S


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sandboxes
    sandbox security [See server sandboxes]
SATTA (Serial Advanced Technology Attachment) speed
scaling with ColdFusion MX 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th
     applications that scale, writing 2nd 3rd 4th
         code organization
         code, avoiding bottlenecks 2nd
         code, efficient
         modularity
     basic planning 2nd 3rd 4th 5th 6th 7th 8th 9th
         failover
         load-balancing options 2nd
         mixed Web application environments
         server and hardware components 2nd 3rd
         session state management
         tiered application architecture 2nd 3rd
         user-request distribution algorithms 2nd
     importance of 2nd
    load-balancing options
         hardware 2nd 3rd
         hardware vs. software 2nd 3rd 4th
     multiple instances 2nd 3rd 4th
     MX and scalability
     scaling with CF MX7 Load Balancing 2nd 3rd 4th 5th
         basics 2nd
         load-balanced clusters, configuring 2nd 3rd 4th
     Web site server, synchronizing 2nd 3rd
scaling with J2EE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
     architecture of CF MX 7 and embedded Java server 2nd 3rd 4th 5th
         J2EE session management 2nd
         scaling with EJBs 2nd
     benefits of 2nd 3rd
     development values 2nd 3rd 4th 5th 6th
         ease of development
         leveraging diverse developer skill sets
         platforms, extending 2nd
         rich internet applications, deploying
         security features of J2EE
         Web site scalability, improving 2nd 3rd 4th
     JVM 2nd 3rd 4th 5th 6th 7th 8th 9th [See also garbage collection]
         fundamentals 2nd 3rd [See also garbage collection]
     scaling with CF and JRun 2nd 3rd
     scaling with other Java application servers 2nd
schemas, XML 2nd 3rd 4th 5th 6th
Schmidt, Marco 2nd
SCOPE attribute (<cfldap>)
screen scraping, defined
scripting, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
     <cfscript> fundamentals 2nd 3rd 4th 5th 6th
         <cfscript> vs. JavaScript 2nd
         <cfscript> vs. tag-based syntax 2nd 3rd 4th
         definition example 2nd
     <cfscript> implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         calling CF functions 2nd
         commenting code
         flow control using 2nd 3rd
         loops 2nd 3rd 4th 5th
         variables, creating and using 2nd
     <cfscript>, exception handling 2nd 3rd
     <cfscript>, user-defined functions 2nd
     problems and solutions 2nd 3rd 4th
         quotes (') 2nd
         { } symbols 2nd
scripting, JavaScript 2nd
Scriptprotect variable/attribute values
search filters (<cfldap>) 2nd
SECONDARY strength parameter
SECURE attribute (<cfldap>)
Secure Sockets Layer (SSL) on servers, enabling 2nd 3rd 4th 5th 6th 7th 8th
     Apache HTTP Server 2nd
     authentication and
     Distributed mode, securing CF in
     IIS 2nd 3rd
     overview
     page requests and
     SSL liabilities
     Sun ONE Web Server (IWS) 2nd 3rd 4th
security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th
     Admin API 2nd 3rd 4th 5th 6th 7th
         securing Admin API 2nd
         securing façade component 2nd 3rd 4th
         security risks
         ServiceFactory object 2nd
     authentication and authorization 2nd
     browser validation 2nd 3rd 4th 5th 6th 7th
         data validation techniques 2nd
         file uploads 2nd
         form and URL hacks
         XSS 2nd 3rd
     CFCs 2nd 3rd 4th 5th 6th 7th
         access control 2nd 3rd 4th
         role-based security in 2nd 3rd 4th
     encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
         CF encryption functions 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
         cleartext risks [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
         Encrypt( ) and Decrypt functions 2nd 3rd 4th 5th 6th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
         Hash( ) function 2nd 3rd 4th 5th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
         third-party JCE providers, installing 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling]
     J2EE
     security risks 2nd 3rd
     Web services
security options, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th
     operating systems 2nd 3rd 4th
         Unix and Linux 2nd
         Windows 2003 and XP 2nd
     security framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th [See also user security]
