Sams Teach Yourself PHP, MySQL and Apache in 24 Hours

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

a (append) mode 

a format code (date() function) 

A format code (date() function) 

ab

    ApacheBench (performance tool) 

aborted connects status variable 

AbriaSoft Web site 

abs() function  2nd  3rd 

abuse

    preventing

        robots 

        Web crawlers 

        Web spiders 

    preventing (performance) 

Accept mechanism

    network setting (scalability) 

access

    control access

        rules (IP addresses) 

        rules (network/mask pair) 

        rules (partial IP addresses) 

    denied

        troubleshooting 

    file system access

        settings (scalability) 

    granting 

    limiting

        HTTP methods  2nd 

    methods

        combining 

    restricing

        access control  2nd  3rd  4th 

    restricting

        authentication  2nd 

        authentication modules  2nd  3rd  4th  5th 

        based on cookie values  2nd  3rd  4th  5th  6th  7th  8th 

        client authentication 

access control

    access

        restricting  2nd  3rd  4th 

    rules  2nd 

        all clients 

        domain names 

        environment variables 

        evaluating  2nd 

Access denied message 

access log

    log file 

AccessFileName directive

    per-directory configuration files 

accessing

    Apache

        browsers 

    files

        last date accessed information 

    MySQL  2nd 

    MySQL functions 

    variables  2nd  3rd  4th  5th  6th 

ACTION argument 

adding

    files

        documents 

    users

        database file-based access control authentication  2nd 

addition (+) operator 

addition operator (+) 

addNums() function 

address book database table example 

    date added field 

    date modified field 

    menus, creating  2nd 

    record addition script  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 

    records, adding subentries to  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 

    records, deleting  2nd  3rd  4th  5th 

    records, selecting and viewing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 

    table name fields  2nd  3rd  4th  5th  6th  7th  8th 

addresses

    IP 

    IP addresses

        control access rules 

        reverse DNS lookups 

    IP addresses (partial)

        control access rules 

    listening addresses (Listen directive) 

alert

    LogLevel directive option 

algorithms

    digest

        integrity (SSL protocols) 

    digest algorithms 

    public key cryptography 

    symmetric cryptography 

all clients

    access control rules 

ALL command 

Allow directives

    access control rules 

Allow, Deny argument

    Order directive 

AllowOverride directive

    per-directory configuration files 

ALTER command 

ampersand (&) 

    and operator (&&) 

analying

    logs 

analyzing

    digital certificates 

and (&&) operator 

and operator (&&) 

Apache

    configuration file structyure 

    installing

        binary method 

        from source 

        methods for, selecting 

        on Linux/Unix  2nd 

        on Windows  2nd  3rd  4th  5th  6th  7th 

    installing PHP on Linux/Unix with  2nd  3rd  4th  5th  6th 

    integrating PHP with, on windows  2nd  3rd 

    Web site 

apache.exe

    commands

        controlling Apache (Windows) 

        shortcuts 

    server binary command (Windows) 

ApacheBench

    performance tool (Web site)  2nd 

apachectl script 

apachectl tool

    control script command (UNIX) 

append (a) mode 

appending 

    files 

applications

    setup.exe 

    winmysqladmin 

    winmysqladmin.exe 

applications.  [See also discussion forums]

applying

    directives

        directories 

        files 

        URLs 

arguments 

    ACTION 

    Allow, Deny argument

        Order directive 

    AllowOverride directive 

    CustomLog directive 

    default values  2nd  3rd  4th 

    Deny, Allow argument

        Order directive  2nd 

    directives 

    ENCRYPT 

    flock() function 

    format control strings and  2nd  3rd  4th 

    function requiring two example  2nd 

    HostNameLookups directive 

    LogFormat directive 

    logs

        rotating 

    Mutual-Failure argument

        Order directive 

    optional example  2nd  3rd 

    reference passing 

    ServerRoot directive 

    TYPE 

    value passing example  2nd  3rd  4th  5th 

arithmetic operators  2nd 

array data type 

arrays

    $GLOBALS

        looping through  2nd  3rd 

    getdate() function 

    mysql fetch array() function 

    strings, breaking into  2nd 

aruments

    syslog daemon

        errors;logging (Unix) 

ASCII() function  2nd  3rd 

ASP tags  2nd 

asp tags setting 

assignment operator (=)  2nd  3rd 

assignment operator (=).  [See also combined assignment operators]2nd  [See also combined assignment operators]3rd  [See also combined assignment operators]4th  [See also combined assignment operators]

asterisk (*)

    multiplication operator (*) 

asymmetric cryptography.  [See public key cryptography]

attacks

    abuse

        preventing (performance) 

attributes

    size 

auth cookie 

auth cookies  2nd 

auth users table  2nd  3rd 

AuthAuthoritative directives

    file-based authentication 

AuthConfig

    directive value 

AuthDBMGroupFile directive

    database file-based access control authentication 

AuthDBMUserFile directive

    database file-based access control authentication 

authentication

    access

        resticting  2nd 

    basic  2nd 

    browsers

        AuthType directive 

    client authentication

        access;restricting 

    communications

        security 

    database file-based access control

        mod auth dbm module  2nd  3rd 

    digest  2nd 

    file-based

        mod auth module  2nd  3rd 

    modules 

        access (restricting)  2nd  3rd  4th  5th 

        directives 

        functions 

    realm

        AuthName directive 

    SSL protocols  2nd  3rd  4th 

        connections  2nd 

authentication process 

    errors in  2nd  3rd  4th 

authenticaton

    database file-based access control

        backend storage 

        user managment  2nd 

    file-based

        AuthAuthoritative directive 

        backend storage 

        user management 

AuthGroupFile directive

    users file

        backend storage 

AuthName directive

    authentication modules 

authoritative information

    functions

        authentication modules 

AuthType directive

    authentication modules 

AuthUserFile directive

    users file

        backend storage 

awstats

    log analysis 

Категории