Muutke küpsiste eelistusi

HTTP: Understanding Web Internals [Pehme köide]

  • Formaat: Paperback / softback, 658 pages, kõrgus x laius x paksus: 325x180x35 mm, 1, black & white illustrations
  • Sari: Definitive Guide
  • Ilmumisaeg: 05-Nov-2002
  • Kirjastus: O'Reilly Media
  • ISBN-10: 1565925092
  • ISBN-13: 9781565925090
  • Pehme köide
  • Hind: 62,04 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 72,99 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 658 pages, kõrgus x laius x paksus: 325x180x35 mm, 1, black & white illustrations
  • Sari: Definitive Guide
  • Ilmumisaeg: 05-Nov-2002
  • Kirjastus: O'Reilly Media
  • ISBN-10: 1565925092
  • ISBN-13: 9781565925090
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration. While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner. In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection. Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume. There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the "why" and the "how" of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.

Arvustused

"I think this book is an extremely useful, very comprehensive and clearly-written reference to all aspects of the internals of the Web going well beyond just the bare mechanics of HTTP. Even where its huge detail does stop on a topic, there are extensive and useful references for further reading on each topic covered given at the end of nearly every chapter." - John Collins, News@UK, March 2003

Preface xiii
Part I. HTTP: The Web's Foundation
Overview of HTTP
3(20)
HTTP: The Internet's Multimedia Courier
3(1)
Web Clients and Servers
4(1)
Resources
4(4)
Transactions
8(2)
Messages
10(1)
Connections
11(5)
Protocol Versions
16(1)
Architectural Components of the Web
17(4)
The End of the Beginning
21(1)
For More Information
21(2)
URLs and Resources
23(20)
Navigating the Internet's Resources
24(2)
URL Syntax
26(4)
URL Shortcuts
30(5)
Shady Characters
35(3)
A Sea of Schemes
38(2)
The Future
40(1)
For More Information
41(2)
HTTP Messages
43(31)
The Flow of Messages
43(1)
The Parts of a Messages
44(9)
Methods
53(6)
Status Codes
59(8)
Headers
67(6)
For More Information
73(1)
Connection Management
74(35)
TCP Connections
74(6)
TCP Performance Considerations
80(6)
HTTP Connection Handling
86(2)
Parallel Connections
88(2)
Persistent Connections
90(9)
Pipelined Connections
99(2)
The Mysteries of Connection Close
101(3)
For More Information
104(5)
Part II. HTTP Architecture
Web Servers
109(20)
Web Servers Come in All Shapes and Sizes
109(2)
A Minimal Perl Web Server
111(2)
What Real Web Servers Do
113(2)
Step 1: Accepting Client Connections
115(1)
Step 2: Receiving Request Messages
116(4)
Step 3: Processing Requests
120(1)
Step 4: Mapping and Accessing Resources
120(5)
Step 5: Building Responses
125(2)
Step 6: Sending Responses
127(1)
Step 7: Logging
127(1)
For More Information
127(2)
Proxies
129(32)
Web Intermediaries
129(2)
Why Use Proxies?
131(6)
Where Do Proxies Go?
137(4)
Client Proxy Settings
141(3)
Tricky Things About Proxy Requests
144(6)
Tracing Messages
150(6)
Proxy Authentication
156(1)
Proxy Interoperation
157(3)
For More Information
160(1)
Caching
161(36)
Redundant Data Transfers
161(1)
Bandwidth Bottlenecks
161(2)
Flash Crowds
163(1)
Distance Delays
163(1)
Hits and Misses
164(4)
Cache Topologies
168(3)
Cache Processing Steps
171(4)
Keeping Copies Fresh
175(7)
Controlling Cachability
182(4)
Setting Cache Controls
186(1)
Detailed Algorithms
187(7)
Caches and Advertising
194(2)
For More Information
196(1)
Integration Points: Gateways, Tunnels, and Relays
197(18)
Gateways
197(3)
Protocol Gateways
200(3)
Resource Gateways
203(2)
Application Interfaces and Web Services
205(1)
Tunnels
206(6)
Relays
212(1)
For More Information
213(2)
Web Robots
215(32)
Crawlers and Crawling
215(10)
Robotic HTTP
225(3)
Misbehaving Robots
228(1)
Excluding Robots
229(10)
Robot Etiquette
239(3)
Search Engines
242(4)
For More Information
246(1)
HTTP-NG
247(10)
HTTP's Growing Pains
247(1)
