* Offers fifty practical and secure PHP applications that readers can immediately put to use * Explains the entire life cycle of each PHP application, including requirements, design, development, maintenance, and tuning * Reviews application development line-by-line and module-by-module to help readers understand specific coding practices and requirements * Applications can be readily adapted to many real-world business situations * CD-ROM contains fifty ready-to-use PHP applications, an evaluation version of Zend tools, and the latest versions of PHP, Apache, and MySQLIf the user has the administrative privilege and if she passes a user ID, she can view the access logs of that user as well. run( ) sets Sthis- agt;userID as the passed user ID. ... own logs. ac After setting the userlD, it runs reportDri ver( ), which shows the daily activities of the intended user for the given date. ... log. ac It generates the report using the $LOG_DETAIL_TEMPLATE template and shows it to the user.
|Title||:||Secure PHP Development|
|Author||:||Mohammed J. Kabir|
|Publisher||:||Wiley - 2003-05-09|