|
|
|
|
LEADER |
15434nam a2200625 a 4500 |
001 |
d76a1552-ed6e-49a4-9cd3-f772ea138a44 |
005 |
20231119000000.0 |
008 |
120329s2013 maua 001 0 eng |
010 |
|
|
|a 2012012777
|
016 |
7 |
|
|a 016184411
|2 Uk
|
019 |
|
|
|a 794039144
|a 806431232
|
020 |
|
|
|a 0132742934
|
020 |
|
|
|a 0133080455
|
020 |
|
|
|a 9780132742931
|
020 |
|
|
|a 9780133080452
|
035 |
|
|
|a (MdBJ)5178534
|
035 |
|
|
|a 5178534
|
035 |
|
|
|a ocn782128097
|
035 |
|
|
|z (OCoLC)794039144
|z (OCoLC)806431232
|
040 |
|
|
|a DLC
|b eng
|c DLC
|d BTCTA
|d OCLCO
|d YDXCP
|d BWX
|d CDX
|d UV0
|d UKMGB
|d CHVBK
|d OCLCF
|d SZR
|d OCLCQ
|d S3O
|d NhCcYME
|
042 |
|
|
|a pcc
|
049 |
|
|
|a JHEE
|
050 |
0 |
0 |
|a HD30.37
|b .P36 2013
|
082 |
0 |
0 |
|a 005.7/1
|2 23
|
100 |
1 |
|
|a Panko, R. R
|
245 |
1 |
0 |
|a Business data networks and security /
|c Raymond R. Panko, Julia L. Panko
|
250 |
|
|
|a 9th ed
|
260 |
|
|
|a Boston :
|b Pearson,
|c ©2013
|
300 |
|
|
|a xxiv, 500 pages :
|b illustrations (chiefly color) ;
|c 24 cm
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
500 |
|
|
|a Includes index
|
500 |
|
|
|a Revised edition of: Business data networks and telecommunications. 8th ed
|
505 |
0 |
0 |
|a Contents note continued:
|t Transmission Control Protocol (TCP) --
|t Fields in TCP/IP Segments --
|t Openings and Abrupt TCP Closes --
|t User Datagram Protocol (UDP) --
|t Other TCP/IP Standards --
|t Dynamic Routing Protocols --
|t Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 9
|t TCP/IP Internetworking II --
|t Introduction --
|t Core TCP/IP Management Tasks --
|t IP Subnet Planning --
|t Network Address Translation (NAT) --
|t Domain Name System (DNS) --
|t DHCP Servers --
|t Simple Network Management Protocol (SNMP) --
|t Multiprotocol Label Switching --
|t Making Routing More Efficient --
|t MPLS Operation --
|t Benefits of Label Switching --
|t MPLS Boundaries --
|t Securing Internet Transmission --
|t Virtual Private Networks --
|t IPsec VPNs --
|t IPsec Transport Mode --
|t IPsec Tunnel Mode --
|t Remote-Access and Site-to-Site VPNs --
|t IPsec Security Associations and Policy Servers --
|t SSL/TLS VPNs --
|t Managing IP Version 6 (IPv6) --
|t Internet Layer Protocol Stacks --
|t IPv6 Subnetting --
|t IPv6 Configuration --
|t Other IPv6 Standards --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 10
|t Wide Area Networks --
|t LANs and WANs (and MANs) --
|t LANs versus MANs and WANs --
|t Other Aspects of WANs --
|t Three Basic WAN Components --
|t Wired Access Links --
|t Public Switched Telephone Network (PSTN) Access Lines --
|t Business Leased Lines --
|t Leased Line Speeds --
|t Business Digital Subscriber Line (DSL) Service --
|t Residential DSL Service --
|t Cable Modem Service --
|t Network Core --
|t Leased Line Wide Area Networks --
|t Public Switched Data Network (PSDN) --
|t Virtual Circuit Operation --
|t Using the Internet for Wide Area Networking --
|t Attractions and Issues --
|t Securing the Internet --
|t Using a Single ISP --
|t Cellular Data Service --
|t Cellular Service --
|t Cells --
|t Why Cells? --
|t Handoffs versus Roaming --
|t Using Cellular Telephony for Data Transmission --
|t Lies, Damned Lies, and Mobile Service Speeds --
|t Cellular-Wi-Fi Convergence --
|t Virtual Wide Area Networks (Virtual WANs) --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 11
|t Networked Applications --
|t Papa Murphy's --
|t Introduction --
|t Networked Applications --
|t Evolution of Client Devices and Networking --
|t Application Security --
|t Electronic Mail (E-Mail) --
|t Importance --
|t E-Mail Standards --
|t Simple Mail Transfer Protocol (SMTP) --
|t Receiving Mail (POP and IMAP) --
|t Web-Enabled E-Mail --
|t Malware Filtering in E-Mail --
|t Voice over IP (VOIP) --
|t Basics --
|t VoIP Signaling --
|t VoIP Transport --
|t World Wide Web --
|t HTTP and HTML Standards --
|t Complex Webpages --
|t HTTP Request and Response Messages --
|t Cloud Computing --
|t Shared Project --
|t Cloud Computing --
|t Software as a Service (SaaS) --
|t Cloud Utility Computing --
|t Why Is Cloud Computing a Hot Topic Now? --
|t Managing Cloud Computing --
|t Service-Oriented Architectures --
|t Traditional Software Architectures and Service-Oriented Architectures (SAAS) --
|t Reuse and Language Independence --
|t Web Services --
|t Perspective --
