The Definitive Guide
%20The%20Definitive%20Guide
User Manual: Pdf
Open the PDF directly: View PDF
Page Count: 658 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Table of Contents
- Preface
- Part I
- Overview of HTTP
- URLs and Resources
- HTTP Messages
- Connection Management
- TCP Connections
- TCP Performance Considerations
- HTTP Connection Handling
- Parallel Connections
- Persistent Connections
- Pipelined Connections
- The Mysteries of Connection Close
- For More Information
- Part II
- Web Servers
- Web Servers Come in All Shapes and Sizes
- A Minimal Perl Web Server
- What Real Web Servers Do
- Step 1: Accepting Client Connections
- Step 2: Receiving Request Messages
- Step 3: Processing Requests
- Step 4: Mapping and Accessing Resources
- Step 5: Building Responses
- Step 6: Sending Responses
- Step 7: Logging
- For More Information
- Proxies
- Web Intermediaries
- Why Use Proxies?
- Where Do Proxies Go?
- Client Proxy Settings
- Tricky Things About Proxy Requests
- Proxy URIs Differ from Server URIs
- The Same Problem with Virtual Hosting
- Intercepting Proxies Get Partial URIs
- Proxies Can Handle Both Proxy and Server Requests
- In-Flight URI Modification
- URI Client Auto-Expansion and Hostname Resolution
- URI Resolution Without a Proxy
- URI Resolution with an Explicit Proxy
- URI Resolution with an Intercepting Proxy
- Tracing Messages
- Proxy Authentication
- Proxy Interoperation
- For More Information
- Caching
- Integration Points: Gateways, Tunnels, and Relays
- Web Robots
- Crawlers and Crawling
- Robotic HTTP
- Misbehaving Robots
- Excluding Robots
- Robot Etiquette
- Search Engines
- For More Information
- HTTP-NG
- Part III
- Client Identification and Cookies
- The Personal Touch
- HTTP Headers
- Client IP Address
- User Login
- Fat URLs
- Cookies
- For More Information
- Basic Authentication
- Digest Authentication
- The Improvements of Digest Authentication
- Digest Calculations
- Quality of Protection Enhancements
- Practical Considerations
- Security Considerations
- For More Information
- Secure HTTP
- Part IV
- Entities and Encodings
- Internationalization
- Content Negotiation and Transcoding
- Part V
- Web Hosting
- Publishing Systems
- FrontPage Server Extensions for Publishing Support
- WebDAV and Collaborative Authoring
- WebDAV Methods
- WebDAV and XML
- WebDAV Headers
- WebDAV Locking and Overwrite Prevention
- The LOCK Method
- The UNLOCK Method
- Properties and META Data
- The PROPFIND Method
- The PROPPATCH Method
- Collections and Namespace Management
- The MKCOL Method
- The DELETE Method
- The COPY and MOVE Methods
- Enhanced HTTP/1.1 Methods
- Version Management in WebDAV
- Future of WebDAV
- For More Information
- Redirection and Load Balancing
- Logging and Usage Tracking
- Part VI
- URI Schemes
- HTTP Status Codes
- HTTP Header Reference
- Accept
- Accept-Charset
- Accept-Encoding
- Accept-Language
- Accept-Ranges
- Age
- Allow
- Authorization
- Cache-Control
- Client-ip
- Connection
- Content-Base
- Content-Encoding
- Content-Language
- Content-Length
- Content-Location
- Content-MD5
- Content-Range
- Content-Type
- Cookie
- Cookie2
- Date
- ETag
- Expect
- Expires
- From
- Host
- If-Modified-Since
- If-Match
- If-None-Match
- If-Range
- If-Unmodified-Since
- Last-Modified
- Location
- Max-Forwards
- MIME-Version
- Pragma
- Proxy-Authenticate
- Proxy-Authorization
- Proxy-Connection
- Public
- Range
- Referer
- Retry-After
- Server
- Set-Cookie
- Set-Cookie2
- TE
- Trailer
- Title
- Transfer-Encoding
- UA-(CPU, Disp, OS, Color, Pixels)
- Upgrade
- User-Agent
- Vary
- Via
- Warning
- WWW-Authenticate
- X-Cache
- X-Forwarded-For
- X-Pad
- X-Serial-Number
- MIME Types
- Base-64 Encoding
- Digest Authentication
- Language Tags
- MIME Charset Registry
- Index