Errata
The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted By | Date submitted | Date corrected |
---|---|---|---|---|---|
Other Digital Version |
Kindle Locations 205-206 |
In the first example of PHP code to dynamically display the date, it is VERY easy to mistake the lowercase letter 'L' for the number '1,' so if the reader attempts to recreate the code on their own, it will not display correctly if they type 1 instead of l. A note should be included near the example that points out the distinction to avoid confusion. |
Bill Dorr | Sep 01, 2015 | |
ePub |
chapt 18 example 18-4 |
Example 18-4. Applying different positioning values Note from the Author or Editor: |
Anonymous | Nov 14, 2015 | |
Ch 17 Using XMLHttpRequest section |
Mention is made of an introduction to error handling, using the try…catch construct, supposedly made in the previous chapter (16). In actuality, this construct was mentioned not in that chapter, but in chapter 14, "Expressions and Control Flow in JavaScript”. Note from the Author or Editor: |
Ethan Isenberg | Jun 20, 2017 | ||
Printed | Page 17 Figure 2-1 |
XAMPP website download no longer includes "MySQL", but rather "MariaDB". This may be confusing to readers. MariaDB is a compatible replacement for MySQL Note from the Author or Editor: |
Gerald Tielke | Oct 24, 2015 | |
Page 26 code example on top |
* DOCTYPE-declaration on beginning of HTML is mandatory. |
Jørgen W. Lang | Apr 18, 2015 | ||
Page 28 section "Working remotely" |
Usage of Telnet is highly insecure and should be avoided under all circumstances (except maybe for testing a HTTP connection from the command line). |
Jørgen W. Lang | Apr 18, 2015 | ||
Page 47 very bottom |
The following statement in book: Note from the Author or Editor: |
Grzegorz Szpetkowski | Jan 15, 2016 | ||
Printed, PDF, Other Digital Version | Page 52 Example 3-9 |
In Example 3-9 when running the example exactly as printed in the book the PHP processor produces no output due to a missing statement (echo $out;)at the end of the code before the end of the PHP (?>). Note from the Author or Editor: |
Matthew Lagasse | Jan 19, 2015 | Apr 03, 2015 |
Page 66 last bullet point |
The unary negation operator is ! (an exclamation mark), not a minus sign (-). |
Jørgen W. Lang | Apr 19, 2015 | ||
PDF, ePub, Mobi | Page 68 Above Table 4-2 |
There is an extra space between "prece" and "dence", so the original Note from the Author or Editor: |
Toby Wei | Jan 26, 2015 | Apr 03, 2015 |
Page 89 2nd sentence |
"We’ll look into the file-handling commands in a later chapter,…" |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 89 3rd paragraphs first sentence |
In the book the keyword global (not $_GLOBAL) is defined as way of declaring global variable. |
Anonymous | Jun 26, 2015 | ||
Page 101 example 5-4 caption |
"Returning values from a function by reference" should be |
Jørgen W. Lang | Apr 19, 2015 | ||
Printed | Page 107 Figure 5-3 |
Figure 5-3 text "A jukebox: a great example of a self-contained object". Note from the Author or Editor: |
Stepeh Rynas | Mar 12, 2015 | Apr 03, 2015 |
Page 108 section "Creating an object", 1st sentence |
Missing dollar sign before 'object': |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 108 last sentence |
"A class may require or prohibit arguments; it may also allow arguments but not require them." |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 114 3rd last paragraph |
"…because PHP implicitly declares the variable $object1->name for you." |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 118 1st paragraph, last sentence |
"You achieve this using the extends operator." |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 118 2nd paragraph, last sentence |
"... by means of the extends operator." |
Hosnee Zaman | Feb 28, 2018 | ||
Printed | Page 121 United States |
Post-chapter questions include the seemingly nonsensical sentence "This is a second sentence in the list" after questions 1, 3, 5, and 10. Note from the Author or Editor: |
Bob Reap | Jan 29, 2015 | Apr 03, 2015 |
Page 126 last paragraph |
"…format index => value. " |
Jørgen W. Lang | Apr 19, 2015 | ||
Page 144 warning, last sentence |
Update suggestion: Most computers now support DateTime (are 64-bit capable). |
Jørgen W. Lang | Apr 20, 2015 | ||
Page 145 section "Time specifiers" |
format "G" does not have a leading zero, but "H" does |
Jørgen W. Lang | Apr 20, 2015 | ||
Page 146 example 7-3 |
Text uses February as an example, but sample code uses September. |
Jørgen W. Lang | Apr 20, 2015 | ||
Page 161 3rd line |
The else statement in Example 7-17 is not closed. |
Anonymous | Sep 22, 2016 | ||
Page 170 section "MySQL on a remote server", 1st sentence |
Suggest to change wording to not use Telnet at all, like: |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 175 example 8-3 |
Sample code explicetely uses MyISAM (for later use of fulltext indexes). New standard is InnoDB which also supports fulltext. Code could be simplified. |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 178 table 8-7 1st entry |
BINARY(n) or BYTE(n): |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 181 top heading |
AUTO_INCREMENT is not a data type but an attribute. |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 187 2n last paragraph, 1st sentence |
"And finally, I set no limit to the year column’s index, because it’s an integer, not a string." but "year" is defined as data type CHAR. |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 189 last sentence |
…uses the UPDATE and WHERE keywords… |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 191 Half way |
The book states: "FULLTEXT indexes can be used only with MyISAM tables" Note from the Author or Editor: |
Jasper Kips | Jan 24, 2015 | Apr 03, 2015 | |
Page 192 section "SELECT" 1st paragraph, 2nd last sentence |
"…because all the data will scroll by at an unreadable pace…" Note from the Author or Editor: |
Jørgen W. Lang | Apr 24, 2015 | ||
Page 195 Example 8-21, 2nd SELECT |
isbn="9781598184891 "; |
Jørgen W. Lang | Apr 24, 2015 | ||
PDF, ePub, Mobi | Page 202 Figure 8-17 |
In Figure 8-17, the command to create table "customers" contains a wrong length of the column "isbn", which is supposed to be of 13 characters. In that figure it shows "VARCHAR(128)" in stead of the actual command offered "VARCHAR(13)." Note from the Author or Editor: |
Toby Wei | Jan 26, 2015 | Apr 03, 2015 |
Printed | Page 203 Regno Unito |
Hello, this book is very well done, I have spotted a little error in the Example 8-29 where the command is not consistent with the initial recommendation of the author related to capital letters to distinguish the SQL code from the names of the database tables, columns, and rows names.(page 173, first bullet). Note from the Author or Editor: |
Alessandro Coraglia | Jan 10, 2015 | Apr 03, 2015 |
Printed | Page 228 4th paragraph |
Hello, I am reading every word and doing each of the examples. Wonderful book! Things are clicking in programming where they have never clicked before. |
Andrew Shaw | Dec 26, 2015 | |
Printed | Page 239 Example 10-5 |
Calling data_seek over mysqli_result is unnecessary in these examples. It set the pointer to the same row it's already pointing and may be removed |
Armando Villani | Oct 09, 2018 | |
PDF, ePub, Mobi | Page 244 Bottom of the page (last two lines) |
An extra parenthesis on the right of both $_POST['delete'] and $_POST['author']. Note from the Author or Editor: |
Toby Wei | Jan 26, 2015 | Apr 03, 2015 |
Printed | Page 253 Line 13 |
Code currently reads: Note from the Author or Editor: |
Les Ansley | Jan 15, 2015 | Apr 03, 2015 |
Page 255 Example code |
The code of additional query is as follows: Note from the Author or Editor: |
Piotr Cieślak | Jan 19, 2015 | Apr 03, 2015 | |
Printed | Page 279 3rd paragraph |
Running Example 11-10 a capital A with a tilde on top appears between the $f and $c variable output: Note from the Author or Editor: |
Anonymous | Jan 09, 2016 | |
Printed | Page 281 last paragraph |
"implanted" should be "implemented" (presumably) Note from the Author or Editor: |
Bob Reap | Jan 31, 2015 | Apr 03, 2015 |
Page 294 Last paragraph |
A little bit of purism here, but in the hashing discussion, it is said: |
Anonymous | Apr 17, 2016 | ||
Printed | Page 295 Example 12-3 |
In example 12-3 the "login.php" file that was created earlier in the book is used in the code to create and populate a new table however on line 4 of the example the mysql log-in details are referenced as below: Note from the Author or Editor: |
Tessa Lake | Feb 21, 2015 | Apr 03, 2015 |
Printed | Page 298 4th line under "Using Sessions" heading |
This line says that information about setting hidden fields in a form can be found in Chapter 10. That information is actually in Chapter 11. |
Will Suchan | Mar 14, 2018 | |
Printed | Page 300 Regno Unito |
Hello Robin, Note from the Author or Editor: |
Alessandro Coraglia | Jan 30, 2015 | Apr 03, 2015 |
PDF, ePub, Mobi | Page 314 Bottom of the page |
The example caption of Example 13-7 is showing an error message from Apple Safari console, so the original Note from the Author or Editor: |
Toby Wei | Jan 26, 2015 | Apr 03, 2015 |
PDF, ePub, Mobi | Page 329 2nd paragraph of 2nd section |
There is a multiple word "have" in "You may, however, have have heard that ... " Note from the Author or Editor: |
Toby Wei | Jan 26, 2015 | Apr 03, 2015 |
Page 372 Example 16-1 |
The CSS class .signup is defined but not used. Note from the Author or Editor: |
Alessio Ulzi | Mar 16, 2015 | Apr 03, 2015 | |
Page 375 Example 16-2 |
The function isNaN returns false when an empty string is passed because JavaScript interprets it as a 0. Note from the Author or Editor: |
Alessio Ulzi | Mar 16, 2015 | Apr 03, 2015 | |
Printed | Page 388 Last line of code and continuing on the following page |
This comment applies to both the printed text and to the downloaded file. |
AJB | Feb 12, 2016 | |
Printed | Page 457 Figure 19-2 |
Figure 19-2 is supposed to show an Employee of the Month certificate, as coded in Example 19-1. Instead, it is a picture of browser configuration dialogs. |
Anonymous | Feb 20, 2016 | |
Printed | Page 481 After 1st paragraph of "The C Function" section |
The closing tag of the <div> element is written </fiv> (instead of the correct </div>). Note from the Author or Editor: |
Simo | Mar 28, 2017 | |
PDF, Other Digital Version | Page 547 4th para |
the text mentions the name of the method as filtert |
Ashish Gupta | Sep 01, 2016 | |
Page 594 10th line |
240,20 should be 240,240. |
Yuxin Sun | Oct 02, 2015 | ||
Printed | Page 664 bottom paragraph |
On page 664 of the book, bottom paragraph it reads "See chapter 13 for more details on how to do this", they are referring to hashed passwords. Note from the Author or Editor: |
claudio izzi | Jan 31, 2015 | Apr 03, 2014 |
Printed | Page 695 3rd Answer |
Chapter 8 Answers, Answer 3 states that the password is 'newpassword'. |
Jeff Soussana | May 20, 2018 |