HTTP-NG Activity
248(1)
Modularize and Enhance
248(1)
Distributed Objects
249(1)
Layer 1: Messaging
250(1)
Layer 2: Remote Invocation
250(1)
Layer 3: Web Application
251(1)
WebMUX
251(1)
Binary Wire Protocol
252(1)
Current Status
252(1)
For More Information
253(4)
Part III. Identification, Authorization, and Security
Client Identification and Cookies
257(20)
The Personal Touch
257(1)
HTTP Headers
258(1)
Client IP Address
259(1)
User Login
260(2)
Fat URLs
262(1)
Cookies
263(13)
For More Information
276(1)
Basic Authentication
277(9)
Authentication
277(4)
Basic Authentication
281(2)
The Security Flaws of Basic Authentication
283(2)
For More Information
285(1)
Digest Authentication
286(21)
The Improvements of Digest Authentication
286(5)
Digest Calculations
291(8)
Quality of Protection Enhancements
299(1)
Practical Considerations
300(3)
Security Considerations
303(3)
For More Information
306(1)
Secure HTTP
307(34)
Making HTTP Safe
307(2)
Digital Cryptography
309(4)
Symmetric-Key Cryptography
313(2)
Public-Key Cryptography
315(2)
Digital Signatures
317(2)
Digital Certificates
319(3)
HTTPS: The Details
322(6)
A Real HTTPS Client
328(7)
Tunneling Secure Traffic Through Proxies
335(1)
For More Information
336(5)
Part IV. Entities, Encodings, and Internationalization
Entities and Encodings
341(29)
Messages Are Crates, Entities Are Cargo
342(2)
Content-Length: The Entity's Size
344(3)
Entity Digests
347(1)
Media Type and Charset
348(3)
Content Encoding
351(3)
Transfer Encoding and Chunked Encoding
354(5)
Time-Varying Instances
359(1)
Validators and Freshness
360(3)
Range Requests
363(2)
Delta Encoding
365(4)
For More Information
369(1)
Internationalization
370(25)
HTTP Support for International Content
370(1)
Character Sets and HTTP
371(5)
Multilingual Character Encoding Primer
376(8)
Language Tags and HTTP
384(5)
Internationalized URIs
389(3)
Other Considerations
392(1)
For More Information
392(3)
Content Negotiation and Transcoding
395(16)
Content-Negotiation Techniques
395(1)
Client-Driven Negotiation
396(1)
Server-Driven Negotiation
397(3)
Transparent Negotiation
400(3)
Transcoding
403(2)
Next Steps
405(1)
For More Information
406(5)
Part V. Content Publishing and Distribution
Web Hosting
411(13)
Hosting Services
411(2)
Virtual Hosting
413(6)
Making Web Sites Reliable
419(3)
Making Web Sites Fast
422(1)
For More Information
423(1)
Publishing Systems
424(24)
FrontPage Server Extensions for Publishing Support
424(5)
WebDAV and Collaborative Authoring
429(17)
For More Information
446(2)
Redirection and Load Balancing
448(35)
Why Redirect?
449(1)
Where to Redirect
449(1)
Overview of Redirection Protocols
450(2)
General Redirection Methods
452(10)
Proxy Redirection Methods
462(7)
Cache Redirection Methods
469(4)
Internet Cache Protocol
473(2)
Cache Array Routing Protocol
475(3)
Hyper Text Caching Protocol
478(3)
For More Information
481(2)
Logging and Usage Tracking
483(134)
What to Log?
483(1)
Log Formats
484(8)
Hit Metering
492(3)
A Word on Privacy
495(1)
For More Information
495(4)
Part VI. Appendixes
A. URI Schemes
499(6)
B. HTTP Status Codes
505(3)
C. HTTP Header Reference
508(25)
D. MIME Types
533(37)
E. Base-64 Encoding
570(4)
F. Digest Authentication
574(7)
G. Language Tags
581(21)
H. MIME Charset Registry
602(15)
Index 617


Brian Totty is the Vice President of R&D at Inktomi Corporation. He has led the technical design and development of web caching, streaming media, and Internet search technologies since he helped found Inktomi in 1996. David Gourley is the Chief Technology Officer of Endeca, where he leads the research and development of Endeca's products. David was a member of the founding engineering team at Inktomi, where he helped develop Inktomi's Internetsearch database, and was a key developer of Inktomi's web caching products. Marjorie Sayer writes about network caching software at Inktomi Corporation. Sailu Reddy writes about network caching software at Inktomi Corporation. Anshu Aggarwal is a Director of Engineering at Inktomi.