Business data networks and security /

Bibliographic Details
Main Author: Panko, R. R
Other Authors: Panko, Julia L
Format: Book
Language:English
Published: Boston : Pearson, ©2013
Edition:9th ed
Subjects:
LEADER 15434nam a2200625 a 4500
001 d76a1552-ed6e-49a4-9cd3-f772ea138a44
005 20231119000000.0
008 120329s2013 maua 001 0 eng
010 |a  2012012777 
016 7 |a 016184411  |2 Uk 
019 |a 794039144  |a 806431232 
020 |a 0132742934 
020 |a 0133080455 
020 |a 9780132742931 
020 |a 9780133080452 
035 |a (MdBJ)5178534 
035 |a 5178534 
035 |a ocn782128097 
035 |z (OCoLC)794039144  |z (OCoLC)806431232 
040 |a DLC  |b eng  |c DLC  |d BTCTA  |d OCLCO  |d YDXCP  |d BWX  |d CDX  |d UV0  |d UKMGB  |d CHVBK  |d OCLCF  |d SZR  |d OCLCQ  |d S3O  |d NhCcYME 
042 |a pcc 
049 |a JHEE 
050 0 0 |a HD30.37  |b .P36 2013 
082 0 0 |a 005.7/1  |2 23 
100 1 |a Panko, R. R 
245 1 0 |a Business data networks and security /  |c Raymond R. Panko, Julia L. Panko 
250 |a 9th ed 
260 |a Boston :  |b Pearson,  |c ©2013 
300 |a xxiv, 500 pages :  |b illustrations (chiefly color) ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
500 |a Includes index 
500 |a Revised edition of: Business data networks and telecommunications. 8th ed 
505 0 0 |a Contents note continued:  |t Transmission Control Protocol (TCP) --  |t Fields in TCP/IP Segments --  |t Openings and Abrupt TCP Closes --  |t User Datagram Protocol (UDP) --  |t Other TCP/IP Standards --  |t Dynamic Routing Protocols --  |t Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 9  |t TCP/IP Internetworking II --  |t Introduction --  |t Core TCP/IP Management Tasks --  |t IP Subnet Planning --  |t Network Address Translation (NAT) --  |t Domain Name System (DNS) --  |t DHCP Servers --  |t Simple Network Management Protocol (SNMP) --  |t Multiprotocol Label Switching --  |t Making Routing More Efficient --  |t MPLS Operation --  |t Benefits of Label Switching --  |t MPLS Boundaries --  |t Securing Internet Transmission --  |t Virtual Private Networks --  |t IPsec VPNs --  |t IPsec Transport Mode --  |t IPsec Tunnel Mode --  |t Remote-Access and Site-to-Site VPNs --  |t IPsec Security Associations and Policy Servers --  |t SSL/TLS VPNs --  |t Managing IP Version 6 (IPv6) --  |t Internet Layer Protocol Stacks --  |t IPv6 Subnetting --  |t IPv6 Configuration --  |t Other IPv6 Standards --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 10  |t Wide Area Networks --  |t LANs and WANs (and MANs) --  |t LANs versus MANs and WANs --  |t Other Aspects of WANs --  |t Three Basic WAN Components --  |t Wired Access Links --  |t Public Switched Telephone Network (PSTN) Access Lines --  |t Business Leased Lines --  |t Leased Line Speeds --  |t Business Digital Subscriber Line (DSL) Service --  |t Residential DSL Service --  |t Cable Modem Service --  |t Network Core --  |t Leased Line Wide Area Networks --  |t Public Switched Data Network (PSDN) --  |t Virtual Circuit Operation --  |t Using the Internet for Wide Area Networking --  |t Attractions and Issues --  |t Securing the Internet --  |t Using a Single ISP --  |t Cellular Data Service --  |t Cellular Service --  |t Cells --  |t Why Cells? --  |t Handoffs versus Roaming --  |t Using Cellular Telephony for Data Transmission --  |t Lies, Damned Lies, and Mobile Service Speeds --  |t Cellular-Wi-Fi Convergence --  |t Virtual Wide Area Networks (Virtual WANs) --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 11  |t Networked Applications --  |t Papa Murphy's --  |t Introduction --  |t Networked Applications --  |t Evolution of Client Devices and Networking --  |t Application Security --  |t Electronic Mail (E-Mail) --  |t Importance --  |t E-Mail Standards --  |t Simple Mail Transfer Protocol (SMTP) --  |t Receiving Mail (POP and IMAP) --  |t Web-Enabled E-Mail --  |t Malware Filtering in E-Mail --  |t Voice over IP (VOIP) --  |t Basics --  |t VoIP Signaling --  |t VoIP Transport --  |t World Wide Web --  |t HTTP and HTML Standards --  |t Complex Webpages --  |t HTTP Request and Response Messages --  |t Cloud Computing --  |t Shared Project --  |t Cloud Computing --  |t Software as a Service (SaaS) --  |t Cloud Utility Computing --  |t Why Is Cloud Computing a Hot Topic Now? --  |t Managing Cloud Computing --  |t Service-Oriented Architectures --  |t Traditional Software Architectures and Service-Oriented Architectures (SAAS) --  |t Reuse and Language Independence --  |t Web Services --  |t Perspective --  |t Peer-to-Peer (P2P) Application Architectures --  |t Traditional Client/Server Applications --  |t P2P Applications --  |t P2P File-Sharing Applications: BitTorrent --  |t P2P Communication Applications: Skype --  |t P2P Processing Applications: SET1@Home --  |t Facilitating Servers and P2P Applications --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions 
