Nonficionado Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Q&A | May 11, 2015

    Heidi Pitlor: IMG Powell’s Q&A: Heidi Pitlor



    Describe your latest book. My novel, The Daylight Marriage, is about a wife and mother who goes missing one day. The narrative alternates between... Continue »

    spacer
Qualifying orders ship free.
$132.00
List price: $190.50
Used Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
1 Partner Warehouse General- General

More copies of this ISBN

Computer Networking for Lans To Wans - With CD (10 Edition)

by

Computer Networking for Lans To Wans - With CD (10 Edition) Cover

 

Synopses & Reviews

Please note that used books may not include additional media (study guides, CDs, DVDs, solutions manuals, etc.) as described in the publisher comments.

Publisher Comments:

Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY covers all aspects of computer networking. Hardware details such as the operation of Ethernet, network media and devices, including hubs, switches, routers, and physical topology, are provided, with many design and troubleshooting examples. Software details such as the operation of the TCP/IP protocols, routing protocols, and network operating systems are examined. Applications, such as FTP, Telnet, and email are explained in detail, as are the requirements of writing client/server applications, with several working examples provided. Techniques for applying security to networking and computing activities are covered, including network management, secure communication methods such as SSH, TLS, and VPN, and the fundamentals of forensics. A strong pedagogical approach introduces each new topic with practical, real-world examples, and step-by-step Hands-On Projects. A companion CD includes videos and numerous files that allow the reader to perform important hands-on networking, security, and forensic activities.

Synopsis:

Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities.

About the Author

James L. Antonakos is a Professor of Computer Studies at Broome Community College in Binghamton, NY.

Table of Contents

PART I: NETWORK HARDWARE CHAPTER 1 WHAT IS A COMPUTER NETWORK? Objectives Introduction Computer Network Topology Wired Networks Versus Wireless Networks Representing Digital Data Working with Digital Data Communication Protocols Ethernet LANs Token Ring LANs Network Operating Systems IEEE 802 Standards Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 2 NETWORK TOPOLOGY Objectives Introduction Physical Topology Versus Logical Topology Fully Connected Networks Star Networks Bus Networks Ring Networks Hybrid Networks Network Hierarchy Subnets Network Access Points Public Networks Versus Private Networks Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 3 NETWORKING HARDWARE Objectives Introduction Ethernet Cabling The NIC Token Ring Repeaters Transceivers Hubs Bridges/Switches Routers Cable Modems Satellite Network System Exotic Hardware and Software Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 4 ETHERNET TECHNOLOGY Objectives Introduction The Ethernet Frame Format The Interframe Gap CSMA/CD Ethernet Controllers 10-Mbps Ethernet 100-Mbps Ethernet (Fast Ethernet) 1000-Mbps Ethernet (Gigabit Ethernet) Wireless Ethernet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 5 TOKEN RING, FDDI, AND OTHER LAN TECHNOLOGIES Objectives Introduction Token Ring Token-Ring Topology Token-Ring Frame Formats Ring Management Comparing Token Ring and Ethernet Token Bus FDDI Broadband LANs ARCnet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 6 NETWORK DESIGN AND TROUBLESHOOTING SCENARIOS Objectives Introduction Networking Two Computers Networking a Small Lab Networking a Small Business Networking a College Campus Remote Access Methods Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART II: NETWORK PROTOCOLS CHAPTER 7 LOW-LEVEL PROTOCOLS Objectives Introduction Serial Data Communication SLIP PPP PPPoE IEEE 802.2 Logical Link Control NetBIOS NetBEUI Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 8 THE TCP/IP PROTOCOLS Objectives Introduction RFCs IP IP Addresses TCP UDP ARP and RARP TCP/IP Support Protocols TCP/IP Applications IP Version 6 Protocol Analyzers Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 9 IPX/SPX, APPLETALK, AND OTHER NETWORK PROTOCOLS Objectives Introduction IPX/SPX AppleTalk DECnet SNA Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 10 SWITCHING AND ROUTING Objectives Introduction Hubs Versus Switches Inside a Switch Store-and-Forward Switching Cut-Through Switching Switches Versus Routers Routing Protocols Autonomous Systems Interior Gateway Protocols Exterior Gateway Protocols Classless Inter-Domain Routing Distance-Vector Routing Link-State Routing Policy Routing Multi-Protocol Label Switching Private Network-Network Interface Layer 3 Switching Inside an ISP Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 11 NETWORK MANAGEMENT AND SECURITY Objectives Introduction Network Management Network Security Storage Management Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART III: NETWORK APPLICATIONS CHAPTER 12 ELECTRONIC MAIL Objectives Introduction What Is E-Mail? Simple Mail Transport Protocol Format of E-Mail Messages E-Mail Client Software Sending an E-Mail Message Receiving an E-Mail Message Using the Post Office Protocol E-Mail Error Messages Access to E-Mail Using the Web Multipurpose Internet Mail Extensions Internet Message Access Protocol E-Mail Packet Capture Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 13 FTP AND TELNET Objectives Introduction FTP Clients and Servers Telnet Clients and Servers Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 14 MULTIMEDIA NETWORKING Objectives Introduction Image Files Sound Files The Digital Conversation Transmitting Data Over a Network Voice-Over-IP Video Multicasting Games Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 15 THE INTERNET Objectives Introduction The Organization of the Internet Windows and the Internet World Wide Web HTML CGI JAVA Virtual Private Networks Instant Messaging Setting Up a Web Server Related Sites Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 16 WRITING A NETWORK APPLICATION Objectives Introduction Client-Server Model Connection-Oriented Versus Connectionless Communication Sockets Network Programming Languages Network Applications CGI IP Address Calculator Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART IV: NETWORK OPERATING SYSTEMS CHAPTER 17 AN INTRODUCTION TO NETWORKING WITH WINDOWS Objectives Introduction Microsoft Networking The NetBEUI Protocol The Network Neighborhood Network Printing Sharing Files Over a Network Dial-Up Networking ICA Technology Connecting to the Internet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 18 WINDOWS NT/2000 DOMAINS Objectives Introduction Windows NT Operating System Logon Windows NT Security Menu Domains Windows 2000 Windows NT Domains Basic Capabilities of Windows Server Operating Systems Adding a Client to a Windows Network Logging onto a Network Running a Network Server User Profiles Security Windows 2000 Domains Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 19 UNIX AND LINUX Objectives Introduction Red Hat Linux Environment Linux Graphical User Environment Installation and Configuration Application Software System Administration, Management, and Security TCP/IP Network Management Samba Network Information Services Network File System Services Apache Web Server Linux Documentation Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 20 OTHER NETWORK OPERATING SYSTEMS Objectives Introduction NetWare OpenVMS Macintosh OS (MACOS) OS/2 Warp Additional Network Operating Systems Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART V: NETWORK SECURITY AND FORENSICS CHAPTER 21 CRYPTOGRAPHY AND SECURITY Objectives Introduction History of Cryptography and Security Symmetric versus Asymmetric Encryption Encryption Strength Encryption Algorithms Encryption versus Hashing Security Protocols Steganography Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 22 SECURITY HARDWARE Objectives Introduction Media Vulnerabilities Managed Switches Firewalls IDS Hardware Biometric Devices Fault Tolerance Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 23 SECURITY SOFTWARE Objectives Introduction Packet Sniffing Port Scanning Password Cracking Host-Based Intrusion Detection Network-Based Intrusion Detection Secure Remote Access Security Policies Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 24 FORENSIC TECHNIQUES Objectives Introduction Forming a CSIRT Digital Evidence Handling File Systems and Operating Systems Where is the Information? Live Analysis versus Static Analysis Analyzing Network Traffic Legal and Ethical Issues The Forensic Marketplace Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects GLOSSARY APPENDIX A INTERNET MILESTONES APPENDIX B WEB RESOURCES APPENDIX C EXTENDED ASCII CHARACTER SET APPENDIX D MATHEMATICS FOR NETWORKING AND SECURITY APPENDIX E MODEMS APPENDIX F THE ETHEREAL - WIRESHARK PROTOCOL ANALYZER APPENDIX G NETWORK AND SECURITY CERTIFICATIONS APPENDIX H TELECOMMUNICATION TECHNOLOGIES APPENDIX I SECURITY POLICY EXAMPLES APPENDIX J SETTING UP A NETWORKING REPAIR SHOP ANSWERS TO ODD-NUMBERED REVIEW QUIZ QUESTIONS INDEX

