Flylib.com
Programming PHP
Programming PHP
ISBN: 1565926102
EAN: 2147483647
Year: 2007
Pages: 168
Authors:
Rasmus Lerdorf
,
Kevin Tatroe
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Audience for This Book
Structure of This Book
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. Introduction to PHP
1.1 What Does PHP Do?
1.2 A Brief History of PHP
1.3 Installing PHP
1.4 A Walk Through PHP
Chapter 2. Language Basics
2.1 Lexical Structure
2.2 Data Types
2.3 Variables
2.4 Expressions and Operators
2.5 Flow-Control Statements
2.6 Including Code
2.7 Embedding PHP in Web Pages
Chapter 3. Functions
3.1 Calling a Function
3.2 Defining a Function
3.3 Variable Scope
3.4 Function Parameters
3.5 Return Values
3.6 Variable Functions
3.7 Anonymous Functions
Chapter 4. Strings
4.1 Quoting String Constants
4.2 Printing Strings
4.3 Accessing Individual Characters
4.4 Cleaning Strings
4.5 Encoding and Escaping
4.6 Comparing Strings
4.7 Manipulating and Searching Strings
4.8 Regular Expressions
4.9 POSIX-Style Regular Expressions
4.10 Perl-Compatible Regular Expressions
Chapter 5. Arrays
5.1 Indexed Versus Associative Arrays
5.2 Identifying Elements of an Array
5.3 Storing Data in Arrays
5.4 Multidimensional Arrays
5.5 Extracting Multiple Values
5.6 Converting Between Arrays and Variables
5.7 Traversing Arrays
5.8 Sorting
5.9 Acting on Entire Arrays
5.10 Using Arrays
Chapter 6. Objects
6.1 Terminology
6.2 Creating an Object
6.3 Accessing Properties and Methods
6.4 Declaring a Class
6.5 Introspection
6.6 Serialization
Chapter 7. Web Techniques
7.1 HTTP Basics
7.2 Variables
7.3 Server Information
7.4 Processing Forms
7.5 Setting Response Headers
7.6 Maintaining State
7.7 SSL
Chapter 8. Databases
8.1 Using PHP to Access a Database
8.2 Relational Databases and SQL
8.3 PEAR DB Basics
8.4 Advanced Database Techniques
8.5 Sample Application
Chapter 9. Graphics
9.1 Embedding an Image in a Page
9.2 The GD Extension
9.3 Basic Graphics Concepts
9.4 Creating and Drawing Images
9.5 Images with Text
9.6 Dynamically Generated Buttons
9.7 Scaling Images
9.8 Color Handling
Chapter 10. PDF
10.1 PDF Extensions
10.2 Documents and Pages
10.3 Text
10.4 Images and Graphics
10.5 Navigation
10.6 Other PDF Features
Chapter 11. XML
11.1 Lightning Guide to XML
11.2 Generating XML
11.3 Parsing XML
11.4 Transforming XML with XSLT
11.5 Web Services
Chapter 12. Security
12.1 Global Variables and Form Data
12.2 Filenames
12.3 File Uploads
12.4 File Permissions
12.5 Concealing PHP Libraries
12.6 PHP Code
12.7 Shell Commands
12.8 Security Redux
Chapter 13. Application Techniques
13.1 Code Libraries
13.2 Templating Systems
13.3 Handling Output
13.4 Error Handling
13.5 Performance Tuning
Chapter 14. Extending PHP
14.1 Architectural Overview
14.2 What You ll Need
14.3 Building Your First Extensions
14.4 The config.m4 File
14.5 Memory Management
14.6 The pvalzval Data Type
14.7 Parameter Handling
14.8 Returning Values
14.9 References
14.10 Global Variables
14.11 Creating Variables
14.12 Extension INI Entries
14.13 Resources
14.14 Where to Go from Here
Chapter 15. PHP on Windows
15.1 Installing and Configuring PHP on Windows
15.2 Writing Portable Code for Windows and Unix
15.3 Interfacing with COM
15.4 Interacting with ODBC Data Sources
Appendix A. Function Reference
A.1 PHP Functions by Category
A.2a Alphabetical Listing of PHP Functions (a-e)
A.2b Alphabetical Listing of PHP Functions (f-i)
A.2c Alphabetical Listing of PHP Functions (j-q)
A.3d Alphabetical Listing of PHP Functions (r-z)
Appendix B. Extension Overview
B.1 Optional Extensions Listing
Colophone
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Y
Programming PHP
ISBN: 1565926102
EAN: 2147483647
Year: 2007
Pages: 168
Authors:
Rasmus Lerdorf
,
Kevin Tatroe
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
Appendix B Algorithms Provided by the Bouncy Castle Provider
Network Security Architectures
Avoid Security Through Obscurity
Designing Your Security System
NetGamesRUs.com
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 300: Wiring Methods
Article 320 Armored Cable Type AC
Article 340 Underground Feeder and Branch-Circuit Cable Type UF
Article 350 Liquidtight Flexible Metal Conduit Type LFMC
Article 440: Air Conditioning and Refrigerating Equipment
File System Forensic Analysis
Booting Process
DOS Partitions
File System Analysis
Content Category
Bibliography
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 1 Readiness Assessment
Phase 4 Performance and Control
Java Concurrency in Practice
Guarding State with Locks
Immutability
Other Liveness Hazards
Example: Comparing Map Performance
Using Condition Queues
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies