WEB PROXY SERVERS (WEB INFRASTRUCTURE SERIES) By Ari Luotonen **Mint Condition**

WEB PROXY SERVERS (WEB INFRASTRUCTURE SERIES) By Ari Luotonen **Mint Condition**







Características do item

Estado do item: Seminovo Formato: Livro brochura
Idioma: Inglês Ano de publicação: 1997
ISBN:

9780136806127

EAN:

9780136806127

WEB PROXY SERVERS (WEB INFRASTRUCTURE SERIES) By Ari Luotonen **Mint Condition**

Sobre este produto

Product Information
A proxy is a specialized Web server which operates behind a firewall, which makes more efficient use of network bandwidth and offers improved network security. This is the first book on proxy server technology (from setup to tuning tricks) written by one of the developers of the technology.

Product Identifiers
Publisher Prentice Hall PTR
ISBN-10 0136806120
ISBN-13 9780136806127
eBay Product ID (ePID) 1117092

Product Key Features
Format Paperback
Publication Year 1997
Language English

Dimensions
Weight 30.2 Oz
Width 7.1in.
Height 1.2in.
Length 9.3in.

Additional Product Features
Dewey Edition 21
Table of Content I. OVERVIEW OF FIREWALLS AND PROXY SERVERS. 1. Firewall Overview. Terminology. Firewalls. Summary. 2. Overview of Proxy Servers. History of Web Proxy Servers. General Properties of Proxy Servers. Different Types of Proxy Servers. Generic Firewall Proxy Servers. Proxy Chaining. Departmental Proxy Servers. Personal Proxy Servers. Specialized Proxy Servers. Why Proxy Servers are Not Part of Web Servers? Dynamic Content. Summary. 3. Internal Server Architectures. Single-Process Serialized Server Architecture. Forking. Process Mob Architecture. Multithreaded, Single-Process Architecture. Multithreaded, Multiprocess Architecture. Single-Process, Asynchronous I/O Architecture. Mixed Asynchronous I/O with Threads Architecture. Summary. II. PROTOCOLS. 4. The HTTP Protocol. Overall Operation of HTTP. Design Goals of HTTP. HTTP/0.9. HTTP/1.0. The HTTP/1.1 Protocol. HTTP Persistent Connections (Keep-Alive). HTTP Authentication. Virtual Servers. META HTTP-EQUIV. Mime Media Types. HTTP Request Methods. HTTP Headers. HTTP Response Status Codes. Summary. 5. CookiesThe HTTP State Management Protocol. Overall Operation of Cookies. Common Uses of Cookies. Cookies vs. Proxy Cookies. Non-Static Route and Cookies with Encoded IP Address. Summary. 6. ICPThe Internet Cache Protocol. ICP Message Format. ICP Op Codes. ICP Option Flags. Multicast with ICP. Security Considerations. Summary. 7. Handling of Different Protocols by Proxies. Standard Port Numbers. HTTP. FTP. Gopher. News. SSL, HTTPS, and SNEWS. (SSL) Tunneling Protocol. WAIS. LDAP. IIOP. Telnet. Streaming Protocols Based on UDP. Summary. III. CACHING. 8. Caching. Advantages of Caching. Disadvantages of Caching. Conditional Requests. Guaranteeing Freshness of Cached Documents. Cache Hit Ratio. On-Demand Caching. On-Command Caching. Caching of Data Requiring Authentication. Caching Data from Local Hosts. Caching and SSL. Caching Queries. HTTP/1.1 Cache Control Terminology. HTTP/1.1 Cache Control. Summary. 9. Caching and Online Advertising. “Cache Busting”. Alternatives for “Cache Busting”. Copyright Violation by Cache. Summary. 10. Cache Architectures. Components of a Cache Architecture. Existing Cache Architectures. Summary. 11. Garbage Collection. The Idea of Garbage Collection. Cache Garbage Collection. Run-Time Cache Management. Summary. IV. FILTERING, MONITORING, AND ACCESS CONTROL. 12. Filtering. URL Filtering. Content Rating. Censorship on the Internet. Request Header Filtering. Request Content Filtering. Response Header Filtering. Response Content Filtering. Summary. 13. Access Control. Access Control By User Authentication. Access Control By Client Host Address. Summary. 14. Logging and Monitoring. Format of Access Log Files. Log Analyzers. Analyzing Proxy Logs. Determining the Peak Load. Monitoring. Summary. V. SECURITY. 15. Encryption and Authentication Security. Single Key Cryptography. Public Key Cryptography. Authentication with Public Key Cryptography. Message Digest (Hash) Algorithms. The MD5 Algorithm. Certificates. Summary. 16. Setup Security. Server User ID. File Ownerships and Permissions (UNIX). Common Security Holes in Server Software Itself. Access Control Based on Incoming IP Address. Reverse Proxy Security. Firewall Router Configuration. Information Revealed in HTTP Headers. Protocol Verification. Capturing Authentication Credentials. Securing the Logs. Passwords in FTP URLS. Java, JavaScript, and ActiveX Security. File Upload Security. Summary. VI. PERFORMANCE. 17. Performance. DNS Lookups. P
Dewey Decimal 005.7/1376
Illustrated Yes
Series Web Infrastructure
Copyright Date 1998
Author Ari Luotonen
Number of Pages 448 Pages
Lc Classification Number Tk5105.888.L86 1998
Publication Date 1997-12-30
Lccn 97-040619



Price : 19.49

Ends on : Ended

View on eBay

Proxy Servers




Leave a Reply

Your email address will not be published.