php_mysql_apache [Electronic resources]

Julie C. Meloni

نسخه متنی -صفحه : 323/ 315
نمايش فراداده

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

r (read)mode

r format code (date() function)

RAM disks

scoreboard files

file system access (scalability)

rand switch

key pairs

creating (certificates)

raw headers

froms 2nd

RC2

symmetric cryptography

RC4

symmetric cryptography

read mode

readdir() function 2nd 3rd

reading

directory contents 2nd 3rd

files

arbitrary data amounts 2nd 3rd

characters 2nd 3rd

lines 2nd 3rd

using popen() function 2nd 3rd 4th 5th 6th

README file

realms

authentication

AuthName directive

recording

events

error log

records

address book database table example

record addition script 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

records, adding subentries to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

records, deleting 2nd 3rd 4th

records, selecting and viewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

records, selecting and viewingt

inserting 2nd

rectangles

ImageFilledRectangle() function

ImageRectangle() function

reducing

transmitted data (performance) 2nd

reference passing (arguments)

REFERENCES command

registering

multiple session variables 2nd

relationships

many-to-many 2nd 3rd 4th 5th

one-to-many 2nd

one-to-one 2nd

RELOAD command

removing

privileges 2nd

REPEAT() function

REPLACE command 2nd 3rd 4th

REPLACE() function

replacing

string portions 2nd

substrings 2nd

Reply-to header

request headers

name-based virtual hosting (syntax) 2nd

request logs

creating

requests

client requests

tracking (access log)

requests. [See also HTTP requests]

Require directive

authentication modules

require once() function

require() function 2nd

reset() function

arrays

resolving

hostnames(managing logs)

resource data type

restricting

access

authentication 2nd

authentication modules 2nd 3rd 4th 5th

based on cookie values 2nd 3rd 4th 5th 6th 7th 8th

client authentication

access (access control) 2nd 3rd 4th

return statements

function values 2nd

reverse DNS lookups

IP addresses

REVOKE command 2nd 3rd 4th

RGB color values

image creation 2nd

RIGHT JOIN command

RIGHT() function 2nd

RLimitCPU directive

external processes

operating systems (scalability)

RLimitMem directive

external processes

operating systems (scalability)

RLimitNProc directive

external processes

operating systems (scalability)

rmdir() function

robots

abuse

preventing

robots.txt file

Web spiders (preventing abuse)

root user

non-root users

running MySQL as

stopping

root users

MySQL running as 2nd

rotatelogs program

logs

rotating (Unix)

rotatelogs utility

logging program

rotatelogs.exe program

logs

rotating (Unix)

rotating

logs

rows

mysql num rows() function

RPAD() function

RSA

public key cryptography

RTRIM() function 2nd 3rd 4th

running commands

with exec() function 2nd 3rd 4th

with passthru() function

with system() function 2nd 3rd 4th 5th