Book Image

PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax

By : Yuli Vasiliev
Book Image

PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax

By: Yuli Vasiliev

Overview of this book

Oracle Database gets high marks for performance, reliability, and scalability. Building and deploying your PHP applications on Oracle Database enables you to combine the power and robustness of Oracle and the ease of use, short development time, and high performance of PHP. When used in a complementary way, PHP and Oracle allow you to build high-performance, scalable, and reliable data-driven Web applications with a minimum of effort.When building a PHP/Oracle application, you have two general options. The first is to use an Oracle database just to store data, performing all the operations on that data on the client side; the other is to use the database not only to store data, but also to process it, thus moving data processing to the data. While building the key business logic of a database-driven PHP application inside the database is always a good idea, you should bear in mind that not all of the databases available today allow you to do. The Oracle database, which offers record-breaking performance, scalability, and reliability, does. The partnership of Oracle and the open-source scripting language PHP is an excellent solution for building high-performance, scalable, and reliable data-driven web applications.This 100% practical book is crammed full of easy-to-follow examples. It provides all the tools a PHP/Oracle developer needs to take advantage of the winning combination. It addresses the needs of a wide spectrum of PHP/Oracle developers, placing the emphasis on the most up-to-date topics, such as new PHP and Oracle Database features, stored procedure programming, handling transactions, security, caching, web services, and Ajax.
Table of Contents (16 chapters)
PHP Oracle Web Development
Credits
About the Author
About the Reviewer
Preface

Hashing


It is critical that sensitive data is securely sent over the network. For example, it is always a good idea to transmit user passwords over the network in a secure manner, rather than transmitting them in clear text. One way to achieve this is by using hashing.

Note

Hashing is the process of converting a plaintext string of variable length to a fixed-length string, a hash value, which serves as a digital "fingerprint" of the input string. If two hash values generated with the same hashing algorithm are different, this automatically means that the two input strings are different as well. Hashing is a one-way process—theoretically, it is impossible to determine the original string based on its hash value.

The following sections demonstrate how to add another level of security to the sample application discussed in the preceding sections by hashing user passwords. So, you will see how an existing authentication system can be modified to take advantage of hashing.

Hashing Passwords

Turning...