ADVANCED macromedia COLDFUSION MX 7 Application Development [Electronic resources]

Ben Forta, Dain Anderson, Brian Baxter, Jeffrey Bouley, Raymond Camden, Adam Churvis, David Churvis, Ken Fricklas, Paul Hastings, Sam Neff, Robi Sen

نسخه متنی -صفحه : 240/ 233
نمايش فراداده

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sandboxes

sandbox security [See server sandboxes]

SATTA (Serial Advanced Technology Attachment) speed

scaling with ColdFusion MX 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th

applications that scale, writing 2nd 3rd 4th

code organization

code, avoiding bottlenecks 2nd

code, efficient

modularity

basic planning 2nd 3rd 4th 5th 6th 7th 8th 9th

failover

load-balancing options 2nd

mixed Web application environments

server and hardware components 2nd 3rd

session state management

tiered application architecture 2nd 3rd

user-request distribution algorithms 2nd

importance of 2nd

load-balancing options

hardware 2nd 3rd

hardware vs. software 2nd 3rd 4th

multiple instances 2nd 3rd 4th

MX and scalability

scaling with CF MX7 Load Balancing 2nd 3rd 4th 5th

basics 2nd

load-balanced clusters, configuring 2nd 3rd 4th

Web site server, synchronizing 2nd 3rd

scaling with J2EE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

architecture of CF MX 7 and embedded Java server 2nd 3rd 4th 5th

J2EE session management 2nd

scaling with EJBs 2nd

benefits of 2nd 3rd

development values 2nd 3rd 4th 5th 6th

ease of development

leveraging diverse developer skill sets

platforms, extending 2nd

rich internet applications, deploying

security features of J2EE

Web site scalability, improving 2nd 3rd 4th

JVM 2nd 3rd 4th 5th 6th 7th 8th 9th [See also garbage collection]

fundamentals 2nd 3rd [See also garbage collection]

scaling with CF and JRun 2nd 3rd

scaling with other Java application servers 2nd

schemas, XML 2nd 3rd 4th 5th 6th

Schmidt, Marco 2nd

SCOPE attribute (<cfldap>)

screen scraping, defined

scripting, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

<cfscript> fundamentals 2nd 3rd 4th 5th 6th

<cfscript> vs. JavaScript 2nd

<cfscript> vs. tag-based syntax 2nd 3rd 4th

definition example 2nd

<cfscript> implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

calling CF functions 2nd

commenting code

flow control using 2nd 3rd

loops 2nd 3rd 4th 5th

variables, creating and using 2nd

<cfscript>, exception handling 2nd 3rd

<cfscript>, user-defined functions 2nd

problems and solutions 2nd 3rd 4th

quotes (') 2nd

{ } symbols 2nd

scripting, JavaScript 2nd

Scriptprotect variable/attribute values

search filters (<cfldap>) 2nd

SECONDARY strength parameter

SECURE attribute (<cfldap>)

Secure Sockets Layer (SSL) on servers, enabling 2nd 3rd 4th 5th 6th 7th 8th

Apache HTTP Server 2nd

authentication and

Distributed mode, securing CF in

IIS 2nd 3rd

overview

page requests and

SSL liabilities

Sun ONE Web Server (IWS) 2nd 3rd 4th

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

Admin API 2nd 3rd 4th 5th 6th 7th

securing Admin API 2nd

securing façade component 2nd 3rd 4th

security risks

ServiceFactory object 2nd

authentication and authorization 2nd

browser validation 2nd 3rd 4th 5th 6th 7th

data validation techniques 2nd

file uploads 2nd

form and URL hacks

XSS 2nd 3rd

CFCs 2nd 3rd 4th 5th 6th 7th

access control 2nd 3rd 4th

role-based security in 2nd 3rd 4th

encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

CF encryption functions 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

cleartext risks [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

Encrypt( ) and Decrypt functions 2nd 3rd 4th 5th 6th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

Hash( ) function 2nd 3rd 4th 5th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

third-party JCE providers, installing 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

