Sams Teach Yourself PHP, MySQL and Apache in 24 Hours

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

c type specifier 

CA (certification authority)

    certificate signing requests 

    digital certificates 

CacheFile directive

    mapping files

        memory 

caching

    performance 

calendar example  2nd 

    HTML form  2nd  3rd  4th  5th 

    library, creating  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th 

    table, creating  2nd  3rd  4th  5th  6th  7th  8th  9th 

    user input  2nd  3rd  4th  5th 

calling

    functions  2nd 

        dynamically  2nd  3rd 

Can't connect to server message 

case

    strings

        converting  2nd 

case sensitivity

    constants 

case-sensitivity

    constants 

casting

    variables  2nd  3rd  4th  5th 

certificate signning requests

    creating (managing certificates)  2nd 

certificates

    digital

        analyzing 

        bundled 

        CA (certification authority) 

        chaining 

        information 

        SSL 

    digital certificates

        authentication;SSL protocols 

    managing

        certificate signing requests;creating  2nd 

        key pairs (creating) 

        self-signed certificates 

    managing (secure servers)  2nd  3rd  4th 

    self-signed (managing certificates) 

certification authority (CA)

    certificate signing requests 

    digital certificates 

CGI

    errors

        logging 

chaining

    digital certificates 

changing

    data types

        by casting  2nd  3rd  4th  5th 

        setttype() function  2nd  3rd 

CHAR data type 

CHAR field 

CHAR LENGTH() function 

CHAR() function 

checkdate() function  2nd  3rd  4th 

checking

    digital certificates 

ciphertext

    message

        encryption 

clauses

    else 

        with if statements  2nd  3rd 

    elseif

        with if statements  2nd  3rd  4th 

    ORDER BY  2nd  3rd 

    WHERE  2nd  3rd  4th  5th  6th  7th  8th 

    where 

cleaning up

    strings  2nd  3rd 

CLF (Common Log Format)

    log format 

client authentication

    access

        resticting 

    user management 

client requests

    tracking

        access log 

clients

    all clients

        access control rules 

    tracking

        troubleshooting 

closing

    files 

code

    adding comments to  2nd 

    source code

        building (installation methods) 

        downloading (Apache instllations) 

        uncompressing (Apache installations) 

    status code

        conditional looping 

    when to comment 

code block (control statements)

    brackets 

code blocks  2nd  3rd  4th 

collision resistant

    message digests

        digest algorithms 

columns priv table 

combined assignment operators  2nd  3rd  4th 

combining

    access methods 

command-line arguments 

command-line options

    -c 

command-line tools

    openssl (certificates) 

commands  2nd  3rd 

    ALL 

    ALTER 

    certificates signing requests

        creating 

    compress 

    configure 

    control script 

    CREATE 

    CREATE TABLE  2nd  3rd  4th 

    CROSS JOIN 

    DELETE  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

    DROP 

    EVOKE 

    EXPLAIN  2nd  3rd 

    FILE  2nd 

    File menu

        Properties, Certificates 

    FLUSH  2nd 

    FLUSH HOSTS 

    FLUSH LOGS 

    FLUSH PRIVELEGES 

    FLUSH PRIVILEGES  2nd 

    FLUSH TABLES  2nd 

    GRANT  2nd  3rd  4th 

    gunzip  2nd 

    gzip 

    INNER JOIN 

    INSERT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 

    JOIN 

    key pairs

        creating (certificates) 

    kill

        signals (sending) 

    LEFT JOIN  2nd 

    LIMIT  2nd  3rd  4th 

    ln commands

        symbolic links (symlink) 

    make 

    make install  2nd 

    mod so 

    NATURAL JOIN 

    OPTIMIZE TABLE  2nd  3rd 

    PROCESS 

    ps 

    REFERENCES 

    RELOAD  2nd 

    REPLACE  2nd  3rd  4th 

    REVOKE  2nd  3rd 

    RIGHT JOIN 

    SELECT  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th 

    server binary 

    SHOW 

    SHOW COLUMNS 

    SHOW CREATE TABLE  2nd 

    SHOW DATABASES 

    SHOW GRANTS  2nd 

    SHOW INDEX  2nd 

    SHOW OPEN TABLES 

    SHOW STATUS  2nd  3rd 

    SHOW TABLE STATUS  2nd  3rd  4th 

    SHOW TABLES 

    SHOW VARIABLES  2nd  3rd 

    SHUTDOWN 

    Start menu

        Control Apache 

    STRAIGHT JOIN 

    tar  2nd 

    ulimit command

        operating systems (scalability) 

    UPDATE  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

    USAGE 

    Windows

        Apache (controlling) 

commands.  [See also functions]2nd  [See also statements]

comments

    adding to code  2nd 

    defined 

    multiline 

    single-line 

    when to comment 

Common Log Format (CLF)

    log format 

Common Name field

    certificate signing requests 

communications

    secure servers 

    security

        authentication 

        confidentiality 

        integrity 

Compact installation option 

comparison operators  2nd 

compatibility

    schemas

        directives 

compiling

    Apache

        modules 

    Apache installations 

compress command 

compress utility 

compression

    reduced transmitted data (performance) 

    uncompressing

        source code (Apache installations) 

