php_mysql_apache [Electronic resources]

Julie C. Meloni

نسخه متنی -صفحه : 323/ 298
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

a (append) mode

a format code (date() function)

A format code (date() function)

ab

ApacheBench (performance tool)

aborted connects status variable

abs() function 2nd

abuse

preventing

robots

Web crawlers 2nd

Web spiders 2nd

preventing (performance)

Accept mechanism

network setting (scalability)

access

control access

rules (IP addresses)

rules (network/mask pair)

rules (partial IP addresses)

denied

troubleshooting

file system access

settings (scalability)

granting

limiting

HTTP methods 2nd

methods

combining

restricing

access control 2nd 3rd 4th

restricting

authentication 2nd

authentication modules 2nd 3rd 4th 5th

based on cookie values 2nd 3rd 4th 5th 6th 7th 8th

client authentication

access control

access

restricting 2nd 3rd 4th

file-based 2nd

rules 2nd

all clients

domain names

environment variables

evaluating 2nd

Access denied message

access log

log file

AccessFileName directive

per-directory configuration files

accessing

Apache

browsers

files

last date accessed information

MySQL functions

variables 2nd 3rd 4th 5th

ACTION argument

adding

files

documents

users

database file-based access control authentication 2nd

addition (+) operator

addition operator (+)

addNums() function

address book database table example

date added field

date modified field

menus, creating 2nd

record addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

records, deleting 2nd 3rd 4th

records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

table name fields 2nd 3rd 4th 5th 6th 7th

addresses

IP

IP addresses

control access rules

reverse DNS lookups

IP addresses (partial)

control access rules

listening addresses (Listen directive)

alert

LogLevel directive option

algorithms

digest

integrity (SSL protocols)

digest algorithms

public key cryptography

symmetric cryptography

all clients

access control rules

ALL command

Allow directives

access control rules

Allow, Deny argument

Order directive

AllowOverride directive

per-directory configuration files

ALTER command

ampersand (&)

and operator (&&)

analying

logs

analyzing

digital certificates

and (&&) operator

and operator (&&)

Apache

configuration changes, internationalization efforts 2nd

configuration file structyure

installing

binary method

from source

methods for, selecting

on Linux/Unix 2nd

on Windows 2nd 3rd 4th 5th 6th 7th

installing PHP on Linux/Unix with 2nd 3rd 4th 5th

integrating PHP with, on windows 2nd

upgrading 2nd 3rd

modifying without upgrading 2nd

Web site

Apache News and Announcements list

apache.exe

commands

controlling Apache (Windows)

shortcuts

server binary command (Windows)

ApacheBench

performance tool (Web site) 2nd

apachectl script

apachectl tool

control script command (UNIX)

append (a) mode

appending

files

application localization

character sets

header messages, interpreting correct 2nd 3rd 4th

multibyte

single-byte

environment modifications

Apache, configuration changes to 2nd

MySQL, configuration changes to 2nd

PHP, configuration changes to 2nd

internationalization

defined

key aspects

overview

Web page structure 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

applications

setup.exe

winmysqladmin

winmysqladmin.exe

applications. [See also discussion forums]

applying

directives

directories

files

URLs

arcs

ImageArc() function

ImageFilledArc() function

arguments

ACTION

Allow, Deny argument

Order directive

AllowOverride directive

CustomLog directive

default values 2nd 3rd 4th

Deny, Allow argument

Order directive 2nd

directives

ENCRYPT

flock() function

function requiring two example 2nd

HostNameLookups directive

LogFormat directive

logs

rotating

Mutual-Failure argument

Order directive

optional example 2nd 3rd

reference passing

ServerRoot directive

TYPE

value passing example 2nd 3rd 4th 5th

arithmetic operators 2nd

array data type

array keys() function

arrays

array merge() function

arrays

array pop() function

arrays

array push() function

arrays

array shift() function

arrays

array unshift() function

arrays

array values() function

arrays

array() function

creating arrays with

arrays

array keys() function

array merge() function

array pop() function

array push() function

array shift() function

array unshift() function

array values() function

count() function

creating 2nd

array operator

associative arrays 2nd 3rd

index positions 2nd 3rd 4th

multidimensional arrays 2nd 3rd 4th

using array operator

with array() function 2nd

defined 2nd

each() function

foreach() function

getdate() function

list() function

mysql fetch array() function

reset() function

shuffle() function

sizeof() function

strings, breaking into

aruments

syslog daemon

errors;logging (Unix)

ASP tags 2nd

asp tags setting

assignment operator (=) 2nd 3rd

. [See also combined assignment operators]2nd [See also combined assignment operators]3rd [See also combined assignment operators]4th [See also combined assignment operators]

associative arrays

creating 2nd 3rd

asterisk (*)

multiplication operator (*)

asymmetric cryptography. [See public key cryptography]

attacks

abuse

preventing (performance)

attributes

size

auth cookie

auth cookies

auth users table 2nd 3rd

AuthAuthoritative directives

file-based authentication

AuthConfig

directive value

AuthDBMGroupFile directive

database file-based access control authentication

AuthDBMUserFile directive

database file-based access control authentication

authentication

access

resticting 2nd

basic 2nd

browsers

AuthType directive

client authentication

access;restricting

communications

security

database file-based access control

mod auth dbm module 2nd 3rd

digest 2nd

file-based

mod auth module 2nd 3rd

modules

access (restricting) 2nd 3rd 4th 5th

directives

functions

realm

AuthName directive

SSL protocols 2nd 3rd

connections 2nd

authentication process

errors in 2nd 3rd 4th

authenticaton

database file-based access control

backend storage

user managment 2nd

file-based

AuthAuthoritative directive

backend storage

user management

AuthGroupFile directive

users file

backend storage

AuthName directive

authentication modules

authoritative information

functions

authentication modules

AuthType directive

authentication modules

AuthUserFile directive

users file

backend storage

awstats

log analysis