Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (5): 27-29    DOI: 10.11925/infotech.1003-3513.2004.05.07
Current Issue | Archive | Adv Search |
Application and Optimize of Proxy Server in Library Local Area Network
Zhang Hongwu
(Library of Weinan Teachers College, Shanxi 714000, China)
Export: BibTeX | EndNote (RIS)      

With the development of electronic library,proxy server in library local area network plays an important role.The function, installation, configure and optimize of server is stressly introduced.

Key wordsProxy-Server      Ms-proxy      Configure      Optimize     
Received: 23 December 2003      Published: 25 May 2004


Corresponding Authors: Zhang Hongwu     E-mail:
About author:: Zhang Hongwu

Cite this article:

Zhang Hongwu. Application and Optimize of Proxy Server in Library Local Area Network. New Technology of Library and Information Service, 2004, 20(5): 27-29.

URL:     OR

1 周玉陶.高校图书馆代理服务器的安全应用探讨.情报杂志,2003(9)
2 梁志龙.代理服务器的工作原理及应用.计算机系统应用,2001(6)

[1] Zhang Hongbin, Cao Yiqin. A New Classifier Design in a Topic Search Engine by Combining Multi-layer Classifier with Naive Bayes Classification Model[J]. 现代图书情报技术, 2011, 27(3): 73-79.
[2] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[3] Ma Jing,Li Qv . The Essential Elements of System Behavior and Design of Its Inspect Mechanism[J]. 现代图书情报技术, 2007, 2(1): 77-80.
[4] Li Hui,Liu Dongsu,Wang Yu . A Security Management Framework for E-commerce Based on OWL[J]. 现代图书情报技术, 2006, 1(11): 69-72.
[5] Zhang Dexiang,Mu Jianbo,Wang Xiaoyan,Jia Xiaozhu . Design and Implementation of Network Security System for the Library Based on Virtual Technique[J]. 现代图书情报技术, 2006, 1(6): 73-76.
[6] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[7] Miao Yuanzhao,Yang Yang,Yu Peng. Study on Computer Network Safety System of the College Library Based on Network Layer[J]. 现代图书情报技术, 2005, 21(8): 61-64.
[8] Yang Yingquan,Wen Ru. Application of Microsoft Fail over Cluster in Library[J]. 现代图书情报技术, 2005, 21(1): 32-35.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Lin Zeming. The Application Research of Library's Web Database System Based on ASP[J]. 现代图书情报技术, 2003, 19(1): 51-53.
[11] Lin Zeming,Xie Kesheng. Dissertation on Security System of Library's Hard Disk Array[J]. 现代图书情报技术, 2002, 18(6): 84-86.
[12] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[13] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938