Stories to be told about the YII framework-5 Listings

Source: Internet
Author: User
Tags sql injection attack yii csrf attack

Stories to be told about the YII framework-Basic 1th. Course Objectives
    • 1-1 Course Objectives (00:54)
2nd Chapter Pre-Class knowledge preparation
    • 2-1 Yii Startup and installation (05:12)
    • 2-2 yii Request Processing process (02:44)
    • 2-3 Namespaces (10:46)
3rd Chapter Controller
    • 3-1 creation of the controller (03:22)
    • 3-2 Controller Request processing (05:58)
    • 3-3 Controller Response Processing (09:09)
    • Session Processing of 3-4 Controller (09:25)
    • 3-5 Controller cookie Processing (09:11)
4th Chapter View
    • 4-1 View Creation (04:56)
    • 4-2 views of data passing (04:26)
    • 4-3 View Data Security (03:29)
    • 4-4 View layout file (05:41)
    • 4-5 View displays another view in the View (03:58)
    • 4-6 View data block (06:25)
The 5th Chapter data Model
    • 5-1 database configuration of the data Model (04:46)
    • 5-2 creation of the activity record for the data Model (02:42)
    • 5-3 Data Model Single-table query (21:09)
    • 5-4 Single-table deletion of the data Model (03:17)
    • 5-5 Data Model single table add data (07:45)
    • 5-6 Single-table data modification of the data Model (03:20)
    • 5-7 Data Model related queries (20:54)
    • 5-8 data Model related query performance issues (06:01)
The 6th chapter of the course summary
    • Recent Learning 6-1 Basic Summary (02:32)
Stories to be told about the YII framework-security 1th. Course Outline
    • 1-1 about Security (00:50)
2nd Chapter The storage of XSS attacks and precautions
    • Introduction to 2-1 XSS attacks (02:56)
    • 2-2 XSS Attack Theft Code (02:44)
    • 2-3 XSS attack Get Cookie (01:48)
    • 2-4 the theft of XSS attacks (02:25)
    • 2-5 XSS Attack Search Login Cookie (09:38)
    • 2-6 XSS attack HttpOnly (03:29)
    • 2-7 illegal transfer of XSS attacks (02:09)
    • 2-8 XSS Attack Transfer code (05:05)
    • 2-9 XSS attack after the station injection (01:53)
3rd chapter on XSS Attack and prevention reflection
    • 3-1 XSS Attack-reflective XSS (02:22)
    • 3-2 XSS attack Browser filtering (02:38)
    • 3-3 XSS attack Transfer link (04:51)
    • 3-4 XSS Attack Transfer Code reflection (03:03)
    • 3-5 XSS Attack Code jailbreak (04:16)
    • HTML entity encoding for 3-6 XSS attacks (06:31)
    • 3-7 URL encoding for XSS attacks (07:34)
    • A reflective attack scenario for 3-8 XSS attacks (06:28)
4th. XSS Attack and prevention of Worms
    • XSS worm 4-1 XSS attack (01:33)
    • 4-2 XSS attack Sina Weibo XSS worm (03:38)
    • 4-3 Prevention of XSS attacks (06:35)
    • Filtering precautions for 4-4 XSS attacks (06:46)
5th Chapter CSRF Attack and precaution
    • 5-1 csrf Attack (03:36)
    • 5-2 CSRF attack Post-attack (06:22)
    • Prevention of 5-3 CSRF attack (04:06)
    • 5-4 CSRF Attack of Yii authentication method (09:02)
    • 5-5 CSRF attack yii verification process (06:21)
6th Chapter SQL injection and Prevention
    • 6-1 SQL injection Attack mode (24:17)
    • Recent learning 6-2 SQL injection to Yii (10:43)

Stories to be told about the YII framework-tools The 1th chapter of the course introduction
    • 1-1 Course Brief (01:16)
2nd Chapter Composer Tools
    • 2-1 about composer (05:02)
    • 2-2 composer require command (05:34)
    • 2-3 Composer's Install command (03:57)
    • 2-4 composer Create-project command (05:02)
    • Mirror of 2-5 composer (03:29)
3rd Chapter Debug Tool
    • 3-1 about the Debug tool (01:10)
    • 3-2 Debug Tool positioning problem (07:56)
    • 3-3 Debug Tool Detection Performance (03:49)
Chapter 4th GII Tools
    • 4-1 about the GII tools (01:00)
    • 4-2 GII Tools Application Scenario (10:04)
    • 4-3 gii Tools Curd (10:08)
    • 4-4 GII Tools Widgets (05:18)
    • 4-5 the Form Builder for the GII tool (11:56)
The 5th chapter of the course summary
    • Recent Studies 5-1 Lessons Summary (02:13)
Stories to be told about the YII framework-efficient 1th. Course Objectives
    • 1-1 Course Introduction (01:11)
the 2nd chapter of Yii delay loading
    • Delay loading of Class 2-1 (14:28)
    • mapping table mechanism for class 2-2 (07:00)
    • 2-3 Delay loading of components (04:08)
Chapter 3rd use of data caches
    • 3-1 data cache increase and deletion check (07:30)
    • 3-2 Cache data Expiration settings (02:14)
    • Learn more about dependency relationships in the 3-3 data cache (11:12)
Chapter 4th use of fragment caching
    • 4-1 Fragment Cache Introduction (04:45)
    • 4-2 fragment Cache Settings (05:08)
    • 4-3 Fragment Cache nesting (03:38)
5th use of page caching
    • 5-1 page Cache (09:09)
6th. Use of HTTP caching
    • 6-1 HTTP Cache Introduction (06:30)
    • 6-2 HTTP Cache location (06:24)
    • 6-3 cache time of HTTP cache (04:49)
    • 6-4 http Cache lastmodified (04:51)
    • 6-5 http Cache ETag (05:30)
    • 6-6 HTTP Cache Instance (08:51)
7th. Introduction to GII Tools
    • 7-1 GII Tools Brief (04:36)
    • 7-2 the use of the Model builder for the GII tool (05:18)
    • 7-3 The Model Builder code Implementation of the GII tool (13:11)
    • 7-4 The data model configuration for the GII tool (07:16)
    • 7-5 GII Tools Controller Builder (06:27)
The 8th chapter of efficient Summary
    • 8-1 Summary (02:21)

Stories to be told about the YII framework-extensions Introduction to the 1th Chapter
    • 1-1 Course Brief (01:48)
The 2nd Chapter of Modular Technology
    • 2-1 Modular Design (04:28)
    • Modular implementation of 2-2 Yii (20:32)
Chapter 3rd event mechanism Technology
    • 3-1 event Mechanism (06:08)
    • How to use 3-2 Yii event (31:42)
4th Chapter Mixin Technology
    • 4-1 about Mixin (02:39)
    • 4-2 yii Behavior and other mixes (10:05)
    • Recently studied 4-3 Yii behavior Object Mix (05:11)
Chapter 5th Dependency Injection
    • 5-1 yii Dependency Injection (06:07)
    • 5-2 yii Dependency Injection container (11:53)
    • 5-3 yii Dependency Injection Service locator (08:17)
The 6th Chapter summarizes
    • 6-1 Course Summary (02:34)



Stories to be told about the YII framework-5 Listings

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.