CONCAT WS() function  2nd 

CONCAT() function  2nd 

concatenation function  2nd  3rd  4th  5th 

concatenation operator (.)  2nd  3rd 

conditional containers

    configuration files  2nd 

conditional logging

    CustomLog directives 

    HostNameLookups directive 

    HTTP requests  2nd 

    IdentityCheck directive 

conditional looping

    environment variables 

    status code 

conditions

    ? (ternary operator)  2nd  3rd 

    else clause with if statements  2nd  3rd 

    elseif clause with if statements  2nd  3rd  4th 

    if statements  2nd 

        else clause with  2nd  3rd 

        elseif clause with  2nd  3rd  4th 

        example of  2nd 

        switch, compared 

    loops 

        breaking out of  2nd  3rd  4th  5th 

        do, while statement  2nd 

        for statement  2nd  3rd  4th 

        iterations, skipping  2nd  3rd 

        nesting  2nd  3rd 

        while statement  2nd  3rd  4th 

    switch statements  2nd  3rd 

        example 

        if, compared 

confidentiality

    communications

        security 

    SSL protocols  2nd  3rd 

        public key cryptography 

confidnetiality

    symmetric cryptography (SSL protocols)  2nd 

config script

    OpenSSL library

        installing 

config.log file 

config.status file 

configuration files  2nd  3rd  4th  5th 

    Apache

        starting 

    conditional containers  2nd 

    directive containers 

    directives 

    Listen directive 

    modifying 

    my-huge.cnf 

    my-large.cnf 

    my-medium.cnf 

    my-small.cnf 

    parameters 

    per-directory  2nd 

    per-directory configuration files

        file system access (scalability) 

    processing

        MPMs 

    ServerName directive 

    ServerRoot directive 

configure command 

configure script  2nd  3rd 

configure scripts

    makefiles 

    software

        configuring 

    targets 

configuring

    MySQL  2nd  3rd  4th 

    PHP  2nd  3rd  4th  5th 

    software (Apache installations) 

    SSL

        servers;starting 

    SSL (secure servers) 

connection timeout variable 

connections

    MySQL

        securing  2nd  3rd 

    SSL protocols  2nd 

    to MySQL with PHP 

        error messages, retrieving  2nd 

        queries, executing  2nd  3rd  4th  5th 

        using mysql connection() functin  2nd  3rd  4th 

connections status variable 

constants

    case-independence  2nd 

    defining  2nd  3rd 

    predefined 

constructors

    defined 

containers

    <Limit>

        HTTP methods (limiting access) 

    <LimitExcept>

        HTTP methods (limiting access) 

    conditional containers

        configuration files  2nd 

    defined 

    VirtualHost container

        IP-based virtual hosting 

containers (directives)

    configuration files 

    syntax  2nd 

content negotiation

    file system access (scalability) 

context

    schemas

        directives 

continue statements  2nd  3rd 

control

    access control

        access (restricting)  2nd  3rd  4th 

        rules  2nd 

        rules (all clients) 

        rules (domain names) 

        rules (environment variables) 

        rules (evaluating)  2nd 

control access

    rules

        IP addresses 

        IP addresses (partial) 

        network/mask pair 

Control Apache command (Start menu) 

control script

    commands 

control statements

    code block

        brackets 

controlling

    Apache

        Windows (commands) 

CONV() function 

conversion specification  2nd  3rd  4th  5th  6th 

cookies

    anatomy  2nd 

    auth cookie 

    auth cookies  2nd 

    defined 

    deleting 

    setting  2nd  3rd 

    values

        restricting access based on  2nd  3rd  4th  5th  6th  7th  8th 

CPU

    MySQL optimizatips 

CREATE command 

create function() function  2nd  3rd  4th  5th 

CREATE TABLE command  2nd  3rd  4th 

creating

    certificate signing requests (managing certificates)  2nd 

    key pairs (managing certificates) 

    request logs 

    tables

        CREATE TABLE command  2nd  3rd  4th 

        CROSS JOIN command 

        DELETE command  2nd  3rd  4th  5th  6th 

        INNER JOIN command 

        INSERT command  2nd  3rd  4th  5th  6th  7th  8th 

        JOIN command 

        LEFT JOIN command  2nd 

        LIKE operator 

        LIMIT command  2nd  3rd  4th 

        NATURAL JOIN command 

        REPLACE command  2nd  3rd  4th 

        RIGHT JOIN command 

        SELECT command  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 

        STRAIGHT JOIN command 

        UPDATE command  2nd  3rd  4th  5th  6th  7th  8th  9th 

        WHERE clause  2nd  3rd 

crit

    LogLevel directive option 

CROSS JOIN command 

cryptograhy

    public key cryptography

        confidentiality (SSL protocols) 

cryptography

    symmetric

        limitations 

    symmetric cryptography

        confidentiality (SSL protocols)  2nd 

CURDATE() function 

CURRENT DATE() function 

current date/time

    retrieving  2nd 

CURRENT TIME() function 

CURRENT TIMESTAMP() function 

CURTIME() function 

custom installation

    Apache (Windows) 

Custom installation option 

custom logs 

    database tables

        code snippet  2nd  3rd 

        sample reports  2nd  3rd  4th  5th  6th 

    database tables, creating  2nd 

customizing

    file times 

CustomLog directive  2nd 

CustomLog directives

    conditional logging 

Cygwin source download  2nd 

Категории