J2EE

security risks 2nd 3rd

Web services

security options, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th

operating systems 2nd 3rd 4th

Unix and Linux 2nd

Windows 2003 and XP 2nd

security framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th [See also user security]

development security 2nd [See also user security]

login example, CF 2nd 3rd 4th [See also user security]

Login Wizard example 2nd 3rd 4th 5th [See also user security]

Login Wizard extension 2nd 3rd 4th 5th 6th [See also user security]

Sun ONE 2nd 3rd 4th 5th 6th

Web servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server]

IIS 2nd 3rd 4th 5th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server]

Security Wizard 2nd

security, in shared and hosted environments 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th

CFIDE directory, disabling 2nd 3rd

ColdFusion

encrypting CF templates

running as user 2nd

sandbox 2nd

custom tag paths 2nd

default document, adding

error messages, handling

example applications, removing

filename extensions 2nd

Flash Remoting integration 2nd 3rd

help docs, removing

IP restrictions, debugging 2nd

JSP, disabling functionality

multiple hosts, configuring CF for 2nd 3rd 4th 5th

CF extensions, adding 2nd

IIS 5.x/6.0 configuration changes 2nd

JRun Connector ISAPI filter 2nd

JRunScripts virtual directory 2nd

Sun ONE/iPlanet servers, configuring 2nd

multiple server configurations 2nd 3rd

RDS, securing 2nd 3rd

security Web sites

session timeout values, limiting

shared environments security risks 2nd 3rd

security.cfc, (Admin API component)

SeedGenerator errors

semicolons (;

<cfscript> and 2nd

entity references and

SendGatewayMessage( ) function

Serial Advanced Technology Attachment (SATA) speed

serial numbers in J2EE archive definitions

serializing

defined 2nd

serializing/deserializing complex data 2nd 3rd 4th

WDDX.DTD file, serialization model

WddxSerializer, serializing packets with (JavaScript) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

server sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

applications, creating and securing with sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

configuring sandboxes 2nd 3rd 4th 5th 6th

sandbox security, enabling 2nd 3rd

sandboxes, adding 2nd

Blackbox sandbox example 2nd

fundamentals 2nd 3rd 4th

file and directory permissions 2nd

security changes, CF MX 2nd

server-side form validation 2nd

server-side HTTP and FTP [See HTTP and FTP, server-side]

Server.log file

serverinstance.cfc, (Admin API component)

servers

application servers [See Web servers, Linux;CF security options for, application servers]

database servers

clustered design [See Web servers, Linux;CF security options for]

using RAID Level 5 configuration on [See Web servers, Linux;CF security options for]

dual-homed servers [See Web servers, Linux;CF security options for]

front-end vs. back-end servers [See Web servers, Linux;CF security options for]

interaction with intelligent agents [See Web servers, Linux;CF security options for]

multiserver configuration [See Web servers, Linux;CF security options for]

production servers, disabling RDS on [See Web servers, Linux;CF security options for]

public LDAP servers, querying [See Web servers, Linux;CF security options for]

security, multiple server configurations [See Web servers, Linux;CF security options for]

server components [See Web servers, Linux;CF security options for]

server heartbeat, defined [See Web servers, Linux;CF security options for]

server load [See Web servers, Linux;CF security options for]

server-based load balancers [See Web servers, Linux;CF security options for]

Web servers

clustered design [See Web servers, Linux;CF security options for]

load-balanced Web-server clusters, building [See Web servers, Linux;CF security options for]

security [See Web servers, Linux;CF security options for]

Web site servers, synchronizing [See Web servers, Linux;CF security options for]

service adapters, and Flash Remoting

service-level agreement (SLA), and Web hosting

ServiceFactory object 2nd

ServletRequest class

servlets [See Java servlets]

Session scope

using to store login information

variables, and CFLOGIN

session state, managing in clusters 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

history of managing state 2nd

options for managing session state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

