Attack web and web protocols

I have been more resistance to web, web and various protocols interact with the back end of the front, slowly found that in addition data and computer software algorithms fact there is another piece of high ground, that is the web protocol.

Very grateful geeks time course provides a very high price, I met such a good teacher.

I hope you are urged to purchase pottery Hui teacher courses

 

 

Course Introduction

A first portion of a top-down parsing HTTP / 1.1 protocol

  1. Content Summary
  2. A typical scene browser initiates an HTTP request
  3. HTTP message based on a format defined semantics ABNF
  4. Why hierarchical network: OSI model and TCP / IP model
  5. HTTP solve the problem?
  6. Assessment of seven key attributes of Web architecture
  7. HTTP REST architecture is derived from five kinds of architectural styles
  8. How to analyze HTTP packets use Chrome's Network panel?
  9. The difference between the basic format of the URL and the URI
  10. Why the URI encoding?
  11. Detailed HTTP request line of the HTTP response code correctly
  12. HTTP error response code
  13. How to manage across the length of the proxy server connection?
  14. HTTP message routing server
  15. The proxy server forwards the messages related to the head
  16. Contextual content in consultation with the resource representation request and response
  17. HTTP packet transmission body (1): fixed length packet body
  18. HTTP packet transmission member (2): variable length enclaves
  19. Protocol format of HTML form when the form is submitted
  20. How HTTP and multi-threaded download is done?
  21. Format and constraints of Cookie
  22. Session Cookie and third-party works
  23. Why browsers have the same origin policy?
  24. How "legitimate" cross-domain access?
  25. The role of buffer conditions requested works
  26. Four arithmetic mode cache freshness
  27. Cache-Control header complex
  28. What kind of response will be cached?
  29. Differences in a variety of ways to redirect Jump
  30. How to access restricted network through HTTP tunnel?
  31. Web crawler works and coping style
  32. HTTP Basic Authentication Protocol
  33. The basic usage of Wireshark
  34. How to resolve the domain name by the DNS protocol?

Guess you like

Origin www.cnblogs.com/wqbin/p/12024725.html