Приглашаем посетить
Кулинария (cook-lib.ru)

D

Previous
Table of Contents
Next


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

daemons
     exclusivity
     privileges 2nd
     working directories 2nd
     writing 2nd
Daiquiri load generator 2nd
data
    binary
         strings
     computational reuse 2nd
         arrays 2nd
         between requests 2nd 3rd 4th 5th 6th 7th
         Fibonacci Squences 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         inside requests 2nd 3rd 4th 5th 6th
         PCREs (Perl Compatible Regular Expressions) 2nd
    displaying
         Smarty 2nd
     maliciously altered 2nd
         cross-site scripting attacks 2nd
     trash data 2nd 3rd 4th
data components
     recognizing for cache 2nd
data extraction
     arrays 2nd
data randomization
     iterations 2nd
data sanitization 2nd
data structures
    global
         classes 2nd 3rd 4th
data types
     union
data validation
     exceptions 2nd 3rd 4th 5th 6th 7th 8th 9th
         maliciously altered 2nd
         SQL injection attacks
         trash data 2nd 3rd 4th
database access patterns 2nd
     Active Record pattern 2nd 3rd 4th 5th
     ad hoc queries 2nd
     Integrated Mapper pattern 2nd 3rd 4th
     Mapper pattern 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
database management system (DBMS)
database objects
     creating via factory methods
database queries
     bandwidth
databases
    accessing
         wrapper classes
     defined
    multiple
         development environments 2nd
     RDBMSs (relational database management systems) 2nd
         database access patterns 2nd
         database access patterns, Active Record pattern 2nd 3rd 4th 5th
         database access patterns, ad hoc queries 2nd
         database access patterns, Integrated Mapper pattern 2nd 3rd 4th
         database access patterns, Mapper pattern 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
         indexes 2nd 3rd 4th 5th
         queries 2nd 3rd 4th 5th
         queries;introspection, EXPLAIN SQL syntax 2nd 3rd 4th 5th
         queries;profiles 2nd 3rd 4th
         tables 2nd 3rd 4th
     scaling 2nd 3rd 4th 5th 6th 7th 8th
         application servers 2nd
         partitioning 2nd 3rd 4th
         RDBMS systems
         replication
         replication, master/master 2nd 3rd
         replication, master/slave 2nd 3rd 4th 5th 6th
     terminology
     tuning
         lazy initiatlization 2nd 3rd 4th 5th 6th
         limiting result sets 2nd 3rd 4th
Dave Winer XML-RPC Web site
DB_Result class 2nd 3rd 4th 5th 6th
DBG profiler
DBM
     libraries 2nd
     licenses
DBM-based caching 2nd 3rd 4th
     concurrency
     expiration 2nd 3rd
     garbage collection 2nd
     invalidation 2nd 3rd 4th
     keys
     lookups 2nd
     maintenance 2nd
     storage 2nd 3rd
     updates 2nd 3rd
DBMS (database management system)
deactivation
     CGI SAPI
dead code elimination
     optimizers
debugging
     ADP (Advanced PHP Debugger)
         caching tables 2nd
         counters 2nd
         culling 2nd 3rd 4th 5th 6th 7th
         inefficiencies 2nd 3rd 4th 5th
         installing 2nd 3rd 4th
         large applications 2nd 3rd 4th 5th 6th 7th 8th 9th
         trace files 2nd 3rd 4th
decentralized cache
     Spread toolkit 2nd 3rd 4th 5th 6th 7th
declaring
     methods
deeply nested loops
     avoiding 2nd
default exception handlers
     installing 2nd 3rd 4th
defensive coding
     data sanitization 2nd
     data validation
     security 2nd
     standard conventions
defining
    constants
         module initialization 2nd
     interfaces 2nd
     wrappers (streams API)
delegation
     OO (object-oriented) programming) 2nd 3rd
description parameter
     ServiceCheck object
design patterns 2nd
     Adapter pattern 2nd 3rd 4th 5th 6th 7th
     Factory pattern 2nd
     interfaces 2nd 3rd 4th 5th 6th
     polymorphism 2nd 3rd 4th
     Singleton pattern 2nd 3rd 4th 5th
     Template pattern 2nd
     type hinting 2nd 3rd 4th 5th 6th
designing clusters 2nd
     cohabitation
         full descriptive names 2nd
         function namespacing 2nd 3rd
         system resource namespacing
     commodity hardware 2nd
designs
     bottom-up
     defensive coding
         data sanitization 2nd
         data validation
         security 2nd
         standard conventions
    refactoring
         coupling 2nd
         method logic 2nd
         namespaces 2nd
         simple methods
     top-down
destroying
     allocated objects
     session handlers
destructing
     objects 2nd
destructors
     creating
development environments
    maintaining
         CVS (Concurrent Versioning System) 2nd 3rd 4th 5th 6th 7th 8th
     multiple databases 2nd
dictionary attacks 2nd
diffs
     CVS (Concurrent Versioning System) 2nd 3rd 4th
     recursive
     time-based
     unified
directives
     ErrorDocument
     max-age
     must-revalidate
     no-cache
     private
     proxy-revalidate
     public
     s-maxage
directories
    working
         dameons 2nd
disconnecting
     Spread client wrapper 2nd
displaying
    data
         Smarty 2nd
displaying errors (error handling) 2nd 3rd 4th 5th
     500 error codes 2nd
distributing content
     clusters 2nd
documentation 2nd
     API (application programming interface) 2nd 3rd 4th
         phpDocumentor project 2nd 3rd 4th 5th 6th
     classes
     functions
     inline comments 2nd 3rd 4th
dynamic extensions
     creating 2nd
dynamic instance properties
dynamically typed languages 2nd 3rd


Previous
Table of Contents
Next