505 0 0 |a note:  |t Basic Concepts and Principles --  |g ch. 1  |t Welcome to the Cloud --  |t In the Clouds --  |t Jason Akana --  |t Claire Lorek --  |t John Lee --  |t Rogue Access Point --  |t Networking and Security --  |t Basic Network Terminology --  |t Networks, Hosts, and Applications --  |t Application Interactions --  |t Speed --  |t Packet Switching and the ARPANET --  |t Larry Roberts Has a Burstiness Problem --  |t Packet Switching Presents a Possible Solution --  |t Physical Links and Data Links --  |t Larry Roberts Builds a Solution --  |t Network Working Group --  |t E-Mail --  |t Internet --  |t Bob Kahn Has a Problem --  |t Bob Kahn and Vint Cerf Find a Solution --  |t Second Layer of Networking --  |t Internet Evolves --  |t TCP/IP Standards --  |t Internet Is Born---Slowly --  |t Internet Goes Commercial --  |t Supervisory Applications --  |t Small Home Network --  |t Components --  |t Wireless Access Router --  |t Services --  |t Configuration --  |t How This Book Is Organized --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 1a  |t Hands-On: Windows Networking --  |t Hands-On Networking Tools --  |t Binary and Decimal Conversions Using the Microsoft Windows Calculator --  |t Test Your Download Speed --  |t Working with the Windows Command Line --  |t Ping and Traced --  |t Nslookup --  |t RFCs --  |g ch. 2  |t Network Standards --  |t Introduction --  |t Standard = Protocol --  |t Network Standards --  |t Recap of Chapter --  |t Standards Concepts --  |t Network Standard Characteristics --  |t Examples of Message Ordering --  |t Message Ordering in HTTP --  |t Message Ordering and Reliability in TCP at the Transport Layer --  |t Examples of Message Syntax --  |t Syntax: General Message Organization --  |t Ethernet Frame Syntax --  |t Internet Protocol (IP) Packet Syntax --  |t Transmission Control Protocol (TCP) Segment Syntax --  |t User Datagram Protocol (UDP) Datagram Syntax --  |t Port Numbers --  |t HTTP Request and Response Message Syntax --  |t Converting Application Messages into Bits --  |t Encoding --  |t Encoding Text as ASCII --  |t Whole Binary Numbers --  |t Encoding Alternatives --  |t Encoding Voice --  |t Vertical Communication on Hosts --  |t Major Standards Architectures --  |t Architectures --  |t OSI Network Standards Architecture --  |t TCP/IP Network Standards Architecture --  |t Application Layer --  |t TCP/IP and OSI: The Hybrid TCP/IP-OSI Standards Architecture --  |t Higher Layers in OSI --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 2a  |t Hands-On: Wireshark Packet Capture --  |t Introduction --  |t Getting Wireshark --  |t Using Wireshark --  |t Getting Started --  |t Starting a Packet Capture --  |t Getting Data --  |t Stopping Data Collection --  |t Looking at Individual Packets --  |t Options --  |t Exercises --  |g ch. 3  |t Network Security --  |t Steuben Arc --  |t Introduction --  |t Types of Attacks --  |t Malware Attacks --  |t Attacks on Individuals --  |t Human Break-Ins (Hacking) --  |t Denial-of-Service (DoS) Attacks Using Bots --  |t Types of Attackers --  |t Traditional Attackers --  |t Criminal Attackers --  |t Cyberterrorists and National Governments --  |t Planning --  |t Security Is a Management Issue --  |t Planning Principles --  |t Policy-Based Security --  |t Authentication --  |t Reusable Passwords --  |t Other Forms of Authentication --  |t Firewalls --  |t Dropping and Logging Provable Attack Packets --  |t Ingress and Egress Filtering --  |t Static Packet Filtering --  |t Stateful Firewall Filtering --  |t Deep Inspection Firewalls --  |t Protecting Dialogues Cryptography --  |t Symmetric Key Encryption for Confidentiality --  |t Electronic Signatures --  |t Responding --  |t Stages --  |t Major Incidents and CSIRTs --  |t Disasters and Business Continuity --  |t Rehearsals --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 4  |t Network Management --  |t Introduction --  |t SDLC versus SLC --  |t Cost --  |t Strategic Network Planning --  |t Network Quality of Service (QoS) --  |t Transmission Speed --  |t