Stories to be told about the YII framework-Basic
1th. Course Objectives
- 1-1 Course Objectives (00:54)
2nd Chapter Pre-Class knowledge preparation
- 2-1 Yii Startup and installation (05:12)
- 2-2 yii Request Processing process (02:44)
- 2-3 Namespaces (10:46)
3rd Chapter Controller
- 3-1 creation of the controller (03:22)
- 3-2 Controller Request processing (05:58)
- 3-3 Controller Response Processing (09:09)
- Session Processing of 3-4 Controller (09:25)
- 3-5 Controller cookie Processing (09:11)
4th Chapter View
- 4-1 View Creation (04:56)
- 4-2 views of data passing (04:26)
- 4-3 View Data Security (03:29)
- 4-4 View layout file (05:41)
- 4-5 View displays another view in the View (03:58)
- 4-6 View data block (06:25)
The
5th Chapter data Model
- 5-1 database configuration of the data Model (04:46)
- 5-2 creation of the activity record for the data Model (02:42)
- 5-3 Data Model Single-table query (21:09)
- 5-4 Single-table deletion of the data Model (03:17)
- 5-5 Data Model single table add data (07:45)
- 5-6 Single-table data modification of the data Model (03:20)
- 5-7 Data Model related queries (20:54)
- 5-8 data Model related query performance issues (06:01)
The
6th chapter of the course summary
- Recent Learning 6-1 Basic Summary (02:32)
Stories to be told about the YII framework-security
1th. Course Outline
- 1-1 about Security (00:50)
2nd Chapter The storage of XSS attacks and precautions
- Introduction to 2-1 XSS attacks (02:56)
- 2-2 XSS Attack Theft Code (02:44)
- 2-3 XSS attack Get Cookie (01:48)
- 2-4 the theft of XSS attacks (02:25)
- 2-5 XSS Attack Search Login Cookie (09:38)
- 2-6 XSS attack HttpOnly (03:29)
- 2-7 illegal transfer of XSS attacks (02:09)
- 2-8 XSS Attack Transfer code (05:05)
- 2-9 XSS attack after the station injection (01:53)
3rd chapter on XSS Attack and prevention reflection
- 3-1 XSS Attack-reflective XSS (02:22)
- 3-2 XSS attack Browser filtering (02:38)
- 3-3 XSS attack Transfer link (04:51)
- 3-4 XSS Attack Transfer Code reflection (03:03)
- 3-5 XSS Attack Code jailbreak (04:16)
- HTML entity encoding for 3-6 XSS attacks (06:31)
- 3-7 URL encoding for XSS attacks (07:34)
- A reflective attack scenario for 3-8 XSS attacks (06:28)
4th. XSS Attack and prevention of Worms
- XSS worm 4-1 XSS attack (01:33)
- 4-2 XSS attack Sina Weibo XSS worm (03:38)
- 4-3 Prevention of XSS attacks (06:35)
- Filtering precautions for 4-4 XSS attacks (06:46)
5th Chapter CSRF Attack and precaution
- 5-1 csrf Attack (03:36)
- 5-2 CSRF attack Post-attack (06:22)
- Prevention of 5-3 CSRF attack (04:06)
- 5-4 CSRF Attack of Yii authentication method (09:02)
- 5-5 CSRF attack yii verification process (06:21)
6th Chapter SQL injection and Prevention
- 6-1 SQL injection Attack mode (24:17)
- Recent learning 6-2 SQL injection to Yii (10:43)
Stories to be told about the YII framework-tools
The 1th chapter of the course introduction
2nd Chapter Composer Tools
- 2-1 about composer (05:02)
- 2-2 composer require command (05:34)
- 2-3 Composer's Install command (03:57)
- 2-4 composer Create-project command (05:02)
- Mirror of 2-5 composer (03:29)
3rd Chapter Debug Tool
- 3-1 about the Debug tool (01:10)
- 3-2 Debug Tool positioning problem (07:56)
- 3-3 Debug Tool Detection Performance (03:49)
Chapter 4th GII Tools
- 4-1 about the GII tools (01:00)
- 4-2 GII Tools Application Scenario (10:04)
- 4-3 gii Tools Curd (10:08)
- 4-4 GII Tools Widgets (05:18)
- 4-5 the Form Builder for the GII tool (11:56)
The
5th chapter of the course summary
- Recent Studies 5-1 Lessons Summary (02:13)
Stories to be told about the YII framework-efficient
1th. Course Objectives
- 1-1 Course Introduction (01:11)
the 2nd chapter of Yii delay loading
- Delay loading of Class 2-1 (14:28)
- mapping table mechanism for class 2-2 (07:00)
- 2-3 Delay loading of components (04:08)
Chapter 3rd use of data caches
- 3-1 data cache increase and deletion check (07:30)
- 3-2 Cache data Expiration settings (02:14)
- Learn more about dependency relationships in the 3-3 data cache (11:12)
Chapter 4th use of fragment caching
- 4-1 Fragment Cache Introduction (04:45)
- 4-2 fragment Cache Settings (05:08)
- 4-3 Fragment Cache nesting (03:38)
5th use of page caching
6th. Use of HTTP caching
- 6-1 HTTP Cache Introduction (06:30)
- 6-2 HTTP Cache location (06:24)
- 6-3 cache time of HTTP cache (04:49)
- 6-4 http Cache lastmodified (04:51)
- 6-5 http Cache ETag (05:30)
- 6-6 HTTP Cache Instance (08:51)
7th. Introduction to GII Tools
- 7-1 GII Tools Brief (04:36)
- 7-2 the use of the Model builder for the GII tool (05:18)
- 7-3 The Model Builder code Implementation of the GII tool (13:11)
- 7-4 The data model configuration for the GII tool (07:16)
- 7-5 GII Tools Controller Builder (06:27)
The
8th chapter of efficient Summary
Stories to be told about the YII framework-extensions
Introduction to the 1th Chapter
The
2nd Chapter of Modular Technology
- 2-1 Modular Design (04:28)
- Modular implementation of 2-2 Yii (20:32)
Chapter 3rd event mechanism Technology
- 3-1 event Mechanism (06:08)
- How to use 3-2 Yii event (31:42)
4th Chapter Mixin Technology
- 4-1 about Mixin (02:39)
- 4-2 yii Behavior and other mixes (10:05)
- Recently studied 4-3 Yii behavior Object Mix (05:11)
Chapter 5th Dependency Injection
- 5-1 yii Dependency Injection (06:07)
- 5-2 yii Dependency Injection container (11:53)
- 5-3 yii Dependency Injection Service locator (08:17)
The
6th Chapter summarizes
- 6-1 Course Summary (02:34)
Stories to be told about the YII framework-5 Listings