Research Catalog
Web proxy servers
- Title
- Web proxy servers / Ari Luotonen.
- Author
- Luotonen, Ari.
- Publication
- Upper Saddle River, NJ : Prentice Hall PTR, [1998], ©1998.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | TK5105.888 .L86 1998 | Off-site |
Holdings
Details
- Description
- xvi, 431 pages : illustrations; 24 cm.
- Summary
- Proxy servers are critical to the success of virtually every large Web and intranet site. But managing and optimizing them has always been a black art - until now. In Web Proxy Servers, the co-developer of the first proxy server, the CERN Proxy, explains the technology in depth - and shows how to optimize any proxy server in any environment.
- Understand the basic architecture of proxy servers, and compare firewall proxy servers, departmental, personal, and specialized proxies. Discover how proxy servers handle every major Internet protocol, including HTTP, FTP, Gopher, News, SSL, Telnet, and LDAP. Learn how to implement filtering by URLs or PICS content ratings. Review proxy server caching in unprecedented depth.
- Series Statement
- Prentice-Hall PTR Web infrastructure series
- Uniform Title
- Prentice-Hall PTR Web infrastructure series.
- Subject
- Bibliography (note)
- Includes bibliographical references (p. 419-421) and index.
- Contents
- Pt. 1. Overview of Firewalls and Proxy Servers. 1. Firewall Overview. 2. Overview of Proxy Servers. 3. Internal Server Architectures -- Pt. 2. Protocols. 4. The HTTP Protocol. 5. Cookies - The HTTP State Management Protocol. 6. ICP - The Internet Cache Protocol. 7. Handling of Different Protocols by Proxies -- Pt. 3. Caching. 8. Caching. 9. Caching and Online Advertising. 10. Cache Architectures. 11. Garbage Collection -- Pt. 4. Filtering, Monitoring, and Access Control. 12. Filtering. 13. Access Control. 14. Logging and Monitoring -- Pt. 5. Security. 15. Encryption and Authentication Security. 16. Setup Security -- Pt. 6. Performance. 17. Performance. 18. Capacity Planning. 19. Load Balancing. 20. Reverse Proxying -- Pt. 7. Deployment Scenarios. 21. Case Studies. 22. Trouble-Shooting -- Pt. 8. Appendices -- App. A. Proxy Auto-Configuration Support in Clients -- App. B. Wildcard Expressions -- App. C. Terminology.
- ISBN
- 0136806120 (alk. paper)
- LCCN
- 97040619
- OCLC
- ocm37721377
- Owning Institutions
- Columbia University Libraries