Business Data Communications and Networking

Höfundur Jerry FitzGerald; Alan Dennis; Alexandra Durcikova

Útgefandi Wiley Global Education US

Snið ePub

Print ISBN 9781119702849

Útgáfa 14

Útgáfuár 2021

4.090 kr.

Description

Efnisyfirlit

  • COVER
  • TITLE PAGE
  • COPYRIGHT
  • DEDICATION
  • ABOUT THE AUTHORS
  • PREFACE
  • PURPOSE OF THIS BOOK
  • WHAT’S NEW IN THIS EDITION
  • LAB EXERCISES
  • ONLINE SUPPLEMENTS FOR INSTRUCTORS
  • E-BOOK
  • ACKNOWLEDGMENTS
  • PART ONE: INTRODUCTION
  • CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS
  • 1.1 INTRODUCTION
  • 1.2 DATA COMMUNICATIONS NETWORKS
  • 1.3 NETWORK MODELS
  • 1.4 NETWORK STANDARDS
  • 1.5 FUTURE TRENDS
  • 1.6 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 1A
  • HANDS-ON ACTIVITY 1B
  • PART TWO: FUNDAMENTAL CONCEPTS
  • CHAPTER 2: APPLICATION LAYER
  • 2.1 INTRODUCTION
  • 2.2 APPLICATION ARCHITECTURES
  • 2.3 WORLD WIDE WEB
  • 2.4 ELECTRONIC MAIL
  • 2.5 OTHER APPLICATIONS
  • 2.6 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 2A
  • HANDS-ON ACTIVITY 2B
  • CHAPTER 3: PHYSICAL LAYER
  • 3.1 INTRODUCTION
  • 3.2 CIRCUITS
  • 3.3 COMMUNICATION MEDIA
  • 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA
  • 3.5 ANALOG TRANSMISSION OF DIGITAL DATA
  • 3.6 DIGITAL TRANSMISSION OF ANALOG DATA
  • 3.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 3A
  • HANDS-ON ACTIVITY 3B
  • HANDS-ON ACTIVITY 3C
  • CHAPTER 4: DATA LINK LAYER
  • 4.1 INTRODUCTION
  • 4.2 MEDIA ACCESS CONTROL
  • 4.3 ERROR CONTROL
  • 4.4 DATA LINK PROTOCOLS
  • 4.5 TRANSMISSION EFFICIENCY
  • 4.6 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 4A
  • CHAPTER 5: NETWORK AND TRANSPORT LAYERS
  • 5.1 INTRODUCTION
  • 5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS
  • 5.3 TRANSPORT LAYER FUNCTIONS
  • 5.4 ADDRESSING
  • 5.5 ROUTING
  • 5.6 TCP/IP EXAMPLE
  • 5.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 5A
  • HANDS-ON ACTIVITY 5B
  • HANDS-ON ACTIVITY 5C
  • HANDS-ON ACTIVITY 5D
  • HANDS-ON ACTIVITY 5E
  • HANDS-ON ACTIVITY 5F
  • PART THREE: NETWORK TECHNOLOGIES
  • CHAPTER 6: NETWORK DESIGN
  • 6.1 INTRODUCTION
  • 6.2 NEEDS ANALYSIS
  • 6.3 TECHNOLOGY DESIGN
  • 6.4 COST ASSESSMENT
  • 6.5 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 6A
  • CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS
  • 7.1 INTRODUCTION
  • 7.2 LAN COMPONENTS
  • 7.3 WIRED ETHERNET
  • 7.4 WIRELESS ETHERNET
  • 7.5 THE BEST PRACTICE LAN DESIGN
  • 7.6 IMPROVING LAN PERFORMANCE
  • 7.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 7A
  • HANDS-ON ACTIVITY 7B
  • HANDS-ON ACTIVITY 7C
  • CHAPTER 8: BACKBONE NETWORKS
  • 8.1 INTRODUCTION
  • 8.2 SWITCHED BACKBONES
  • 8.3 ROUTED BACKBONES
  • 8.4 VIRTUAL LANS
  • 8.5 THE BEST PRACTICE BACKBONE DESIGN
  • 8.6 IMPROVING BACKBONE PERFORMANCE
  • 8.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 8A
  • HANDS-ON ACTIVITY 8B
  • CHAPTER 9: WIDE AREA NETWORKS
  • 9.1 INTRODUCTION
  • 9.2 DEDICATED-CIRCUIT NETWORKS
  • 9.3 PACKET-SWITCHED NETWORKS
  • 9.4 VIRTUAL PRIVATE NETWORKS
  • 9.5 THE BEST PRACTICE WAN DESIGN
  • 9.6 IMPROVING WAN PERFORMANCE
  • 9.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 9A
  • HANDS-ON ACTIVITY 9B
  • HANDS-ON ACTIVITY 9C
  • HANDS-ON ACTIVITY 9D
  • CHAPTER 10: THE INTERNET
  • 10.1 INTRODUCTION
  • 10.2 HOW THE INTERNET WORKS
  • 10.3 INTERNET ACCESS TECHNOLOGIES
  • 10.4 THE FUTURE OF THE INTERNET
  • 10.5 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 10A
  • HANDS-ON ACTIVITY 10B
  • HANDS-ON ACTIVITY 10C
  • PART FOUR: NETWORK MANAGEMENT
  • CHAPTER 11: NETWORK SECURITY
  • 11.1 INTRODUCTION
  • 11.2 RISK ASSESSMENT
  • 11.3 ENSURING BUSINESS CONTINUITY
  • 11.4 INTRUSION PREVENTION
  • 11.5 BEST PRACTICE RECOMMENDATIONS
  • 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 11A
  • HANDS-ON ACTIVITY 11B
  • HANDS-ON ACTIVITY 11C
  • HANDS-ON ACTIVITY 11D
  • CHAPTER 12: NETWORK MANAGEMENT
  • 12.1 INTRODUCTION
  • 12.2 DESIGNING FOR NETWORK PERFORMANCE
  • 12.3 CONFIGURATION MANAGEMENT
  • 12.4 PERFORMANCE AND FAULT MANAGEMENT
  • 12.5 END USER SUPPORT
  • 12.6 COST MANAGEMENT
  • 12.7 IMPLICATIONS FOR CYBER SECURITY
  • SUMMARY
  • KEY TERMS
  • QUESTIONS
  • EXERCISES
  • MINICASES
  • TECH UPDATES
  • HANDS-ON ACTIVITY 12A
  • HANDS-ON ACTIVITY 12B
  • HANDS-ON ACTIVITY 12C
  • INDEX
  • END USER LICENSE AGREEMENT
Show More

Additional information

Veldu vöru

Leiga á rafbók í 150 daga, Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “Business Data Communications and Networking”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð