Muutke küpsiste eelistusi

HTTP Essentials: Protocols for Secure, Scaleable Web Sites [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 336 pages, kõrgus x laius: 235x191 mm, kaal: 567 g, Ill., Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 22-Mar-2001
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471398233
  • ISBN-13: 9780471398233
  • Formaat: Multiple-component retail product, 336 pages, kõrgus x laius: 235x191 mm, kaal: 567 g, Ill., Contains 1 Paperback / softback and 1 CD-ROM
  • Ilmumisaeg: 22-Mar-2001
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 0471398233
  • ISBN-13: 9780471398233
This guide explains the protocol that defines how Web browsers communicate with Web servers, the mechanisms that keep that communication secure, and techniques for accelerating HTTP. Topics include the structure and format of HTTP messages; security technologies such as SSL, TLS, and SHTTP; and how to handle compatibility between HTTP versions. Coverage extends to related technologies such as Proxy Auto Configuration (PAC), Web Proxy Auto Discovery (WPAD), Web Cache Coordination Protocol (WCCP), Internet Cache Protocol (ICP) and Hypertext Caching Protocol (HTCP). The CD-ROM contains the entire text in a searchable Adobe Acrobat file. Annotation c. Book News, Inc., Portland, OR (booknews.com)

The first complete reference guide to the essential Web protocol
As applications and services converge and Web technologies not only assume HTTP but require developers to manipulate it, it is becoming increasingly crucial for network managers, Web masters, and anyone working with HTTP to understand the nuts and bolts of this most prevalent Web protocol. This book provides complete documentation and explanation of the protocol, including advanced and experimental extensions. Readers will get core guidance on implementing HTTP 1.1 in their products, including how to accelerate HTTP in large scale Web sites, how to secure it, and how to handle compatibility issues with versions 0.9 and 1.0. HTTP switching and invisible HTTP operations such as option negotiations, status checks, and path tracing are also examined.
Introduction
1(13)
HTTP and the World Wide Web
2(1)
Protocol Layers
3(6)
Uniform Resource Identifiers
9(1)
Organization of This Book
10(3)
HTTP Operation
13(34)
Clients and Servers
13(6)
Initiating Communication
14(1)
Connections
15(1)
Persistence
15(2)
Pipelining
17(2)
User Operations
19(5)
Web Page Retrieval -- GET
19(1)
Web Forms -- POST
20(2)
File Upload -- PUT
22(1)
File Deletion -- DELETE
23(1)
Behind the Scenes
24(2)
Capabilities -- OPTIONS
24(1)
Status -- HEAD
25(1)
Path -- TRACE
25(1)
Cooperating Servers
26(11)
Virtual Hosts
27(2)
Redirection
29(1)
Proxies, Gateways, and Tunnels
30(3)
Cache Servers
33(2)
Counting and Limiting Page Views
35(2)
Cookies and State Maintenance
37(10)
Cookies
38(3)
Cookie Attributes
41(1)
Accepting Cookies
42(2)
Returning Cookies
44(3)
HTTP Messages
47(82)
The Structure of HTTP Messages
48(5)
HTTP Requests
48(3)
HTTP Responses
51(2)
Header Fields
53(62)
Accept
57(1)
Accept-Charset
58(1)
Accept-Encoding
59(1)
Accept-Language
59(1)
Accept-Ranges
60(1)
Age
61(4)
Allow
65(1)
Authentication-Info
65(1)
Authorization
65(1)
Cache-Control
65(5)
Connection
70(3)
Content-Encoding
73(1)
Content-Language
74(1)
Content-Length
74(1)
Content-Location
75(1)
Content-MD5
76(1)
Content-Range
77(1)
Content-Type
78(1)
Cookie
79(1)
Cookie2
80(1)
Date
80(1)
ETag
81(2)
Expect
83(1)
Expires
84(1)
From
84(1)
Host
85(1)