|t Peer-to-Peer (P2P) Application Architectures --
|t Traditional Client/Server Applications --
|t P2P Applications --
|t P2P File-Sharing Applications: BitTorrent --
|t P2P Communication Applications: Skype --
|t P2P Processing Applications: SET1@Home --
|t Facilitating Servers and P2P Applications --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions
|
505 |
0 |
0 |
|a note:
|t Basic Concepts and Principles --
|g ch. 1
|t Welcome to the Cloud --
|t In the Clouds --
|t Jason Akana --
|t Claire Lorek --
|t John Lee --
|t Rogue Access Point --
|t Networking and Security --
|t Basic Network Terminology --
|t Networks, Hosts, and Applications --
|t Application Interactions --
|t Speed --
|t Packet Switching and the ARPANET --
|t Larry Roberts Has a Burstiness Problem --
|t Packet Switching Presents a Possible Solution --
|t Physical Links and Data Links --
|t Larry Roberts Builds a Solution --
|t Network Working Group --
|t E-Mail --
|t Internet --
|t Bob Kahn Has a Problem --
|t Bob Kahn and Vint Cerf Find a Solution --
|t Second Layer of Networking --
|t Internet Evolves --
|t TCP/IP Standards --
|t Internet Is Born---Slowly --
|t Internet Goes Commercial --
|t Supervisory Applications --
|t Small Home Network --
|t Components --
|t Wireless Access Router --
|t Services --
|t Configuration --
|t How This Book Is Organized --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 1a
|t Hands-On: Windows Networking --
|t Hands-On Networking Tools --
|t Binary and Decimal Conversions Using the Microsoft Windows Calculator --
|t Test Your Download Speed --
|t Working with the Windows Command Line --
|t Ping and Traced --
|t Nslookup --
|t RFCs --
|g ch. 2
|t Network Standards --
|t Introduction --
|t Standard = Protocol --
|t Network Standards --
|t Recap of Chapter --
|t Standards Concepts --
|t Network Standard Characteristics --
|t Examples of Message Ordering --
|t Message Ordering in HTTP --
|t Message Ordering and Reliability in TCP at the Transport Layer --
|t Examples of Message Syntax --
|t Syntax: General Message Organization --
|t Ethernet Frame Syntax --
|t Internet Protocol (IP) Packet Syntax --
|t Transmission Control Protocol (TCP) Segment Syntax --
|t User Datagram Protocol (UDP) Datagram Syntax --
|t Port Numbers --
|t HTTP Request and Response Message Syntax --
|t Converting Application Messages into Bits --
|t Encoding --
|t Encoding Text as ASCII --
|t Whole Binary Numbers --
|t Encoding Alternatives --
|t Encoding Voice --
|t Vertical Communication on Hosts --
|t Major Standards Architectures --
|t Architectures --
|t OSI Network Standards Architecture --
|t TCP/IP Network Standards Architecture --
|t Application Layer --
|t TCP/IP and OSI: The Hybrid TCP/IP-OSI Standards Architecture --
|t Higher Layers in OSI --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 2a
|t Hands-On: Wireshark Packet Capture --
|t Introduction --
|t Getting Wireshark --
|t Using Wireshark --
|t Getting Started --
|t Starting a Packet Capture --
|t Getting Data --
|t Stopping Data Collection --
|t Looking at Individual Packets --
|t Options --
|t Exercises --
|g ch. 3
|t Network Security --
|t Steuben Arc --
|t Introduction --
|t Types of Attacks --
|t Malware Attacks --
|t Attacks on Individuals --
|t Human Break-Ins (Hacking) --
|t Denial-of-Service (DoS) Attacks Using Bots --
|t Types of Attackers --
|t Traditional Attackers --
|t Criminal Attackers --
|t Cyberterrorists and National Governments --
|t Planning --
|t Security Is a Management Issue --
|t Planning Principles --
|t Policy-Based Security --
|t Authentication --
|t Reusable Passwords --
|t Other Forms of Authentication --
|t Firewalls --
|t Dropping and Logging Provable Attack Packets --
|t Ingress and Egress Filtering --
|t Static Packet Filtering --
|t Stateful Firewall Filtering --
|t Deep Inspection Firewalls --
|t Protecting Dialogues Cryptography --
|t Symmetric Key Encryption for Confidentiality --
|t Electronic Signatures --
|t Responding --
|t Stages --
|t Major Incidents and CSIRTs --
|t Disasters and Business Continuity --
|t Rehearsals --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 4
|t Network Management --
|t Introduction --
|t SDLC versus SLC --
|t Cost --
|t Strategic Network Planning --
|t Network Quality of Service (QoS) --
|t Transmission Speed --
