Professional Documents
Culture Documents
A. Syntax
B. Quotes
C. Comments
D. Introduction to Zend Studio
E. PHP Environment
F. Data Types
G. Operator Precedence
A. Variables
B. Constants
C. Arrays
A. Functions
B. File System Basics
A. Database Introduction
3. INTRODUCTION TO PHP
A. Comments
B. Variables and Data Types
C. Constants
D. Strings
E. Quotes
F. Arrays
G. Variable References
H. Scope
4. OPERATORS
A. Operators and Conditional Statements
B. Combining Operators
C. String Operators
D. Comparison Operators
E. Logical Operators
F. Conditionals
G. Switch
5. LOOPING STATEMENTS
A. for
B. while
C. do-while
D. continue
E. break
F. foreach
6. FUNCTION BASICS
A. Types of Functions
B. Calling Functions
C. Declaring Functions
D. Function Inputs
E. Function Outputs
F. Internal Functions
A. PHP Toolkit
A. Bridge Components
PHP Projects
1. PHP SYNTAX REVIEW
A. Quotes
B. Comments
C. Special Characters
D. Data Types
E. Precedence and Definitions
F. Arrays
G. Operators
H. Conditionals and Loops
I. Functions
A. Including Files
B. Globals
C. References
D. File System Basics
3. CONFIGURING PHP
4. REGULAR EXPRESSIONS
A. Server Communication
B. HTTP Headers
C. Output Buffering
D. Browser Caching
F. Cookies
G. Sessions
H. Email
I. Forms
A. Classes
B. Static Context
C. Visibility (PPP)
D. Overriding Functions
E. Interfaces
F. Cloning
G. Namespaces
A. Relational Databases
B. SQL and MySQL
C. Connecting PHP and MySQL
D. PDO
E. Stored Procedures
F. Transactions
A. PHP Basics
B. Functions
C. Data Formats & Types
D. Web Features
E. OOP
F. Security
G. Strings & Patterns
H. Databases
I. Arrays
J. I/O
PHP Security
1. BASIC SECURITY CONCEPTS
A. What is Security
B. Defense in Depth
C. Basic Security Rules
D. Building Secure Web Applications Guidelines
A. SQL InjectionAttacks
B. XSS / XST Injection Attacks
C. Command Injection Attacks
D. Remote Code Injection Attacks
E. XSRF / CSRF Attacks
F. Session Attacks
G. Secure File Uploads
A. Secure Configurations
B. Password Security
C. Sandboxes and Traps
D. Tarpits
E. Obscurity
F. Ajax Implications
G. Filtering Charsets
4. SECURITY RESOURCES, TOOLS, INFRASTUCTURE