HTTP Programming Recipes for C# Bots

HTTP Programming Recipes for C# Bots

简介:

超文本传输协议 (HTTP) 允许在web服务器和web浏览器之间交换信息。C # 允许您直接编程HTTP。HTTP编程允许您创建访问web的程序,就像人类用户一样。这些程序称为bots,可以收集信息或自动执行常见的web编程任务。本书为C # bot编程提供了一系列非常可重用的食谱。

本书涵盖了许多与C # HTTP编程相关的主题。涵盖了安全和不安全的HTTP通信以及HTTP身份验证。学习与HTTP表单交互并支持HTTP POST和HTTP GET请求。从大量的HTML构造 (如表和列表) 中收集数据。了解使机器人的生活复杂化的高级主题,如AJAX和Javascript。还了解机器人的道德使用,以及何时不应使用机器人。

本书还介绍了希顿研究蜘蛛。Heaton Research Spider是一个开源的蜘蛛框架。使用Heaton Research蜘蛛,您可以创建可以抓取网站的蜘蛛,就像真正的蜘蛛抓取网络一样。Heaton Research Spider以Java和Microsoft Dot Net形式提供。

英文简介:

The Hypertext Transfer Protocol (HTTP) allows information to be exchanged between a web server and a web browser. C# allows you to program HTTP directly. HTTP programming allows you to create programs that access the web much like a human user would. These programs, which are called bots, can collect information or automate common web programming tasks. This book presents a collection of very reusable recipes for C# bot programming.

This book covers many topics related to C# HTTP programming. Both secure and insecure HTTP communications are covered, as well as HTTP authentication. Learn to interact with HTTP forms and support both HTTP POST and HTTP GET requests. Collect data from a wide array of HTML constructs, such as tables, and lists. Learn about advanced topics that complicate the life of a bot, such as AJAX and Javascript. Also learn about the ethical use of bots, and when bots should not be used.

This book also introduces the Heaton Research Spider. The Heaton Research Spider is an open source spider framework. Using the Heaton Research Spider you can create spiders that will crawl a web site, much like a real spider crawls the web. The Heaton Research Spider is available in both Java and Microsoft Dot Net form.

书名
HTTP Programming Recipes for C# Bots
译名
C# 机器人的 HTTP 编程秘诀
语言
英语
年份
2007
页数
631页
大小
9.16 MB
标签
  • C#
  • 下载
    pdf iconHTTP Programming Recipes for C# Bots.pdf
    密码
    65536

    最后更新:2025-04-12 23:57:55

    ←HTTP/2: Learn what's new in HTTP/2 and how your applications can benefit from it

    →Information Security Management Handbook