Index R

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

r (read)mode 
r format code (date() function) 
RAM disks
    scoreboard files
        file system access (scalability) 
rand switch
    key pairs
        creating (certificates) 
raw headers
    froms  2nd 
RC2
    symmetric cryptography 
RC4
    symmetric cryptography 
read mode 
readdir() function  2nd  3rd 
reading
    directory contents  2nd  3rd 
    files
        arbitrary data amounts  2nd  3rd 
        characters  2nd  3rd 
        lines  2nd  3rd 
README file 
realms
    authentication
        AuthName directive 
recording
    events
        error log 
records
    address book database table example
        record addition script  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        records, adding subentries to  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 
        records, deleting  2nd  3rd  4th  5th 
        records, selecting and viewing  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 
        records, selecting and viewingt 
    inserting  2nd  3rd  4th 
reducing
    transmitted data (performance)  2nd 
reference passing (arguments) 
REFERENCES command 
registering
    multiple session variables  2nd 
relationships 
    many-to-many  2nd  3rd  4th  5th 
    one-to-many  2nd 
    one-to-one  2nd 
RELOAD command 
removing
    privileges  2nd 
REPEAT() function 
REPLACE command  2nd  3rd  4th 
REPLACE() function 
replacing
    string portions  2nd 
    substrings  2nd  3rd 
Reply-to header 
request headers
    name-based virtual hosting (syntax)  2nd 
request logs
    creating 
requests
    client requests
        tracking (access log) 
requests.  [See also HTTP requests]
Require directive
    authentication modules 
require once() function 
require() function  2nd 
resolving
    hostnames(managing logs)  2nd 
resource data type 
restricting
    access
        authentication  2nd 
        authentication modules  2nd  3rd  4th  5th 
        based on cookie values  2nd  3rd  4th  5th  6th  7th  8th 
        client authentication 
    access (access control)  2nd  3rd  4th 
return statements
    function values  2nd  3rd 
reverse DNS lookups
    IP addresses 
REVOKE command  2nd  3rd  4th 
RIGHT JOIN command 
RIGHT() function  2nd 
RLimitCPU directive
    external processes
        operating systems (scalability) 
RLimitMem directive
    external processes
        operating systems (scalability) 
RLimitNProc directive
    external processes
        operating systems (scalability) 
rmdir() function 
robots
    abuse
        preventing 
robots.txt file
    Web spiders (preventing abuse) 
root user 
    non-root users 
    running MySQL as
        stopping 
root users
    MySQL running as 
rotatelogs program
    logs
        rotating (Unix) 
rotatelogs utility
    logging program 
rotatelogs.exe program
    logs
        rotating (Unix) 
rotating
    logs  2nd 
rows
    mysql num rows() function 
RPAD() function 
RPMS
    installing MySQL on Linux.Unix using 
RSA
    public key cryptography 
rtrim() function  2nd  3rd 
RTRIM() function  2nd  3rd  4th 



Sams Teach Yourself PHP, MySQL and Apache in 24 Hours
Sams Teach Yourself PHP, MySQL and Apache in 24 Hours
ISBN: 067232489X
EAN: 2147483647
Year: 2005
Pages: 263

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net