Skip to Content
Security Strategies in Linux Platforms and Applications, 3rd Edition
book

Security Strategies in Linux Platforms and Applications, 3rd Edition

by Ric Messier, Michael Jang
October 2022
Intermediate to advanced
500 pages
19h 57m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 3rd Edition

Working with Squid

Proxy servers are used to sit in between two endpoints. This may be used to protect servers as in the case of a reverse proxy or it may be used to protect clients, as in the case of a web proxy. You can also get performance enhancements using a proxy server since the content can be cached locally. This only works with static content. Any programmatic content can’t be cached since it should be changing regularly.

As for caching, the proxy server for an enterprise where hundreds of users access the same online dictionary website can store that information locally. The definitions on that dictionary would be accessed from the Internet only once. Further requests for the same definitions would be returned in this case from the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition

Sander van Vugt
Theoretical Cybersecurity: Principles and Advanced Concepts

Theoretical Cybersecurity: Principles and Advanced Concepts

Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
Three Essentials for Agentic AI Security

Three Essentials for Agentic AI Security

Paolo Dal Cin, Daniel Kendzior, Yusof Seedat, Renato Marinho

Publisher Resources

ISBN: 9781284255881