PHP tutorial for beginners
(This article has been translated into Serbo-Croation by Vera Djuraskovic —thanks!) Preface I’m cranky. I complain about a lot of things. PHP: a fractal of bad design - fuzzy notepad
developerWorks : Open source : Technical library
Auth/ACL implementation strategies « Internet Strategy Guide
The posts I’ve been reading and writing recently have reminded me how Object-Relational Mapping ( ORM ) systems make it fun and convenient to interact with databases. For some of the reasons they’re a developer’s favorite, they can be a database administrator’s nightmare (think surrogate keys). But designing tables with a consistent set of columns has its benefits. Just because the columns are meta-data that have no intrinsic meaning doesn’t mean they have no value . In this series of articles I’ll show you several ways to use such “meaningless” meta-data to enable powerful, efficient application-level role-based access control ( RBAC ) in the database, with a focus on web applications, though you could do this for any application. The systems I’ve built are complex, so I’ll split this into at least two articles. How to build role-based access control in SQL at Xaprb
A lightweight approach to ACL - The 33 lines of Magic » Debuggable Ltd Ok, I just finished a terrible (extended) weekend that featured 12 hours of CSS coding. The only reason I didn't loose my sanity was that I finally decided to figure out what the heck is wrong with IE . Those of you who have to do get their hands dirty in the field of graphics, css, and other non-php work from time to time as well, make sure to check out Position is Everything at some point, it really helped me out quite a bit so far. Anyway, that's not really what I want to talk about today. One of the topics I have been very silent about for months is ACL. At the end of May I was somewhat unhappy with some of the things regarding the CakePHP DB ACL implementation.
Datenbank-Verwaltung in einer einzigen PHP-Datei
Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. So let's dive into the world of passwords, and look at what makes a password secure in practical terms.
Here are the 16 chapters and 91 essays that make up the book. Introduction chapter 1 What is Getting Real?