PART I: NETWORK HARDWARE.
1: What Is A Computer Network?
2: Network Topology.
3: Networking Hardware.
4: Ethernet Technology.
5: Token Ring, Fddi, And Other Lan Technologies.
6: Network Design And Troubleshooting Scenarios.
PART II: NETWORK PROTOCOLS.
7: Low-Level Protocols.
8: The Tcp/Ip Protocols.
9: Ipx/Spx, Appletalk, And Other Network Protocols.
10: Switching And Routing.
11: Network Management And Security.
PART III: NETWORK APPLICATIONS.
12: Electronic Mail.
13: Ftp And Telnet.
14: Multimedia Networking.
15: The Internet.
16: Writing A Network Application.
PART IV: NETWORK OPERATING SYSTEMS.
17: An Introduction To Networking With Windows.
18: Windows Domains.
19: Unix And Linux.
20: Other Network Operating Systems.
PART V: SECURITY AND FORENSICS.
21: Cryptography And Security.
22: Security Hardware.
23: Security Software.
24: Forensic Techniques.
Glossary:
Appendix A: Internet Milestones.
Appendix B: Extended Ascii Character Set.
Appendix C: Modems.
Appendix D: Network, Security, And Forensic Certifications.
Appendix E: Telecommunication Technologies.
Appendix F: Setting Up A Networking Repair Shop.
James L. Antonakos is a Professor in the Computer Studies Department at Broome Community College in Binghamton, NY. He has written over 40 books on electronics, microprocessors, networking, operating systems, and computer technology. Kenneth C. Mansfield Jr. is a Professor in the Computer Studies Department at Broome Community College in Binghamton, NY. He has written over 20 books on networking, operating systems, programming, and computer technology.
"Excellent text, I found it informative and interesting based on my
own computer networking experience. It would be appropriate for an
undergraduate course or for a person interested in knowing more
about the subject of computer networking. A student should have a
good knowledge of using a computer and the Internet, and should
also have had some formal programming experience such as C or Java
to get value from the programming examples. I agree with the
authors that it�s important to have some understanding of the
Windows 95/98 as these operating systems are still out there to be
debugged and fixed."
"This book is best suited for the introductory course on computer
networking. A Computer Technology student in either a Community
College or University setting who has an intermediate knowledge of
computers would best utilize this book. A student would need a good
grounding of basic computer knowledge as a pre-requisite for using
this book. I would personally use this book for my introductory
course on computer networking as well as some chapters for a
computer security course, and keep it around as a good reference
book."
![]() |
Ask a Question About this Product More... |
![]() |