php_mysql_apache [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

php_mysql_apache [Electronic resources] - نسخه متنی

Julie C. Meloni

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
[Z]

a (append) mode

a format code (date() function)

A format code (date() function)

ab

ApacheBench (performance tool)

aborted connects status variable

abs() function
2nd

abuse

preventing

robots

Web crawlers
2nd

Web spiders
2nd

preventing (performance)

Accept mechanism

network setting (scalability)

access

control access

rules (IP addresses)

rules (network/mask pair)

rules (partial IP addresses)

denied

troubleshooting

file system access

settings (scalability)

granting

limiting

HTTP methods
2nd

methods

combining

restricing

access control
2nd
3rd
4th

restricting

authentication
2nd

authentication modules
2nd
3rd
4th
5th

based on cookie values
2nd
3rd
4th
5th
6th
7th
8th

client authentication

access control

access

restricting
2nd
3rd
4th

file-based
2nd

rules
2nd

all clients

domain names

environment variables

evaluating
2nd

Access denied message

access log

log file

AccessFileName directive

per-directory configuration files

accessing

Apache

browsers

files

last date accessed information

MySQL functions

variables
2nd
3rd
4th
5th

ACTION argument

adding

files

documents

users

database file-based access control authentication
2nd

addition (+) operator

addition operator (+)

addNums() function

address book database table example

date added field

date modified field

menus, creating
2nd

record addition script
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th

records, adding subentries to
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

records, deleting
2nd
3rd
4th

records, selecting and viewing
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th

table name fields
2nd
3rd
4th
5th
6th
7th

addresses

IP

IP addresses

control access rules

reverse DNS lookups

IP addresses (partial)

control access rules

listening addresses (Listen directive)

alert

LogLevel directive option

algorithms

digest

integrity (SSL protocols)

digest algorithms

public key cryptography

symmetric cryptography

all clients

access control rules

ALL command

Allow directives

access control rules

Allow, Deny argument

Order directive

AllowOverride directive

per-directory configuration files

ALTER command

ampersand (&)

and operator (&&)

analying

logs

analyzing

digital certificates

and (&&) operator

and operator (&&)

Apache

configuration changes, internationalization efforts
2nd

configuration file structyure

installing

binary method

from source

methods for, selecting

on Linux/Unix
2nd

on Windows
2nd
3rd
4th
5th
6th
7th

installing PHP on Linux/Unix with
2nd
3rd
4th
5th

integrating PHP with, on windows
2nd

upgrading
2nd
3rd

modifying without upgrading
2nd

Web site

Apache News and Announcements list

apache.exe

commands

controlling Apache (Windows)

shortcuts

server binary command (Windows)

ApacheBench

performance tool (Web site)
2nd

apachectl script

apachectl tool

control script command (UNIX)

append (a) mode

appending

files

application localization

character sets

header messages, interpreting correct
2nd
3rd
4th

multibyte

single-byte

environment modifications

Apache, configuration changes to
2nd

MySQL, configuration changes to
2nd

PHP, configuration changes to
2nd

internationalization

defined

key aspects

overview

Web page structure
2nd
3rd
4th
5th
6th
7th
8th
9th
10th
11th
12th
13th

applications

setup.exe

winmysqladmin

winmysqladmin.exe

applications.
[See also discussion forums]

applying

directives

directories

files

URLs

arcs

ImageArc() function

ImageFilledArc() function

arguments

ACTION

Allow, Deny argument

Order directive

AllowOverride directive

CustomLog directive

default values
2nd
3rd
4th

Deny, Allow argument

Order directive
2nd

directives

ENCRYPT

flock() function

function requiring two example
2nd

HostNameLookups directive

LogFormat directive

logs

rotating

Mutual-Failure argument

Order directive

optional example
2nd
3rd

reference passing

ServerRoot directive

TYPE

value passing example
2nd
3rd
4th
5th

arithmetic operators
2nd

array data type

array keys() function

arrays

array merge() function

arrays

array pop() function

arrays

array push() function

arrays

array shift() function

arrays

array unshift() function

arrays

array values() function

arrays

array() function

creating arrays with

arrays

array keys() function

array merge() function

array pop() function

array push() function

array shift() function

array unshift() function

array values() function

count() function

creating
2nd

array operator

associative arrays
2nd
3rd

index positions
2nd
3rd
4th

multidimensional arrays
2nd
3rd
4th

using array operator

with array() function
2nd

defined
2nd

each() function

foreach() function

getdate() function

list() function

mysql fetch array() function

reset() function

shuffle() function

sizeof() function

strings, breaking into

aruments

syslog daemon

errors;logging (Unix)

ASP tags
2nd

asp tags setting

assignment operator (=)
2nd
3rd

.
[See also combined assignment operators]2nd
[See also combined assignment operators]3rd
[See also combined assignment operators]4th
[See also combined assignment operators]

associative arrays

creating
2nd
3rd

asterisk (*)

multiplication operator (*)

asymmetric cryptography.
[See public key cryptography]

attacks

abuse

preventing (performance)

attributes

size

auth cookie

auth cookies

auth users table
2nd
3rd

AuthAuthoritative directives

file-based authentication

AuthConfig

directive value

AuthDBMGroupFile directive

database file-based access control authentication

AuthDBMUserFile directive

database file-based access control authentication

authentication

access

resticting
2nd

basic
2nd

browsers

AuthType directive

client authentication

access;restricting

communications

security

database file-based access control

mod auth dbm module
2nd
3rd

digest
2nd

file-based

mod auth module
2nd
3rd

modules

access (restricting)
2nd
3rd
4th
5th

directives

functions

realm

AuthName directive

SSL protocols
2nd
3rd

connections
2nd

authentication process

errors in
2nd
3rd
4th

authenticaton

database file-based access control

backend storage

user managment
2nd

file-based

AuthAuthoritative directive

backend storage

user management

AuthGroupFile directive

users file

backend storage

AuthName directive

authentication modules

authoritative information

functions

authentication modules

AuthType directive

authentication modules

AuthUserFile directive

users file

backend storage

awstats

log analysis

/ 323