Advanced Macromedia ColdFusion MX 7 Application Development

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] sandboxes

    sandbox security [See server sandboxes] SATTA (Serial Advanced Technology Attachment) speed

scaling with ColdFusion MX 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th

     applications that scale, writing 2nd 3rd 4th         code organization         code, avoiding bottlenecks 2nd

         code, efficient

         modularity

     basic planning 2nd 3rd 4th 5th 6th 7th 8th 9th

         failover

         load-balancing options 2nd         mixed Web application environments

         server and hardware components 2nd 3rd         session state management

         tiered application architecture 2nd 3rd         user-request distribution algorithms 2nd     importance of 2nd

    load-balancing options         hardware 2nd 3rd         hardware vs. software 2nd 3rd 4th

     multiple instances 2nd 3rd 4th

     MX and scalability

     scaling with CF MX7 Load Balancing 2nd 3rd 4th 5th

         basics 2nd         load-balanced clusters, configuring 2nd 3rd 4th

     Web site server, synchronizing 2nd 3rd

scaling with J2EE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th     architecture of CF MX 7 and embedded Java server 2nd 3rd 4th 5th

         J2EE session management 2nd

         scaling with EJBs 2nd     benefits of 2nd 3rd

     development values 2nd 3rd 4th 5th 6th

         ease of development

         leveraging diverse developer skill sets

         platforms, extending 2nd

         rich internet applications, deploying

         security features of J2EE

         Web site scalability, improving 2nd 3rd 4th

     JVM 2nd 3rd 4th 5th 6th 7th 8th 9th [See also garbage collection]

         fundamentals 2nd 3rd [See also garbage collection]

     scaling with CF and JRun 2nd 3rd

     scaling with other Java application servers 2nd

schemas, XML 2nd 3rd 4th 5th 6th

Schmidt, Marco 2nd

SCOPE attribute (<cfldap>)

screen scraping, defined scripting, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st     <cfscript> fundamentals 2nd 3rd 4th 5th 6th

         <cfscript> vs. JavaScript 2nd         <cfscript> vs. tag-based syntax 2nd 3rd 4th

         definition example 2nd

     <cfscript> implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th         calling CF functions 2nd         commenting code

         flow control using 2nd 3rd

         loops 2nd 3rd 4th 5th

         variables, creating and using 2nd

     <cfscript>, exception handling 2nd 3rd

     <cfscript>, user-defined functions 2nd     problems and solutions 2nd 3rd 4th

         quotes (') 2nd         { } symbols 2nd

scripting, JavaScript 2nd Scriptprotect variable/attribute values search filters (<cfldap>) 2nd

SECONDARY strength parameter SECURE attribute (<cfldap>) Secure Sockets Layer (SSL) on servers, enabling 2nd 3rd 4th 5th 6th 7th 8th

     Apache HTTP Server 2nd

     authentication and

     Distributed mode, securing CF in

     IIS 2nd 3rd     overview

     page requests and

     SSL liabilities     Sun ONE Web Server (IWS) 2nd 3rd 4th

security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

     Admin API 2nd 3rd 4th 5th 6th 7th         securing Admin API 2nd

         securing façade component 2nd 3rd 4th

         security risks

         ServiceFactory object 2nd

     authentication and authorization 2nd

     browser validation 2nd 3rd 4th 5th 6th 7th

         data validation techniques 2nd

         file uploads 2nd

         form and URL hacks

         XSS 2nd 3rd

     CFCs 2nd 3rd 4th 5th 6th 7th

         access control 2nd 3rd 4th

         role-based security in 2nd 3rd 4th

     encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

         CF encryption functions 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

         cleartext risks [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]         Encrypt( ) and Decrypt functions 2nd 3rd 4th 5th 6th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]         Hash( ) function 2nd 3rd 4th 5th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]

         third-party JCE providers, installing 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]     J2EE

     security risks 2nd 3rd

     Web services security options, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th     operating systems 2nd 3rd 4th