|t Rated Speed versus Throughput --
|t Other Quality-of-Service Metrics --
|t Service Level Agreements (SLAs) --
|t Design --
|t Traffic Analysis --
|t Redundancy --
|t Topology --
|t Leased Line Network Topologies --
|t Handling Momentary Traffic Peaks --
|t Reducing Capacity Needs --
|t Natural Designs --
|t Evaluating Alternatives --
|t Minimum Requirements --
|t Product Selection with Multicriteria Decision Making --
|t Cost --
|t Operational Management --
|t OAM&P --
|t Network Management Software --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 4a
|t Hands-On: Microsoft Office Visio --
|t What Is Visio? --
|t Using Visio --
|t Exercise --
|t Applying Concepts and Principles: Up through the Layers --
|g ch. 5
|t Wired Ethernet LANs --
|t Introduction --
|t LANs and WANs --
|t Ethernet --
|t Ethernet Standards Development --
|t Physical and Data Link Layer Operation --
|t Ethernet Physical Layer Standards --
|t Signaling --
|t 4-Pair Unshielded Twisted Pair Copper Wiring --
|t Optical Fiber --
|t Carrier Fiber --
|t Link Aggregation (Bonding) --
|t Ethernet Physical Layer Standards and Network Design --
|t Ethernet Frame --
|t Ethernet Frame's Organization --
|t Preamble and Start of Frame Delimiter Fields --
|t Source and Destination Address Fields --
|t Tag Fields --
|t Length Field --
|t Data Field --
|t PAD Field --
|t Frame Check Sequence Field --
|t Basic Ethernet Data Link Layer Switch Operation --
|t Frame Forwarding --
|t Hierarchical Switch Topology --
|t Advanced Ethernet Switch Operation --
|t Rapid Spanning Tree Protocol (RSTP) --
|t Virtual LANs and Ethernet Switches --
|t Priority --
|t Manageability --
|t Power over Ethernet (POE) --
|t Ethernet Security --
|t Port-Based Access Control (802.1X) --
|t Security Standards Come from the 802.1 Working Group --
|t 802.3ba: 40 Gbps and 100 Gbps Ethernet --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 5a
|t Hands-On: Cutting and Connectorizing UTP --
|t Introduction --
|t Solid and Stranded Wiring --
|t Solid-Wire UTP versus Stranded-Wire UTP --
|t Relative Advantages --
|t Adding Connectors --
|t Cutting the Cord --
|t Stripping the Cord --
|t Working with the Exposed Pairs --
|t Pair Colors --
|t Untwisting the Pairs --
|t Ordering the Pairs --
|t Cutting the Wires --
|t Adding the Connector --
|t Holding the Connector --
|t Sliding in the Wires --
|t Some Jacket Inside the Connector --
|t Crimping --
|t Pressing Down --
|t Making Electrical Contact --
|t Strain Relief --
|t Testing --
|t Testing with Continuity Testers --
|t Testing for Signal Quality --
|g ch. 5b
|t Hands-On: Ethernet Switching --
|t Exercise --
|t What You Will Need --
|t Creating the Network --
|t Creating a Loop --
|g ch. 6
|t Wireless LANs I --
|t Christopher Lorek --
|t Introduction --
|t Basic 802.11 Wireless LAN (WLAN) Operation --
|t Radio Signal Propagation --
|t Frequencies --
|t Antennas --
|t Wireless Propagation Problems --
|t Radio Bands, Bandwidth, and Spread Spectrum Transmission --
|t Radio Bands --
|t Signal and Channel Bandwidth --
|t Golden Zone --
|t Licensed and Unlicensed Radio Bands --
|t 2.4 GHz and 5 GHz Unlicensed Bands --
|t Normal and Spread Spectrum Transmission --
|t Why Spread Spectrum Transmission? --
|t Spread Spectrum Transmission Methods --
|t 802.11 WLAN Operation --
|t Extending the Wired LAN --
|t Wireless Access Points --
|t Basic Service Sets (BSSs) --
|t Extended Service Sets (ESSS), Handoff, and Roaming --
|t Sharing a Single Channel --
|t Controlling 802.11 Transmission --
|t 802.11 Transmission Standards --
|t Characteristics of 802.11g, 802.11n, 802.11ac, and 802.11ad --
|t Spread Spectrum Method --
|t Bands and Channel Bandwidth --
|t MIMO --
|t Beamforming and Multiuser MIMO --
|t Speed, Throughput, and Distance --
|t Backward Compatibility --
|t On the Horizon --
|t Advanced Operation --
|t Wi-Fi Direct --
|t Mesh Networking --
|t Standards and Compatibility --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Questions --
|g ch. 6a
|t Using Xirrus WI-FI Inspector --
|t Introduction --
|t Four Windows --
|t Radar Window (Read the Fine Print) --
|t Connection Window --
|t Networks Window --
|t Signal History --
|t Other Groups on the Ribbon --
|t Tests --
|t Connection Test --
|t Speed Test --
|t Quality Test --
|t Activities --
|g ch.