Rated Speed versus Throughput --  |t Other Quality-of-Service Metrics --  |t Service Level Agreements (SLAs) --  |t Design --  |t Traffic Analysis --  |t Redundancy --  |t Topology --  |t Leased Line Network Topologies --  |t Handling Momentary Traffic Peaks --  |t Reducing Capacity Needs --  |t Natural Designs --  |t Evaluating Alternatives --  |t Minimum Requirements --  |t Product Selection with Multicriteria Decision Making --  |t Cost --  |t Operational Management --  |t OAM&P --  |t Network Management Software --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 4a  |t Hands-On: Microsoft Office Visio --  |t What Is Visio? --  |t Using Visio --  |t Exercise --  |t Applying Concepts and Principles: Up through the Layers --  |g ch. 5  |t Wired Ethernet LANs --  |t Introduction --  |t LANs and WANs --  |t Ethernet --  |t Ethernet Standards Development --  |t Physical and Data Link Layer Operation --  |t Ethernet Physical Layer Standards --  |t Signaling --  |t 4-Pair Unshielded Twisted Pair Copper Wiring --  |t Optical Fiber --  |t Carrier Fiber --  |t Link Aggregation (Bonding) --  |t Ethernet Physical Layer Standards and Network Design --  |t Ethernet Frame --  |t Ethernet Frame's Organization --  |t Preamble and Start of Frame Delimiter Fields --  |t Source and Destination Address Fields --  |t Tag Fields --  |t Length Field --  |t Data Field --  |t PAD Field --  |t Frame Check Sequence Field --  |t Basic Ethernet Data Link Layer Switch Operation --  |t Frame Forwarding --  |t Hierarchical Switch Topology --  |t Advanced Ethernet Switch Operation --  |t Rapid Spanning Tree Protocol (RSTP) --  |t Virtual LANs and Ethernet Switches --  |t Priority --  |t Manageability --  |t Power over Ethernet (POE) --  |t Ethernet Security --  |t Port-Based Access Control (802.1X) --  |t Security Standards Come from the 802.1 Working Group --  |t 802.3ba: 40 Gbps and 100 Gbps Ethernet --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 5a  |t Hands-On: Cutting and Connectorizing UTP --  |t Introduction --  |t Solid and Stranded Wiring --  |t Solid-Wire UTP versus Stranded-Wire UTP --  |t Relative Advantages --  |t Adding Connectors --  |t Cutting the Cord --  |t Stripping the Cord --  |t Working with the Exposed Pairs --  |t Pair Colors --  |t Untwisting the Pairs --  |t Ordering the Pairs --  |t Cutting the Wires --  |t Adding the Connector --  |t Holding the Connector --  |t Sliding in the Wires --  |t Some Jacket Inside the Connector --  |t Crimping --  |t Pressing Down --  |t Making Electrical Contact --  |t Strain Relief --  |t Testing --  |t Testing with Continuity Testers --  |t Testing for Signal Quality --  |g ch. 5b  |t Hands-On: Ethernet Switching --  |t Exercise --  |t What You Will Need --  |t Creating the Network --  |t Creating a Loop --  |g ch. 6  |t Wireless LANs I --  |t Christopher Lorek --  |t Introduction --  |t Basic 802.11 Wireless LAN (WLAN) Operation --  |t Radio Signal Propagation --  |t Frequencies --  |t Antennas --  |t Wireless Propagation Problems --  |t Radio Bands, Bandwidth, and Spread Spectrum Transmission --  |t Radio Bands --  |t Signal and Channel Bandwidth --  |t Golden Zone --  |t Licensed and Unlicensed Radio Bands --  |t 2.4 GHz and 5 GHz Unlicensed Bands --  |t Normal and Spread Spectrum Transmission --  |t Why Spread Spectrum Transmission? --  |t Spread Spectrum Transmission Methods --  |t 802.11 WLAN Operation --  |t Extending the Wired LAN --  |t Wireless Access Points --  |t Basic Service Sets (BSSs) --  |t Extended Service Sets (ESSS), Handoff, and Roaming --  |t Sharing a Single Channel --  |t Controlling 802.11 Transmission --  |t 802.11 Transmission Standards --  |t Characteristics of 802.11g, 802.11n, 802.11ac, and 802.11ad --  |t Spread Spectrum Method --  |t Bands and Channel Bandwidth --  |t MIMO --  |t Beamforming and Multiuser MIMO --  |t Speed, Throughput, and Distance --  |t Backward Compatibility --  |t On the Horizon --  |t Advanced Operation --  |t Wi-Fi Direct --  |t Mesh Networking --  |t Standards and Compatibility --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Questions --  |g ch. 6a  |t Using Xirrus WI-FI Inspector --  |t Introduction --  |t Four Windows --  |t Radar Window (Read the Fine Print) --  |t Connection Window --  |t Networks Window --  |t Signal History --  |t Other Groups on the Ribbon --  |t Tests --  |t Connection Test --  |t Speed Test --  |t Quality Test --  |t Activities --  |g ch.  
