<p>Computing has moved away from a focus on performance-centric serial computation, instead towards energy-efficient parallel computation. This provides continued performance increases without increasing clock frequencies, and overcomes the thermal and power limitations of the dark-silicon era. As t
Computer Networking For LANs To WANs: Hardware, Software And security
โ Scribed by Kenneth C. Mansfield, Jr., James L. Antonakos
- Publisher
- DELMAR/Cengage Learning
- Year
- 2010
- Tongue
- English
- Leaves
- 983
- Series
- Networking (Course Technology Inc.)
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities. Features:
โข This book provides a comprehensive guide to all aspects of computer networking, including networking hardware, software (TCP/IP applications and network operating systems), and security (fault tolerance, secure transmissions, computer and network forensics).
โข Numerous figures, tables, Hands-On Projects and Case Projects provide exposure to real-world networking, security, and forensic methods and skills.
โข Coverage of all major network operating systems (Windows, UNIX/Linux, Mac OS X, and NetWare).
โข A companion CD provides many files, documentation, and software applications to enhance the hands-on learning and encourage further investigation and skill development.
โข Readers will obtain practical networking knowledge that will be useful in everyday computing activities.
โฆ Table of Contents
PART I: NETWORK HARDWARE.1: What Is A Computer Network?2: Network Topology.3: Networking Hardware.4: Ethernet Technology.5: Token Ring, Fddi, And Other Lan Technologies.6: Network Design And Troubleshooting Scenarios.PART II: NETWORK PROTOCOLS.7: Low-Level Protocols.8: The Tcp/Ip Protocols.9: Ipx/Spx, Appletalk, And Other Network Protocols.10: Switching And Routing.11: Network Management And Security.PART III: NETWORK APPLICATIONS.12: Electronic Mail.13: Ftp And Telnet.14: Multimedia Networking.15: The Internet.16: Writing A Network Application.PART IV: NETWORK OPERATING SYSTEMS.17: An Introduction To Networking With Windows.18: Windows Domains.19: Unix And Linux.20: Other Network Operating Systems.PART V: SECURITY AND FORENSICS.21: Cryptography And Security.22: Security Hardware.23: Security Software.24: Forensic Techniques.Glossary:Appendix A: Internet Milestones.Appendix B: Extended Ascii Character Set.Appendix C: Modems.Appendix D: Network, Security, And Forensic Certifications.Appendix E: Telecommunication Technologies.Appendix F: Setting Up A Networking Repair Shop.
โฆ Subjects
Computer Networks, Computer Software, Local Area Networks (Computer Networks), Local Area Networks (Computer Networks): Security Measures, Wide Area Networks (Computer Networks), Wide Area Networks (Computer networks): Security Measures
๐ SIMILAR VOLUMES
There are many books on computers, networks, and software engineering but none that integrate the three with <i>applications</i>. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books
<em> <strong>Nanoelectronic Devices for Hardware and Software Security</strong> </em> has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research direct
<p><span>Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of so
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a