CLIENT variable repository 2nd 3rd 4th 5th

cookies, for maintaining state 2nd 3rd 4th

hybrid solutions

J2EE and 2nd 3rd 4th

parameters, embedding in URL or FORM posts 2nd

server-side variables 2nd

SESSION variables vs. CLIENT variables 2nd 3rd

users, keeping on same machine

reasons for maintaining state 2nd

session state described

sticky load balancing and

SESSION variables

locales and

vs. CLIENT variables 2nd 3rd

SESSION.cfauthorization variable

sessions

session replication

session timeout values, limiting

session-aware load balancing 2nd

SMS and

setPermitMode( ) helper

SGML (Standardized Generalized Markup Language)

shared environments security [See security]

shared variables

case-sensitivity and

data types and 2nd

multifaceted values and

short form notation (XML)

Short Message Peer to Peer (SMPP) 2nd

Short Message Service (SMS), and Instant Messaging (IM) [See Instant Messaging (IM)]

Simple Object Access Protocol (SOAP)

defined 2nd

requests 2nd 3rd

XML Web Services and

simpleauth method 2nd

SimpleCreditRating CFC 2nd

Site-Minder

Site-wide Error Handler

skin attribute (<cfform>) 2nd

skins

CFML 2nd

XSL

SLA (service-level agreement), and Web hosting

SMPP (Short Message Peer to Peer) 2nd

SMS. , [See Instant Messaging (IM]

sn.exe command-line utility 2nd

SOAP [See Simple Object Access Protocol (SOAP]

software

deployment software, and Web site servers

J-Integra

load balancing and

hardware- vs. software-based load balancing 2nd 3rd 4th

software-based load balancing 2nd 3rd

Solaris, os performance monitoring 2nd

solicit - response Web service

Solicitation operation types

spaces, eden and survivor, defined

special characters

in XML 2nd 3rd

speed of hard disk drive

SQL

injection

poisoning

SSL [See Secure Sockets Layer (SSL) on servers, passwords;enabling]

stand-alone installation option

stand-alone Web server problems 2nd

Standardized Generalized Markup Language (SGML)

stateless and stateful session Beans 2nd

statements

break statement 2nd 3rd

continue statement 2nd

JavaScript

basic

creating functions

for error handling 2nd

for looping 2nd

stickiness

locale stickiness 2nd

sticky load balancing 2nd 3rd

sticky option (session state)

Sticky Sessions option

stopOnError attribute (<cfftp>) 2nd

strength parameter

stress testing, defined

string anchors 2nd 3rd 4th 5th

String parameter

Encrypt( ) and Decrypt( ) functions

Hash( ) function

strings

passing to JavaScript 2nd 3rd

WDDX.DTD file and 2nd

struct data type 2nd 3rd

StructClear (Session)

structure and array functions (XML) 2nd

structures

passing to JavaScript as objects 2nd

WDDX.DTD file

subexpressions 2nd 3rd 4th

SUBTREE scope (<cfldap>)

SummaryProperties object properties

Sun

Sun Application Server, and multiple instances

Visual GC garbage collection tool

Sun ONE

application server

Application Server 6.5 installation option

as Java application server

load balancing options

Web server

configuring sandboxes 2nd

security options 2nd 3rd 4th 5th 6th

SSL and 2nd 3rd 4th

survivor spaces, defined

SWITCH - CASE blocks

switch-case

<cfscript> vs. tag-based syntax

constructs 2nd

Symantec's Ghost, mirroring software 2nd

syndication model, Web services

system performance, monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

active monitoring, . ) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th [See also Performance Monitor (perfmon]

os monitoring 2nd [See also Performance Monitor (perfmon]

probes 2nd 3rd 4th [See also Performance Monitor (perfmon]

CF MX 7 server 2nd 3rd 4th 5th 6th 7th

baselines 2nd

CF log files 2nd 3rd

historical analysis

logs and JRun 2nd 3rd

Web server log files 2nd

JVM 2nd 3rd 4th

performance problems and bottlenecks 2nd 3rd

Unix and Linux servers 2nd 3rd 4th