Product Details

ISBN:
9781423903161
Author:
Mansfield, Kenneth C.
Publisher:
Course Technology
Author:
Mansfield
Author:
Jr., Kenneth C.(Kenneth C. Mansfield, Jr.) Mansfield
Author:
Mansfield, Jr., Kenneth C.(Kenneth C. Mansfield, Jr.)
Author:
Antonakos, James L.
Author:
Jr., Kenneth C. Mansfield
Author:
Antonakos, James
Author:
Mansfield, Jr., Kenneth C.
Subject:
Networking - General
Subject:
Neural Networks
Subject:
Introduction to networking;Ethernet;network media;hubs;switches;routers;network troubleshooting;TCP/IP;routing protocol;FTP;Telnet;SSH;TLS;VPN
Subject:
Introduction to networking
Subject:
Ethernet
Subject:
network media
Subject:
hubs
Subject:
switches
Subject:
Routers
Subject:
network troubleshooting
Subject:
TCP/IP
Subject:
routing protocol
Subject:
FTP
Subject:
Telnet
Subject:
SSH
Subject:
TLS
Subject:
VPN
Edition Description:
Course Technology
Series:
Networking
Publication Date:
20090531
Binding:
TRADE PAPER
Grade Level:
College/higher education:
Language:
English
Illustrations:
Y
Pages:
992
Dimensions:
9.20x7.50x1.60 in. 3.35 lbs.

Related Subjects

Arts and Entertainment » Music » Instruments » Guitar
Computers and Internet » Artificial Intelligence » General
Computers and Internet » Networking » General

Computer Networking for Lans To Wans - With CD (10 Edition) Used Trade Paper
0 stars - 0 reviews
$132.00 In Stock
Product details 992 pages Cengage Learning - English 9781423903161 Reviews:
"Synopsis" by , Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.