         development security 2nd [See also user security]
         login example, CF 2nd 3rd 4th [See also user security]
         Login Wizard example 2nd 3rd 4th 5th [See also user security]
         Login Wizard extension 2nd 3rd 4th 5th 6th [See also user security]
     Sun ONE 2nd 3rd 4th 5th 6th
     Web servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server]
         IIS 2nd 3rd 4th 5th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server]
Security Wizard 2nd
security, in shared and hosted environments 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th
     CFIDE directory, disabling 2nd 3rd
    ColdFusion
         encrypting CF templates
         running as user 2nd
         sandbox 2nd
     custom tag paths 2nd
     default document, adding
     error messages, handling
     example applications, removing
     filename extensions 2nd
     Flash Remoting integration 2nd 3rd
     help docs, removing
     IP restrictions, debugging 2nd
     JSP, disabling functionality
     multiple hosts, configuring CF for 2nd 3rd 4th 5th
         CF extensions, adding 2nd
         IIS 5.x/6.0 configuration changes 2nd
         JRun Connector ISAPI filter 2nd
         JRunScripts virtual directory 2nd
         Sun ONE/iPlanet servers, configuring 2nd
     multiple server configurations 2nd 3rd
     RDS, securing 2nd 3rd
     security Web sites
     session timeout values, limiting
     shared environments security risks 2nd 3rd
security.cfc, (Admin API component)
SeedGenerator errors
semicolons (;
     <cfscript> and 2nd
     entity references and
SendGatewayMessage( ) function
Serial Advanced Technology Attachment (SATA) speed
serial numbers in J2EE archive definitions
serializing
     defined 2nd
     serializing/deserializing complex data 2nd 3rd 4th
     WDDX.DTD file, serialization model
     WddxSerializer, serializing packets with (JavaScript) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
server sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
     applications, creating and securing with sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         configuring sandboxes 2nd 3rd 4th 5th 6th
         sandbox security, enabling 2nd 3rd
         sandboxes, adding 2nd
     Blackbox sandbox example 2nd
     fundamentals 2nd 3rd 4th
         file and directory permissions 2nd
         security changes, CF MX 2nd
server-side form validation 2nd
server-side HTTP and FTP [See HTTP and FTP, server-side]
Server.log file
serverinstance.cfc, (Admin API component)
servers
    application servers [See Web servers, Linux;CF security options for, application servers]
    database servers
        clustered design [See Web servers, Linux;CF security options for]
        using RAID Level 5 configuration on [See Web servers, Linux;CF security options for]
    dual-homed servers [See Web servers, Linux;CF security options for]
    front-end vs. back-end servers [See Web servers, Linux;CF security options for]
    interaction with intelligent agents [See Web servers, Linux;CF security options for]
    multiserver configuration [See Web servers, Linux;CF security options for]
    production servers, disabling RDS on [See Web servers, Linux;CF security options for]
    public LDAP servers, querying [See Web servers, Linux;CF security options for]
    security, multiple server configurations [See Web servers, Linux;CF security options for]
    server components [See Web servers, Linux;CF security options for]
    server heartbeat, defined [See Web servers, Linux;CF security options for]
    server load [See Web servers, Linux;CF security options for]
    server-based load balancers [See Web servers, Linux;CF security options for]
    Web servers
        clustered design [See Web servers, Linux;CF security options for]
        load-balanced Web-server clusters, building [See Web servers, Linux;CF security options for]
        security [See Web servers, Linux;CF security options for]
    Web site servers, synchronizing [See Web servers, Linux;CF security options for]
service adapters, and Flash Remoting
service-level agreement (SLA), and Web hosting
ServiceFactory object 2nd
ServletRequest class
servlets [See Java servlets]
Session scope
     using to store login information
     variables, and CFLOGIN
session state, managing in clusters 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th
     history of managing state 2nd
     options for managing session state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th
