Emulation of Accessors
106. Caching Accessor Methods
107. Autoloading From a File
108. Generating Functions Dynamically
109. NEXT.pm
117. Shell.pm

118. Cantrips
119. Returning a False Value
121. The Self-Replacing Stub
123. Schwartzian Transform
127. Debug Printing of Strings
128. Debug Printing of Lists
129. * Most folks know about the ?: operator
130. Booleanumbers
131. Local Effects
134. Selecting n Different Things
135. Dinner Time!
136. Other Resources

137. Bonus Slides Not in the Talk Anymore
138. Biographical Note
140. Making Things Appear to Be What They're Not
141. Overloading Overview
142. Overload Method Call Summary
143. Overloading: Normal uses
144. Overloading: Example
147. Overloading: Bizarre Example
148. Overloading: Y2K Detection Example
150. Overloading: Y2K Detection Example

154. Big Techniques
155. Big Technique #1: Newton-Raphson Method
156. sqrt()
157. Newton-Raphson Method
158. o Repeat as desired
159. Square Roots with Newton-Raphson Method
160. Solve Any Equation With Newton-Raphson
162. Newton-Raphson: Financial Computations
163. Big Technique #2: Caching
164. Caching
166. Memoizing
169. Big Technique #3: Iterators
170. Iterators
171. Iterator Example
174. Iterator Operations
176. More Applications of Iterators
177. Big Technique #4: State Machines
178. Implementing State Machines in Perl
179. State Machines For NNTP
181. State Machines Are Very Easy to Read!
182. Big Technique #5: Building a Replacement Debugger
183. Why Build a Replacement Debugger?
184. Debugger Features
185. Trivial Debugger
186. Trace Execution
187. Examine Source Code
188. Simple Profiler
189. Simple Coverage Analyzer
190. Big Technique #6: Tokenizing
191. Tokenizing
196. Exportation (Inheritable Method)
197. Aliasing
199. Another Tied Hash: %!
200. %! Implementation
201. Bizarre Tricks
202. Bizarre tie Tricks: no underscore
203. no underscore
204. Import.pm Module
205. Build Your Own map
206. reduce
208. combine
209. Matching Many Patterns at Once
212. Quick Return with Warning