๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computer Networking For LANs To WANs: Hardware, Software And security

โœ Scribed by Kenneth C. Mansfield, Jr., James L. Antonakos


Publisher
DELMAR/Cengage Learning
Year
2010
Tongue
English
Leaves
983
Series
Networking (Course Technology Inc.)
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities. Features:
โ€ข This book provides a comprehensive guide to all aspects of computer networking, including networking hardware, software (TCP/IP applications and network operating systems), and security (fault tolerance, secure transmissions, computer and network forensics).
โ€ข Numerous figures, tables, Hands-On Projects and Case Projects provide exposure to real-world networking, security, and forensic methods and skills.
โ€ข Coverage of all major network operating systems (Windows, UNIX/Linux, Mac OS X, and NetWare).
โ€ข A companion CD provides many files, documentation, and software applications to enhance the hands-on learning and encourage further investigation and skill development.
โ€ข Readers will obtain practical networking knowledge that will be useful in everyday computing activities.

โœฆ Table of Contents


PART I: NETWORK HARDWARE.1: What Is A Computer Network?2: Network Topology.3: Networking Hardware.4: Ethernet Technology.5: Token Ring, Fddi, And Other Lan Technologies.6: Network Design And Troubleshooting Scenarios.PART II: NETWORK PROTOCOLS.7: Low-Level Protocols.8: The Tcp/Ip Protocols.9: Ipx/Spx, Appletalk, And Other Network Protocols.10: Switching And Routing.11: Network Management And Security.PART III: NETWORK APPLICATIONS.12: Electronic Mail.13: Ftp And Telnet.14: Multimedia Networking.15: The Internet.16: Writing A Network Application.PART IV: NETWORK OPERATING SYSTEMS.17: An Introduction To Networking With Windows.18: Windows Domains.19: Unix And Linux.20: Other Network Operating Systems.PART V: SECURITY AND FORENSICS.21: Cryptography And Security.22: Security Hardware.23: Security Software.24: Forensic Techniques.Glossary:Appendix A: Internet Milestones.Appendix B: Extended Ascii Character Set.Appendix C: Modems.Appendix D: Network, Security, And Forensic Certifications.Appendix E: Telecommunication Technologies.Appendix F: Setting Up A Networking Repair Shop.

โœฆ Subjects


Computer Networks, Computer Software, Local Area Networks (Computer Networks), Local Area Networks (Computer Networks): Security Measures, Wide Area Networks (Computer Networks), Wide Area Networks (Computer networks): Security Measures


๐Ÿ“œ SIMILAR VOLUMES


Many-Core Computing: Hardware and softwa
โœ Bashir M. Al-Hashimi (editor), Geoff V. Merrett (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Institution of Engineering and Technology ๐ŸŒ English

<p>Computing has moved away from a focus on performance-centric serial computation, instead towards energy-efficient parallel computation. This provides continued performance increases without increasing clock frequencies, and overcomes the thermal and power limitations of the dark-silicon era. As t

Computer, Network, Software, and Hardwar
โœ Norman F. Schneidewind(auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

There are many books on computers, networks, and software engineering but none that integrate the three with <i>applications</i>. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books

Nanoelectronic Devices for Hardware and
โœ Balwinder Raj; Arun Kumar Singh ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

<em> <strong>Nanoelectronic Devices for Hardware and Software Security</strong> </em> has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research direct

Software Supply Chain Security: Securing
โœ Cassie Crossley ๐Ÿ“‚ Library ๐Ÿ› O'Reilly Media ๐ŸŒ English

<p><span>Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of so

Software Supply Chain Security: Securing
โœ Cassie Crossley ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Oreilly & Associates Inc ๐ŸŒ English

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a

Software Supply Chain Security: Securing
โœ Cassie Crossley ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, a