000 03860cam a22004817i 4500
999 _c8476
_d8476
001 15638848
005 20210124101902.0
008 090226s2010 maua 001 0 eng
010 _a 2009923766
020 _a1423903161
020 _a9781423903161
020 _a9781435496699
020 _a1435496698
040 _aNUI
_erda
_cNUI
_dBWX
_dUPM
_dDLC
_dDLC
_beng
050 0 0 _aTK5105.5
_b.M35777 2010
082 _222
_a004.6
_bM.K.C
100 1 _aMansfield, Kenneth C.
_eauthor.
245 1 0 _aComputer networking from LANs to WANs :
_bhardware, software and security /
_cKenneth C. Mansfield, Jr., James L. Antonakos.
264 1 _aBoston, MA :
_bCourse Technology, Cengage Learning,
_c[2010]
264 4 _ccopyright 2010
300 _axxxi, 949 pages :
_billustrations ;
_c24 cm. +
_e1 computer disc.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 1 _aNetworking
500 _aIncludes index.
505 0 _aPART I: NETWORK HARDWARE. 1: What Is A Computer Network? 2: Network Topology. 3: Networking Hardware. 4: Ethernet Technology. 5: Token Ring, Fddi, And Other Lan Technologies. 6: Network Design And Troubleshooting Scenarios. PART II: NETWORK PROTOCOLS. 7: Low-Level Protocols. 8: The Tcp/Ip Protocols. 9: Ipx/Spx, Appletalk, And Other Network Protocols. 10: Switching And Routing. 11: Network Management And Security. PART III: NETWORK APPLICATIONS. 12: Electronic Mail. 13: Ftp And Telnet. 14: Multimedia Networking. 15: The Internet. 16: Writing A Network Application. PART IV: NETWORK OPERATING SYSTEMS. 17: An Introduction To Networking With Windows. 18: Windows Domains. 19: Unix And Linux. 20: Other Network Operating Systems. PART V: SECURITY AND FORENSICS. 21: Cryptography And Security. 22: Security Hardware. 23: Security Software. 24: Forensic Techniques. Glossary: Appendix A: Internet Milestones. Appendix B: Extended Ascii Character Set. Appendix C: Modems. Appendix D: Network, Security, And Forensic Certifications. Appendix E: Telecommunication Technologies. Appendix F: Setting Up A Networking Repair Shop.
520 _a Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY covers all aspects of computer networking. Hardware details such as the operation of Ethernet, network media and devices, including hubs, switches, routers, and physical topology, are provided, with many design and troubleshooting examples. Software details such as the operation of the TCP/IP protocols, routing protocols, and network operating systems are examined. Applications, such as FTP, Telnet, and email are explained in detail, as are the requirements of writing client/server applications, with several working examples provided. Techniques for applying security to networking and computing activities are covered, including network management, secure communication methods such as SSH, TLS, and VPN, and the fundamentals of forensics
538 _aSystem requirements for CD-ROM not given.
650 0 _aComputer networks.
650 0 _aWide area networks (Computer networks)
650 0 _aLocal area networks (Computer networks)
_9538
650 0 _aComputer software.
650 0 _aWide area networks (Computer networks)
_xSecurity measures.
650 0 _aLocal area networks (Computer networks)
_xSecurity measures.
700 1 _aAntonakos, James L.
830 0 _aNetworking (Course Technology, Inc.)
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/enhancements/fy1105/2009923766-b.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy1105/2009923766-d.html
856 4 1 _3Table of contents only
_uhttp://www.loc.gov/catdir/enhancements/fy1105/2009923766-t.html
942 _cBK
_2ddc