Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (5): 27-29    DOI: 10.11925/infotech.1003-3513.2004.05.07
Current Issue | Archive | Adv Search |
Application and Optimize of Proxy Server in Library Local Area Network
Zhang Hongwu
(Library of Weinan Teachers College, Shanxi 714000, China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

With the development of electronic library,proxy server in library local area network plays an important role.The function, installation, configure and optimize of server is stressly introduced.

Key wordsProxy-Server      Ms-proxy      Configure      Optimize     
Received: 23 December 2003      Published: 25 May 2004
ZTFLH: 

TP393.08

 
Corresponding Authors: Zhang Hongwu     E-mail: zhanghongwu12396@sohu.com
About author:: Zhang Hongwu

Cite this article:

Zhang Hongwu. Application and Optimize of Proxy Server in Library Local Area Network. New Technology of Library and Information Service, 2004, 20(5): 27-29.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.05.07     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I5/27

1 周玉陶.高校图书馆代理服务器的安全应用探讨.情报杂志,2003(9)
2 梁志龙.代理服务器的工作原理及应用.计算机系统应用,2001(6)

[1] Zhang Hongbin, Cao Yiqin. A New Classifier Design in a Topic Search Engine by Combining Multi-layer Classifier with Naive Bayes Classification Model[J]. 现代图书情报技术, 2011, 27(3): 73-79.
[2] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[3] Ma Jing,Li Qv . The Essential Elements of System Behavior and Design of Its Inspect Mechanism[J]. 现代图书情报技术, 2007, 2(1): 77-80.
[4] Li Hui,Liu Dongsu,Wang Yu . A Security Management Framework for E-commerce Based on OWL[J]. 现代图书情报技术, 2006, 1(11): 69-72.
[5] Zhang Dexiang,Mu Jianbo,Wang Xiaoyan,Jia Xiaozhu . Design and Implementation of Network Security System for the Library Based on Virtual Technique[J]. 现代图书情报技术, 2006, 1(6): 73-76.
[6] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[7] Miao Yuanzhao,Yang Yang,Yu Peng. Study on Computer Network Safety System of the College Library Based on Network Layer[J]. 现代图书情报技术, 2005, 21(8): 61-64.
[8] Yang Yingquan,Wen Ru. Application of Microsoft Fail over Cluster in Library[J]. 现代图书情报技术, 2005, 21(1): 32-35.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Lin Zeming. The Application Research of Library's Web Database System Based on ASP[J]. 现代图书情报技术, 2003, 19(1): 51-53.
[11] Lin Zeming,Xie Kesheng. Dissertation on Security System of Library's Hard Disk Array[J]. 现代图书情报技术, 2002, 18(6): 84-86.
[12] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn