Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] sandboxes sandbox security [See server sandboxes] SATTA (Serial Advanced Technology Attachment) speed scaling with ColdFusion MX 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th applications that scale, writing 2nd 3rd 4th code organization code, avoiding bottlenecks 2nd code, efficient modularity basic planning 2nd 3rd 4th 5th 6th 7th 8th 9th failover load-balancing options 2nd mixed Web application environments server and hardware components 2nd 3rd session state management tiered application architecture 2nd 3rd user-request distribution algorithms 2nd importance of 2nd load-balancing options hardware 2nd 3rd hardware vs. software 2nd 3rd 4th multiple instances 2nd 3rd 4th MX and scalability scaling with CF MX7 Load Balancing 2nd 3rd 4th 5th basics 2nd load-balanced clusters, configuring 2nd 3rd 4th Web site server, synchronizing 2nd 3rd scaling with J2EE 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th architecture of CF MX 7 and embedded Java server 2nd 3rd 4th 5th J2EE session management 2nd scaling with EJBs 2nd benefits of 2nd 3rd development values 2nd 3rd 4th 5th 6th ease of development leveraging diverse developer skill sets platforms, extending 2nd rich internet applications, deploying security features of J2EE Web site scalability, improving 2nd 3rd 4th JVM 2nd 3rd 4th 5th 6th 7th 8th 9th [See also garbage collection] fundamentals 2nd 3rd [See also garbage collection] scaling with CF and JRun 2nd 3rd scaling with other Java application servers 2nd schemas, XML 2nd 3rd 4th 5th 6th Schmidt, Marco 2nd SCOPE attribute (<cfldap>) screen scraping, defined scripting, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st <cfscript> fundamentals 2nd 3rd 4th 5th 6th <cfscript> vs. JavaScript 2nd <cfscript> vs. tag-based syntax 2nd 3rd 4th definition example 2nd <cfscript> implementation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th calling CF functions 2nd commenting code flow control using 2nd 3rd loops 2nd 3rd 4th 5th variables, creating and using 2nd <cfscript>, exception handling 2nd 3rd <cfscript>, user-defined functions 2nd problems and solutions 2nd 3rd 4th quotes (') 2nd { } symbols 2nd scripting, JavaScript 2nd Scriptprotect variable/attribute values search filters (<cfldap>) 2nd SECONDARY strength parameter SECURE attribute (<cfldap>) Secure Sockets Layer (SSL) on servers, enabling 2nd 3rd 4th 5th 6th 7th 8th Apache HTTP Server 2nd authentication and Distributed mode, securing CF in IIS 2nd 3rd overview page requests and SSL liabilities Sun ONE Web Server (IWS) 2nd 3rd 4th security 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th Admin API 2nd 3rd 4th 5th 6th 7th securing Admin API 2nd securing façade component 2nd 3rd 4th security risks ServiceFactory object 2nd authentication and authorization 2nd browser validation 2nd 3rd 4th 5th 6th 7th data validation techniques 2nd file uploads 2nd form and URL hacks XSS 2nd 3rd CFCs 2nd 3rd 4th 5th 6th 7th access control 2nd 3rd 4th role-based security in 2nd 3rd 4th encryption 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] CF encryption functions 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] cleartext risks [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] Encrypt( ) and Decrypt functions 2nd 3rd 4th 5th 6th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] Hash( ) function 2nd 3rd 4th 5th [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] third-party JCE providers, installing 2nd [See also Secure Sockets Layer (SSL) on servers, passwords;enabling] J2EE security risks 2nd 3rd Web services security options, ColdFusion 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th operating systems 2nd 3rd 4th Unix and Linux 2nd Windows 2003 and XP 2nd security framework 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th [See also user security] development security 2nd [See also user security] login example, CF 2nd 3rd 4th [See also user security] Login Wizard example 2nd 3rd 4th 5th [See also user security] Login Wizard extension 2nd 3rd 4th 5th 6th [See also user security] Sun ONE 2nd 3rd 4th 5th 6th Web servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server] IIS 2nd 3rd 4th 5th [See also Apache HTTP Server security, Secure Sockets Layer (SSL) on servers, enabling;Apache HTTP server] Security Wizard 2nd security, in shared and hosted environments 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th CFIDE directory, disabling 2nd 3rd ColdFusion encrypting CF templates running as user 2nd sandbox 2nd custom tag paths 2nd default document, adding error messages, handling example applications, removing filename extensions 2nd Flash Remoting integration 2nd 3rd help docs, removing IP restrictions, debugging 2nd JSP, disabling functionality multiple hosts, configuring CF for 2nd 3rd 4th 5th CF extensions, adding 2nd IIS 5.x/6.0 configuration changes 2nd JRun Connector ISAPI filter 2nd JRunScripts virtual directory 2nd Sun ONE/iPlanet servers, configuring 2nd multiple server configurations 2nd 3rd RDS, securing 2nd 3rd security Web sites session timeout values, limiting shared environments security risks 2nd 3rd security.cfc, (Admin API component) SeedGenerator errors semicolons (; <cfscript> and 2nd entity references and SendGatewayMessage( ) function Serial Advanced Technology Attachment (SATA) speed serial numbers in J2EE archive definitions serializing defined 2nd serializing/deserializing complex data 2nd 3rd 4th WDDX.DTD file, serialization model WddxSerializer, serializing packets with (JavaScript) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th server sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th applications, creating and securing with sandboxes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th configuring sandboxes 2nd 3rd 4th 5th 6th sandbox