505 0 0 |g 7  |t Wireless LANs II --  |t Introduction --  |t TJX --  |t 802.11 WLAN Security --  |t WLAN Security Threats --  |t 802.11 Core Security Standards --  |t Wired Equivalent Privacy (WEP) Security --  |t WPA (Wireless Protected Access) --  |t 802.11i (WPA2) --  |t 802.1X Mode Operation with Added Client-Access Point Security --  |t Pre-Shared Key (PSK) Mode --  |t Evil Twin Access Points and Virtual Private Networks (VPNs) --  |t Wi-Fi Protected Setup --  |t Denial-of-Service Attacks --  |t 802.11 Wireless LAN Management --  |t Access Point Placement --  |t Remote Management: Smart Access Points versus Wireless Switches --  |t Expressing Power Ratios in Decibels --  |t Other Local Wireless Technologies --  |t Bluetooth --  |t Near Field Communication (NFC) --  |t Ultrawideband (UWB) --  |t Security in Emerging Local Wireless Transmission Technologies --  |t Conclusion --  |t Synopsis --  |t End-of-Chapter Question --  |g ch. 8  |t TCP/IP Internetworking I --  |t Introduction --  |t TCP/IP Recap --  |t TCP/IP Architecture and the IETF --  |t Simple IP at the Internet Layer --  |t Reliable Heavyweight TCP at the Transport Layer --  |t Unreliable Lightweight UDP at the Transport Layer --  |t IP Routing --  |t Hierarchical IP Addressing --  |t Routers, Networks, and Subnets --  |t Network and Subnet Masks --  |t How Routers Process Packets --  |t Switching versus Routing --  |t Routing Table --  |t Rows Are Routes --  |g Step 1  |t Finding All Row Matches --  |g Step 2  |t Selecting the Best-Match Row --  |g Step 3  |t Sending the Packet Back Out --  |t Cheating (Decision Caching) --  |t Masking When Masks Do Not Break at 8-Bit Boundaries --  |t Address Resolution Protocol --  |t Internet Protocol Version 4 (IPv4) Fields --  |t IP Time to Live (TTL) Field --  |t IP Protocol Field --  |t IP Identification, Flags, and Fragment Offset Fields --  |t IP Options --  |t IP Diff-Serv --  |t IP Version 6 (IPv6) --  |t Outgrowing IPv4 --  |t IPv6 --  |t Writing 128-Bit IPv6 Addresses --  |t IPv6 Header --  |t Extension Headers -- 
590 |a OCLC  |b WorldCat Holdings 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Computer networks  |x Management 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer networks  |x Management  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Datakommunikation  |2 sao 
650 7 |a Datanät  |2 sao 
650 7 |a Rechnernetz  |2 gnd 
650 7 |a Unternehmen  |2 gnd 
700 1 |a Panko, Julia L 
700 1 |a Panko, R. R  |t Business data networks and telecommunications. 
999 1 0 |i d76a1552-ed6e-49a4-9cd3-f772ea138a44  |l 991041780059707861  |s US-MDBJ  |m business_data_networks_and_security________________________________________2013____9__pearsa________________________________________panko__r__r________________________p 
999 1 1 |l 991041780059707861  |s ISIL:US-MDBJ  |t BKS  |a ShMSEL shmmain  |b 31151032252631  |c HD30.37 .P36 2013  |d 0  |x jhbooks  |y 23405750330007861  |p LOANABLE