         CLIENT variable repository 2nd 3rd 4th 5th
         cookies, for maintaining state 2nd 3rd 4th
         hybrid solutions
         J2EE and 2nd 3rd 4th
         parameters, embedding in URL or FORM posts 2nd
         server-side variables 2nd
         SESSION variables vs. CLIENT variables 2nd 3rd
         users, keeping on same machine
     reasons for maintaining state 2nd
     session state described
     sticky load balancing and
SESSION variables
     locales and
     vs. CLIENT variables 2nd 3rd
SESSION.cfauthorization variable
sessions
     session replication
     session timeout values, limiting
     session-aware load balancing 2nd
     SMS and
setPermitMode( ) helper
SGML (Standardized Generalized Markup Language)
shared environments security [See security]
shared variables
     case-sensitivity and
     data types and 2nd
     multifaceted values and
short form notation (XML)
Short Message Peer to Peer (SMPP) 2nd
Short Message Service (SMS), and Instant Messaging (IM) [See Instant Messaging (IM)]
Simple Object Access Protocol (SOAP)
     defined 2nd
     requests 2nd 3rd
     XML Web Services and
simpleauth method 2nd
SimpleCreditRating CFC 2nd
Site-Minder
Site-wide Error Handler
skin attribute (<cfform>) 2nd
skins
     CFML 2nd
     XSL
SLA (service-level agreement), and Web hosting
SMPP (Short Message Peer to Peer) 2nd
SMS. , [See Instant Messaging (IM]
sn.exe command-line utility 2nd
SOAP [See Simple Object Access Protocol (SOAP]
software
     deployment software, and Web site servers
     J-Integra
    load balancing and
         hardware- vs. software-based load balancing 2nd 3rd 4th
         software-based load balancing 2nd 3rd
Solaris, os performance monitoring 2nd
solicit - response Web service
Solicitation operation types
spaces, eden and survivor, defined
special characters
     in XML 2nd 3rd
speed of hard disk drive
SQL
     injection
     poisoning
SSL [See Secure Sockets Layer (SSL) on servers, passwords;enabling]
stand-alone installation option
stand-alone Web server problems 2nd
Standardized Generalized Markup Language (SGML)
stateless and stateful session Beans 2nd
statements
     break statement 2nd 3rd
     continue statement 2nd
    JavaScript
         basic
         creating functions
         for error handling 2nd
         for looping 2nd
stickiness
     locale stickiness 2nd
     sticky load balancing 2nd 3rd
     sticky option (session state)
     Sticky Sessions option
stopOnError attribute (<cfftp>) 2nd
strength parameter
stress testing, defined
string anchors 2nd 3rd 4th 5th
String parameter
     Encrypt( ) and Decrypt( ) functions
     Hash( ) function
strings
     passing to JavaScript 2nd 3rd
     WDDX.DTD file and 2nd
struct data type 2nd 3rd
StructClear (Session)
structure and array functions (XML) 2nd
structures
     passing to JavaScript as objects 2nd
     WDDX.DTD file
subexpressions 2nd 3rd 4th
SUBTREE scope (<cfldap>)
SummaryProperties object properties
Sun
     Sun Application Server, and multiple instances
     Visual GC garbage collection tool
Sun ONE
    application server
         Application Server 6.5 installation option
         as Java application server
     load balancing options
    Web server
         configuring sandboxes 2nd
         security options 2nd 3rd 4th 5th 6th
         SSL and 2nd 3rd 4th
survivor spaces, defined
SWITCH - CASE blocks
switch-case
     <cfscript> vs. tag-based syntax
     constructs 2nd
Symantec's Ghost, mirroring software 2nd
syndication model, Web services
system performance, monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th
     active monitoring, . ) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th [See also Performance Monitor (perfmon]
         os monitoring 2nd [See also Performance Monitor (perfmon]
         probes 2nd 3rd 4th [See also Performance Monitor (perfmon]
     CF MX 7 server 2nd 3rd 4th 5th 6th 7th
         baselines 2nd
         CF log files 2nd 3rd
         historical analysis
         logs and JRun 2nd 3rd
         Web server log files 2nd
     JVM 2nd 3rd 4th
     performance problems and bottlenecks 2nd 3rd
     Unix and Linux servers 2nd 3rd 4th



Advanced Macromedia ColdFusion MX 7 Application Development
Advanced Macromedia ColdFusion MX 7 Application Development
ISBN: 0321292693
EAN: 2147483647
Year: 2006
Pages: 240
Authors: Ben Forta, et al

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net