         Unix and Linux 2nd

         Windows 2003 and XP 2nd

     security framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th [See also user security]

         development security 2nd [See also user security]

         login example, CF 2nd 3rd 4th [See also user security]         Login Wizard example 2nd 3rd 4th 5th [See also user security]

         Login Wizard extension 2nd 3rd 4th 5th 6th [See also user security]     Sun ONE 2nd 3rd 4th 5th 6th

     Web servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server]         IIS 2nd 3rd 4th 5th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server] Security Wizard 2nd

security, in shared and hosted environments 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th     CFIDE directory, disabling 2nd 3rd    ColdFusion

         encrypting CF templates

         running as user 2nd

         sandbox 2nd

     custom tag paths 2nd     default document, adding

     error messages, handling

     example applications, removing     filename extensions 2nd

     Flash Remoting integration 2nd 3rd

     help docs, removing     IP restrictions, debugging 2nd

     JSP, disabling functionality

     multiple hosts, configuring CF for 2nd 3rd 4th 5th

         CF extensions, adding 2nd

         IIS 5.x/6.0 configuration changes 2nd

         JRun Connector ISAPI filter 2nd

         JRunScripts virtual directory 2nd

         Sun ONE/iPlanet servers, configuring 2nd

     multiple server configurations 2nd 3rd

     RDS, securing 2nd 3rd

     security Web sites

     session timeout values, limiting

     shared environments security risks 2nd 3rd

security.cfc, (Admin API component)

SeedGenerator errors

semicolons (;     <cfscript> and 2nd     entity references and

SendGatewayMessage( ) function Serial Advanced Technology Attachment (SATA) speed

serial numbers in J2EE archive definitions

serializing     defined 2nd     serializing/deserializing complex data 2nd 3rd 4th

     WDDX.DTD file, serialization model

     WddxSerializer, serializing packets with (JavaScript) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

server sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

     applications, creating and securing with sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         configuring sandboxes 2nd 3rd 4th 5th 6th         sandbox security, enabling 2nd 3rd

         sandboxes, adding 2nd     Blackbox sandbox example 2nd

     fundamentals 2nd 3rd 4th         file and directory permissions 2nd         security changes, CF MX 2nd

server-side form validation 2ndserver-side HTTP and FTP [See HTTP and FTP, server-side] Server.log file

serverinstance.cfc, (Admin API component)

servers

    application servers [See Web servers, Linux;CF security options for, application servers]

    database servers        clustered design [See Web servers, Linux;CF security options for]

        using RAID Level 5 configuration on [See Web servers, Linux;CF security options for]

    dual-homed servers [See Web servers, Linux;CF security options for]    front-end vs. back-end servers [See Web servers, Linux;CF security options for]

    interaction with intelligent agents [See Web servers, Linux;CF security options for]

    multiserver configuration [See Web servers, Linux;CF security options for]    production servers, disabling RDS on [See Web servers, Linux;CF security options for]

    public LDAP servers, querying [See Web servers, Linux;CF security options for]

    security, multiple server configurations [See Web servers, Linux;CF security options for]

    server components [See Web servers, Linux;CF security options for]

    server heartbeat, defined [See Web servers, Linux;CF security options for]

    server load [See Web servers, Linux;CF security options for]

    server-based load balancers [See Web servers, Linux;CF security options for]

    Web servers

        clustered design [See Web servers, Linux;CF security options for]

        load-balanced Web-server clusters, building [See Web servers, Linux;CF security options for]

        security [See Web servers, Linux;CF security options for]

    Web site servers, synchronizing [See Web servers, Linux;CF security options for]

service adapters, and Flash Remoting

service-level agreement (SLA), and Web hosting

ServiceFactory object 2nd

ServletRequest classservlets [See Java servlets]Session scope

     using to store login information     variables, and CFLOGIN

session state, managing in clusters 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th

     history of managing state 2nd     options for managing session state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th         CLIENT variable repository 2nd 3rd 4th 5th

         cookies, for maintaining state 2nd 3rd 4th

         hybrid solutions

         J2EE and 2nd 3rd 4th

         parameters, embedding in URL or FORM posts 2nd

         server-side variables 2nd         SESSION variables vs. CLIENT variables 2nd 3rd

         users, keeping on same machine     reasons for maintaining state 2nd

     session state described     sticky load balancing andSESSION variables

     locales and     vs. CLIENT variables 2nd 3rd SESSION.cfauthorization variable

sessions

     session replication

     session timeout values, limiting

     session-aware load balancing 2nd     SMS and

setPermitMode( ) helper

SGML (Standardized Generalized Markup Language)shared environments security [See security]

shared variables

     case-sensitivity and     data types and 2nd

     multifaceted values and

short form notation (XML)

Short Message Peer to Peer (SMPP) 2nd

Short Message Service (SMS), and Instant Messaging (IM) [See Instant Messaging (IM)]

Simple Object Access Protocol (SOAP)

     defined 2nd

     requests 2nd 3rd

     XML Web Services and

simpleauth method 2nd

SimpleCreditRating CFC 2nd

Site-Minder

Site-wide Error Handler

skin attribute (<cfform>) 2nd

skins

     CFML 2nd     XSL SLA (service-level agreement), and Web hosting

SMPP (Short Message Peer to Peer) 2ndSMS. , [See Instant Messaging (IM]

sn.exe command-line utility 2nd

SOAP [See Simple Object Access Protocol (SOAP]software     deployment software, and Web site servers

     J-Integra

    load balancing and

         hardware- vs. software-based load balancing 2nd 3rd 4th

         software-based load balancing 2nd 3rd

Solaris, os performance monitoring 2nd solicit - response Web service

Solicitation operation types spaces, eden and survivor, defined

special characters     in XML 2nd 3rd speed of hard disk drive

SQL     injection     poisoning

SSL [See Secure Sockets Layer (SSL) on servers, passwords;enabling]

stand-alone installation option

stand-alone Web server problems 2nd

Standardized Generalized Markup Language (SGML) stateless and stateful session Beans 2nd

statements

     break statement 2nd 3rd     continue statement 2nd

    JavaScript

         basic         creating functions

         for error handling 2nd

         for looping 2nd

stickiness

     locale stickiness 2nd

     sticky load balancing 2nd 3rd

     sticky option (session state)

     Sticky Sessions option

stopOnError attribute (<cfftp>) 2nd

strength parameter

stress testing, defined

string anchors 2nd 3rd 4th 5th

String parameter

     Encrypt( ) and Decrypt( ) functions

     Hash( ) function

strings     passing to JavaScript 2nd 3rd     WDDX.DTD file and 2nd

struct data type 2nd 3rd StructClear (Session)

structure and array functions (XML) 2nd

structures     passing to JavaScript as objects 2nd     WDDX.DTD file

subexpressions 2nd 3rd 4th

SUBTREE scope (<cfldap>)

SummaryProperties object properties

Sun

     Sun Application Server, and multiple instances     Visual GC garbage collection tool

Sun ONE    application server

         Application Server 6.5 installation option         as Java application server     load balancing options

    Web server         configuring sandboxes 2nd         security options 2nd 3rd 4th 5th 6th

         SSL and 2nd 3rd 4th

survivor spaces, defined

SWITCH - CASE blocks

switch-case     <cfscript> vs. tag-based syntax

     constructs 2nd

Symantec's Ghost, mirroring software 2nd syndication model, Web services

system performance, monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th

     active monitoring, . ) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th [See also Performance Monitor (perfmon]         os monitoring 2nd [See also Performance Monitor (perfmon]

         probes 2nd 3rd 4th [See also Performance Monitor (perfmon]

     CF MX 7 server 2nd 3rd 4th 5th 6th 7th

         baselines 2nd

         CF log files 2nd 3rd

         historical analysis

         logs and JRun 2nd 3rd

         Web server log files 2nd

     JVM 2nd 3rd 4th

     performance problems and bottlenecks 2nd 3rd

     Unix and Linux servers 2nd 3rd 4th

Категории