security, enabling 2nd 3rd sandboxes, adding 2nd Blackbox sandbox example 2nd fundamentals 2nd 3rd 4th file and directory permissions 2nd security changes, CF MX 2nd server-side form validation 2nd server-side HTTP and FTP [See HTTP and FTP, server-side] Server.log file serverinstance.cfc, (Admin API component) servers application servers [See Web servers, Linux;CF security options for, application servers] database servers clustered design [See Web servers, Linux;CF security options for] using RAID Level 5 configuration on [See Web servers, Linux;CF security options for] dual-homed servers [See Web servers, Linux;CF security options for] front-end vs. back-end servers [See Web servers, Linux;CF security options for] interaction with intelligent agents [See Web servers, Linux;CF security options for] multiserver configuration [See Web servers, Linux;CF security options for] production servers, disabling RDS on [See Web servers, Linux;CF security options for] public LDAP servers, querying [See Web servers, Linux;CF security options for] security, multiple server configurations [See Web servers, Linux;CF security options for] server components [See Web servers, Linux;CF security options for] server heartbeat, defined [See Web servers, Linux;CF security options for] server load [See Web servers, Linux;CF security options for] server-based load balancers [See Web servers, Linux;CF security options for] Web servers clustered design [See Web servers, Linux;CF security options for] load-balanced Web-server clusters, building [See Web servers, Linux;CF security options for] security [See Web servers, Linux;CF security options for] Web site servers, synchronizing [See Web servers, Linux;CF security options for] service adapters, and Flash Remoting service-level agreement (SLA), and Web hosting ServiceFactory object 2nd ServletRequest class servlets [See Java servlets] Session scope using to store login information variables, and CFLOGIN session state, managing in clusters 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th history of managing state 2nd options for managing session state 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th CLIENT variable repository 2nd 3rd 4th 5th cookies, for maintaining state 2nd 3rd 4th hybrid solutions J2EE and 2nd 3rd 4th parameters, embedding in URL or FORM posts 2nd server-side variables 2nd SESSION variables vs. CLIENT variables 2nd 3rd users, keeping on same machine reasons for maintaining state 2nd session state described sticky load balancing and SESSION variables locales and vs. CLIENT variables 2nd 3rd SESSION.cfauthorization variable sessions session replication session timeout values, limiting session-aware load balancing 2nd SMS and setPermitMode( ) helper SGML (Standardized Generalized Markup Language) shared environments security [See security] shared variables case-sensitivity and data types and 2nd multifaceted values and short form notation (XML) Short Message Peer to Peer (SMPP) 2nd Short Message Service (SMS), and Instant Messaging (IM) [See Instant Messaging (IM)] Simple Object Access Protocol (SOAP) defined 2nd requests 2nd 3rd XML Web Services and simpleauth method 2nd SimpleCreditRating CFC 2nd Site-Minder Site-wide Error Handler skin attribute (<cfform>) 2nd skins CFML 2nd XSL SLA (service-level agreement), and Web hosting SMPP (Short Message Peer to Peer) 2nd SMS. , [See Instant Messaging (IM] sn.exe command-line utility 2nd SOAP [See Simple Object Access Protocol (SOAP] software deployment software, and Web site servers J-Integra load balancing and hardware- vs. software-based load balancing 2nd 3rd 4th software-based load balancing 2nd 3rd Solaris, os performance monitoring 2nd solicit - response Web service Solicitation operation types spaces, eden and survivor, defined special characters in XML 2nd 3rd speed of hard disk drive SQL injection poisoning SSL [See Secure Sockets Layer (SSL) on servers, passwords;enabling] stand-alone installation option stand-alone Web server problems 2nd Standardized Generalized Markup Language (SGML) stateless and stateful session Beans 2nd statements break statement 2nd 3rd continue statement 2nd JavaScript basic creating functions for error handling 2nd for looping 2nd stickiness locale stickiness 2nd sticky load balancing 2nd 3rd sticky option (session state) Sticky Sessions option stopOnError attribute (<cfftp>) 2nd strength parameter stress testing, defined string anchors 2nd 3rd 4th 5th String parameter Encrypt( ) and Decrypt( ) functions Hash( ) function strings passing to JavaScript 2nd 3rd WDDX.DTD file and 2nd struct data type 2nd 3rd StructClear (Session) structure and array functions (XML) 2nd structures passing to JavaScript as objects 2nd WDDX.DTD file subexpressions 2nd 3rd 4th SUBTREE scope (<cfldap>) SummaryProperties object properties Sun Sun Application Server, and multiple instances Visual GC garbage collection tool Sun ONE application server Application Server 6.5 installation option as Java application server load balancing options Web server configuring sandboxes 2nd security options 2nd 3rd 4th 5th 6th SSL and 2nd 3rd 4th survivor spaces, defined SWITCH - CASE blocks switch-case <cfscript> vs. tag-based syntax constructs 2nd Symantec's Ghost, mirroring software 2nd syndication model, Web services system performance, monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th active monitoring, . ) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th [See also Performance Monitor (perfmon] os monitoring 2nd [See also Performance Monitor (perfmon] probes 2nd 3rd 4th [See also Performance Monitor (perfmon] CF MX 7 server 2nd 3rd 4th 5th 6th 7th baselines 2nd CF log files 2nd 3rd historical analysis logs and JRun 2nd 3rd Web server log files 2nd JVM 2nd 3rd 4th performance problems and bottlenecks 2nd 3rd Unix and Linux servers 2nd 3rd 4th |