|
505 |
0 |
0 |
|g 7
|t Wireless LANs II --
|t Introduction --
|t TJX --
|t 802.11 WLAN Security --
|t WLAN Security Threats --
|t 802.11 Core Security Standards --
|t Wired Equivalent Privacy (WEP) Security --
|t WPA (Wireless Protected Access) --
|t 802.11i (WPA2) --
|t 802.1X Mode Operation with Added Client-Access Point Security --
|t Pre-Shared Key (PSK) Mode --
|t Evil Twin Access Points and Virtual Private Networks (VPNs) --
|t Wi-Fi Protected Setup --
|t Denial-of-Service Attacks --
|t 802.11 Wireless LAN Management --
|t Access Point Placement --
|t Remote Management: Smart Access Points versus Wireless Switches --
|t Expressing Power Ratios in Decibels --
|t Other Local Wireless Technologies --
|t Bluetooth --
|t Near Field Communication (NFC) --
|t Ultrawideband (UWB) --
|t Security in Emerging Local Wireless Transmission Technologies --
|t Conclusion --
|t Synopsis --
|t End-of-Chapter Question --
|g ch. 8
|t TCP/IP Internetworking I --
|t Introduction --
|t TCP/IP Recap --
|t TCP/IP Architecture and the IETF --
|t Simple IP at the Internet Layer --
|t Reliable Heavyweight TCP at the Transport Layer --
|t Unreliable Lightweight UDP at the Transport Layer --
|t IP Routing --
|t Hierarchical IP Addressing --
|t Routers, Networks, and Subnets --
|t Network and Subnet Masks --
|t How Routers Process Packets --
|t Switching versus Routing --
|t Routing Table --
|t Rows Are Routes --
|g Step 1
|t Finding All Row Matches --
|g Step 2
|t Selecting the Best-Match Row --
|g Step 3
|t Sending the Packet Back Out --
|t Cheating (Decision Caching) --
|t Masking When Masks Do Not Break at 8-Bit Boundaries --
|t Address Resolution Protocol --
|t Internet Protocol Version 4 (IPv4) Fields --
|t IP Time to Live (TTL) Field --
|t IP Protocol Field --
|t IP Identification, Flags, and Fragment Offset Fields --
|t IP Options --
|t IP Diff-Serv --
|t IP Version 6 (IPv6) --
|t Outgrowing IPv4 --
|t IPv6 --
|t Writing 128-Bit IPv6 Addresses --
|t IPv6 Header --
|t Extension Headers --
|
590 |
|
|
|a OCLC
|b WorldCat Holdings
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures
|
650 |
|
0 |
|a Computer networks
|x Management
|
650 |
|
0 |
|a Computer networks
|x Security measures
|
650 |
|
0 |
|a Computer security
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Management
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Datakommunikation
|2 sao
|
650 |
|
7 |
|a Datanät
|2 sao
|
650 |
|
7 |
|a Rechnernetz
|2 gnd
|
650 |
|
7 |
|a Unternehmen
|2 gnd
|
700 |
1 |
|
|a Panko, Julia L
|
700 |
1 |
|
|a Panko, R. R
|t Business data networks and telecommunications.
|
999 |
1 |
0 |
|i d76a1552-ed6e-49a4-9cd3-f772ea138a44
|l 991041780059707861
|s US-MDBJ
|m business_data_networks_and_security________________________________________2013____9__pearsa________________________________________panko__r__r________________________p
|
999 |
1 |
1 |
|l 991041780059707861
|s ISIL:US-MDBJ
|t BKS
|a ShMSEL shmmain
|b 31151032252631
|c HD30.37 .P36 2013
|d 0
|x jhbooks
|y 23405750330007861
|p LOANABLE
|