Web Proxy Servers (Web Infrastructure Series) by Luotonen Ari

Web Proxy Servers (Web Infrastructure Series) by Luotonen Ari

Características do item

Estado: Bom :

Livro que não tem aparência nova e que já foi lido, mas está em bom estado. Dano mínimo na capa, incluindo marcas ou manchas de uso, mas sem rasgos ou orifícios. No caso de livros de capa dura, pode não incluir a sobrecapa. Desgaste mínimo da encadernação. A maioria das páginas não apresenta danos, há um mínimo de dobras ou desgaste, grifos ou sublinhados a lápis no texto, sem realce no texto, sem nada escrito nas margens. Nenhuma página faltando. Veja no anúncio do vendedor todos os detalhes do item e a descrição de quaisquer imperfeições. Ver todas as definições de estado– abre em uma janela ou guia separada

Notas do vendedor: Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!

Estado do item: Bom Ano de publicação: 1997
Formato: Livro brochura Idioma: Inglês






Web Proxy Servers (Web Infrastructure Series) by Luotonen Ari

Sobre este produto

A proxy is a specialized Web server which operates behind a firewall, which makes more efficient use of network bandwidth and offers improved network security. This is the first book on proxy server technology (from setup to tuning tricks) written by one of the developers of the technology. Make the most of your proxy servers Proxy servers are critical to the success of virtually every large Web and intranet site. But managing and optimizing them has always been a black art – until now. In Web Proxy Servers, the co-developer of the first proxy server, the CERN Proxy, explains the technology in depth – and shows how to optimize any proxy server in any environment. Understand the basic architecture of proxy servers, and compare firewall proxy servers, departmental, personal and specialized proxies. Discover how proxy servers handle every major Internet protocol, including HTTP, FTP, Gopher, News, SSL, WAIS, Telnet and LDAP. Learn how to implement filtering by URLs or PICS content ratings. Review proxy server caching in unprecedented depth, including: * Guaranteeing the freshness of cached documents * Measuring and optimizing cache hit ratios * On-demand and on-command caching * Web-based advertising Discover the best proxy security solutions, including encryption and authentication. Compare proxy server configuration for Web sites, intranets, extranets, and DNS-deprived environments. Get troubleshooting tips and sample auto-configuration scripts. Learn all you need

Product Identifiers
ISBN-10 0136806120
ISBN-13 9780136806127
eBay Product ID (ePID) 1117092

Key Details
Author Ari Luotonen
Number Of Pages 448 pages
Series Web Infrastructure
Format Paperback
Publication Date 1997-12-30
Language English
Publisher Prentice Hall PTR
Publication Year 1997

Additional Details
Copyright Date 1998
Illustrated Yes

Weight 30.2 Oz
Height 1.2 In.
Width 7.1 In.
Length 9.3 In.

Target Audience
Group Scholarly & Professional

Classification Method
LCCN 97-040619
LC Classification Number TK5105.888.L86 1998
Dewey Decimal 005.7/1376
Dewey Edition 21

Table Of Content
I. OVERVIEW OF FIREWALLS AND PROXY SERVERS. 1. Firewall Overview. Terminology. Firewalls. Summary. 2. Overview of Proxy Servers. History of Web Proxy Servers. General Properties of Proxy Servers. Different Types of Proxy Servers. Generic Firewall Proxy Servers. Proxy Chaining. Departmental Proxy Servers. Personal Proxy Servers. Specialized Proxy Servers. Why Proxy Servers are Not Part of Web Servers? Dynamic Content. Summary. 3. Internal Server Architectures. Single-Process Serialized Server Architecture. Forking. Process Mob Architecture. Multithreaded, Single-Process Architecture. Multithreaded, Multiprocess Architecture. Single-Process, Asynchronous I/O Architecture. Mixed Asynchronous I/O with Threads Architecture. Summary. II. PROTOCOLS. 4. The HTTP Protocol. Overall Operation of HTTP. Design Goals of HTTP. HTTP/0.9. HTTP/1.0. The HTTP/1.1 Protocol. HTTP Persistent Connections (Keep-Alive). HTTP Authentication. Virtual Servers. META HTTP-EQUIV. Mime Media Types. HTTP Request Methods. HTTP Headers. HTTP Response Status Codes. Summary. 5. CookiesThe HTTP State Management Protocol. Overall Operation of Cookies. Common Uses of Cookies. Cookies vs. Proxy Cookies. Non-Static Route and Cookies with Encoded IP Address. Summary. 6. ICPThe Internet Cache Protocol. ICP Message Format. ICP Op Codes. ICP Option Flags. Multicast with ICP. Security Considerations. Summary. 7. Handling of Different Protocols by Proxies. Standard Port Numbers. HTTP. FTP. Gopher. News. SSL, HTTPS, and SNEWS. (SSL) Tunneling Protocol. WAIS. LDAP. IIOP. Telnet. Streaming Protocols Based on UDP. Summary. III. CACHING. 8. Caching. Advantages of Caching. Disadvantages of Caching. Conditional Requests. Guaranteeing Freshness of Cached Documents. Cache Hit Ratio. On-Demand Caching. On-Command Caching. Caching of Data Requiring Authentication. Caching Data from Local Hosts. Caching and SSL. Caching Queries. HTTP/1.1 Cache Control Terminology. HTTP/1.1 Cache Control. Summary. 9. Caching and Online Advertising. “Cache Busting”. Alternatives for “Cache Busting”. Copyright Violation by Cache. Summary. 10. Cache Architectures. Components of a Cache Architecture. Existing Cache Architectures. Summary. 11. Garbage Collection. The Idea of Garbage Collection. Cache Garbage Collection. Run-Time Cache Management. Summary. IV. FILTERING, MONITORING, AND ACCESS CONTROL. 12. Filtering. URL Filtering. Content Rating. Censorship on the Internet. Request Header Filtering. Request Content Filtering. Response Header Filtering. Response Content Filtering. Summary. 13. Access Control. Access Control By User Authentication. Access Control By Client Host Address. Summary. 14. Logging and Monitoring. Format of Access Log Files. Log Analyzers. Analyzing Proxy Logs. Determining the Peak Load. Monitoring. Summary. V. SECURITY. 15. Encryption and Authentication Security. Single Key Cryptography. Public Key Cryptography. Authentication with Public Key Cryptography. Message Digest (Hash) Algorithms. The MD5 Algorithm. Certificates. Summary. 16. Setup Security. Server User ID. File Ownerships and Permissions (UNIX). Common Security Holes in Server Software Itself. Access Control Based on Incoming IP Address. Reverse Proxy Security. Firewall Router Configuration. Information Revealed in HTTP Headers. Protocol Verification. Capturing Authentication Credentials. Securing the Logs. Passwords in FTP URLS. Java, JavaScript, and ActiveX Security. File Upload Security. Summary. VI. PERFORMANCE. 17. Performance. DNS Lookups. P

Price : 9.95

Ends on : Ended

View on eBay

Proxy Servers

Leave a Reply

Your email address will not be published.