[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
padding specifiers
parameters
pass phrases
key pairs
passthru() function
password files
storing (file-based authentication)
passwords
encrypting
user management (file-based authentication)
storing
user management;client authentication
paths
log files
per-directory configuration files 2nd
file system access (scalability)
percent sign (%)
percent symbol (%)
performance
abuse
files
loads
Web sites
concatenation operator (.) 2nd
permissions
permissions. [See also privileges]
PHP
configuration changes, internationalization efforts 2nd
error messages, retrieving 2nd
queries, executing 2nd 3rd 4th 5th
using mysql connect() function 2nd 3rd 4th
inserting MySQL data with 2nd 3rd 4th 5th 6th 7th
installing
on Linux/Unix with Apache 2nd 3rd 4th 5th
integrating with Apache on Linux/Unix 2nd 3rd
integrating with Apache on Windows 2nd
retrieving MySQL data with 2nd 3rd 4th
PHP 4.0
PhP 4.0
PHP 5.0
private and protected variables and methods
PHP distribution
pid file
pie charts
creating 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
pipes
opening to and from processes 2nd 3rd 4th 5th 6th 7th 8th
plaintext
message
plus sign (+)
PNG libraries
polygons
popen() function
opening pipes to and from processes 2nd 3rd
port values (Listen directive)
ports
bind to port
post-decrement operators 2nd 3rd 4th
post-increment operators 2nd 3rd 4th
posts
adding to topics 2nd 3rd 4th 5th 6th 7th 8th
diplaying in topics 2nd 3rd 4th 5th 6th 7th 8th
precedence (operators) 2nd 3rd 4th
precision specifications (strings) 2nd
predefined
preventing
abuse
printf() function
printing
privileges
granting 2nd 3rd 4th 5th 6th 7th 8th 9th
problems
Problems and Common Errors (MySQL manual)
processes
external processes
operating systems (scalability)
server processes
operating systems (scalability)
processing
configuration files
per-directory configuration files
programs
errors
HTTP requests
rotatelogs
rotatelogs.exe
properties
protocols
SSL
confidentiality (public key cryptography)
confidentiality (symmetric cryptography) 2nd
SSL (secure servers 2nd 3rd 4th 5th 6th
public key cryptography
confidentiality