Ben Laurie is the coauthor of Apache: The Definitive Guide, Technical Director of A.L. Digital Ltd. and The Bunker, a director of the Apache Software Foundation, author of Apache-SSL and a core team member of OpenSSL. As well as his obvious involvement with free software, he's also obsessed with security and privacy, particularly on the net. In his copious spare time, he writes stuff, sometimes code, sometimes words.
Coauthor of Apache: The Definitive Guide, 3nd Edition
Preface | p. ix |
Getting Started | p. 1 |
How Does Apache Work? | p. 3 |
What to Know About TCP/IP | p. 5 |
How Does Apache Use TCP/IP? | p. 7 |
What the Client Does | p. 9 |
What Happens at the Server End? | p. 11 |
Which Unix? | p. 12 |
Which Apache? | p. 13 |
Making Apache Under Unix | p. 13 |
Apache Under Windows | p. 23 |
Apache Under BS2000/OSD and AS/400 | p. 25 |
Our First Web Site | p. 26 |
What Is a Web Site? | p. 26 |
Apache's Flags | p. 27 |
site.toddle | p. 28 |
Setting Up a Unix Server | p. 29 |
Setting Up a Win32 Server | p. 39 |
Toward a Real Web Site | p. 43 |
More and Better Web Sites: site.simple | p. 43 |
Butterthlies, Inc., Gets Going | p. 46 |
Block Directives | p. 49 |
Other Directives | p. 52 |
Two Sites and Apache | p. 58 |
Controlling Virtual Hosts on Unix | p. 58 |
Controlling Virtual Hosts on Win32 | p. 60 |
Virtual Hosts | p. 61 |
Two Copies of Apache | p. 65 |
HTTP Response Headers | p. 68 |
Options | p. 68 |
Restarts | p. 71 |
.htaccess | p. 72 |
CERN Metafiles | p. 72 |
Expirations | p. 73 |
Common Gateway Interface (CGI) | p. 75 |
Turning the Brochure into a Form | p. 75 |
Writing and Executing Scripts | p. 79 |
Script Directives | p. 83 |
Useful Scripts | p. 85 |
Debugging Scripts | p. 89 |
Setting Environment Variables | p. 90 |
suEXEC on Unix | p. 93 |
Handlers | p. 100 |
Actions | p. 101 |
Authentication | p. 104 |
Authentication Protocol | p. 104 |
Authentication Directives | p. 106 |
Passwords Under Unix | p. 108 |
Passwords Under Win32 | p. 110 |
New Order Form | p. 110 |
Order, Allow, and Deny | p. 114 |
Digest Authentication | p. 118 |
Anonymous Access | p. 120 |
Experiments | p. 123 |
Automatic User Information | p. 124 |
Using .htaccess Files | p. 126 |
Overrides | p. 129 |
MIME, Content and Language Negotiation | p. 132 |
MIME Types | p. 132 |
Content Negotiation | p. 134 |
Language Negotiation | p. 135 |
Type Maps | p. 137 |
Browsers and HTTP/1.1 | p. 140 |
Indexing | p. 141 |
Making Better Indexes in Apache | p. 141 |
Making Our Own Indexes | p. 149 |
Imagemaps | p. 152 |
Redirection | p. 158 |
Rewrite | p. 162 |
Speling | p. 169 |
Proxy Server | p. 170 |
Proxy Directives | p. 170 |
Caching | p. 173 |
Setup | p. 175 |
Server-Side Includes | p. 179 |
File Size | p. 182 |
File Modification Time | p. 183 |
Includes | p. 183 |
Execute CGI | p. 183 |
Echo | p. 185 |
XBitHack | p. 185 |
XSSI | p. 185 |
What's Going On? | p. 186 |
Status | p. 186 |
Server Status | p. 187 |
Server Info | p. 188 |
Logging the Action | p. 188 |
Extra Modules | p. 196 |
Authentication | p. 201 |
Blocking Access | p. 202 |
Counters | p. 202 |
Faster CGI Programs | p. 202 |
FrontPage from Microsoft | p. 202 |
Languages and Internationalization | p. 203 |
Server-Side Scripting | p. 203 |
Throttling Connections | p. 203 |
URL Rewriting | p. 203 |
Miscellaneous | p. 203 |
MIME Magic | p. 204 |
DSO | p. 204 |
Security | p. 205 |
Internal and External Users | p. 206 |
Apache's Security Precautions | p. 208 |
Binary Signatures, Virtual Cash | p. 209 |
Firewalls | p. 214 |
Legal Issues | p. 217 |
Secure Sockets Layer: How to Do It | p. 222 |
Apache-SSL's Directives | p. 233 |
Cipher Suites | p. 236 |
SSL and CGI | p. 238 |
The Apache API | p. 240 |
Pools | p. 240 |
Per-Server Configuration | p. 241 |
Per-Directory Configuration | p. 242 |
Per-Request Information | p. 243 |
Access to Configuration and Request Information | p. 245 |
Functions | p. 246 |
Writing Apache Modules | p. 290 |
Overview | p. 290 |
Status Codes | p. 292 |
The Module Structure | p. 293 |
A Complete Example | p. 316 |
General Hints | p. 329 |
Support Organizations | p. 331 |
The echo Program | p. 333 |
NCSA and Apache Compatibility | p. 337 |
SSL Protocol | p. 339 |
Sample Apache Log | p. 345 |
Index | p. 355 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.