If-Match
86(2)
If-Modified-Since
88(2)
If-None-Match
90(1)
If-Range
91(1)
If-Unmodified-Since
92(1)
Last-Modified
93(1)
Location
93(1)
Max-Forwards
94(5)
Meter
99(3)
Pragma
102(1)
Proxy-Authenticate
102(1)
Proxy-Authorization
103(1)
Range
103(1)
Referer
103(2)
Retry-After
105(1)
Server
105(1)
Set-Cookie2
106(1)
TE
106(1)
Trailer
107(1)
Transfer-Encoding
108(2)
Upgrade
110(1)
User-Agent
110(1)
Vary
111(1)
Via
112(1)
Warning
113(1)
WWW-Authenticate
114(1)
Status Codes
115(14)
Informational (1xx)
117(2)
Successful (2xx)
119(3)
Redirection (3xx)
122(2)
Client Error (4xx)
124(3)
Server Error (5xx)
127(2)
Securing HTTP
129(48)
Web Authentication
130(26)
Basic Authentication
130(3)
Original Digest Authentication
133(9)
Improved Digest Authentication
142(2)
Protecting Against Replay Attacks
144(1)
Mutual Authentication
145(4)
Protection for Frequent Clients
149(3)
Integrity Protection
152(4)
Secure Sockets Layer
156(12)
SSL and Other Protocols
157(2)
Public Key Cryptography
159(2)
SSL Operation
161(7)
Transport Layer Security
168(4)
Differences from SSL
168(1)
Control of the Protocol
169(1)
Upgrading to TLS within an HTTP Session
169(3)
Secure HTTP
172(5)
Accelerating HTTP
177(52)
Load Balancing
177(9)
Locating Servers
178(2)
Distributing Requests
180(2)
Determining a Target Server
182(4)
Advanced Caching
186(39)
Coaching Implementations
186(8)
Proxy Auto Configuration Scripts
194(3)
Web Proxy Auto-Discovery
197(3)
Web Cache Communication Protocol
200(4)
Network Element Control Protocol
204(8)
Internet Cache Protocol
212(4)
Hyper Text Caching Protocol
216(6)
Cache Array Routing Protocol
222(3)
Other Acceleration Techniques
225(4)
Specialized SSL Processing
225(2)
TCP Multiplexing
227(2)
Appendix A: HTTP Versions 229(12)
A.1 HTTP's Evolution
229(2)
A.2 HTTP Version Differences
231(3)
A.3 HTTP 1.1 Support
234(7)
Appendix B: Building Bullet-Proof Web Sites 241(38)
B.1 The Internet Connection
242(8)
B.1.1 Redundant Links
242(4)
B.1.2 Multi-homing
246(3)
B.1.3 Securing the Perimeter
249(1)
B.2 Systems and Infrastructure
250(5)
B.2.1 Reliability through Mirrored Web Sites
250(1)
B.2.2 Local Load Balancing and Clustering
251(3)
B.2.3 Multi-Layer Security Architectures
254(1)
B.3 Applications
255(11)
B.3.1 Web Application Dynamics
256(1)
B.3.2 Application Servers
257(3)
B.3.3 Database Management Systems
260(5)
B.3.4 Application Security
265(1)
B.3.5 Platform Security
265(1)
B.4 Staying Vigilant
266(8)
B.4.1 External Site Monitoring
266(2)
B.4.2 Internal Network Management
268(2)
B.4.3 Intrusion Detection
270(3)
B.4.4 Maintenance and Upgrade Procedures
273(1)
B.5 The Big Picture
274(5)
B.5.1 Internet Connection
276(1)
B.5.2 Web Systems
276(1)
B.5.3 Applications
276(1)
B.5.4 Database Management System
277(1)
B.5.5 Network Management and Monitoring
277(1)
B.5.3 Intrusion Detection System
277(2)
References 279(4)
General References
279(1)
HTTP Specifications
280(1)
Separate Security Protocols
280(1)
Caching Protocols
281(1)
Previous HTTP Versions
281(2)
Glossary 283(24)
Index 307
STEPHEN THOMAS is cofounder and Chief Technical Officer for TransNexus, a leading provider of Internet e--commerce solutions. A frequent speaker at conferences and trade shows, Thomas has been actively involved in TCP/IP standard development and has coauthored and contributed to numerous Internet RFCs. He has written extensively for technical, trade, and popular audiences and is the author of several books, including, most recently, SSL and TLS Essentials: Securing the Web (Wiley).