Broadband Bible Desktop Edition
- This book outlines everything people need to make the move from a dial-up connection to an always-on DSL or cable Internet connection that is up to forty times faster than a standard modem connection
- Nielsen estimated there were thirty-nine million U.S. homes with broadband access in April 2003
- Gaskin explains available broadband options, shows how to pick the right one, describes wireless alternatives inside and outside of buildings, details how to connect more than one computer to a home broadband connection, and provides information about securing your wireless network
- This new Desktop Edition format provides need-to-know coverage of all topics related to broadband home networking in an easy-to-use format that will appeal to novices and techies alike
- Offers a useful customer service FAQ and a Web directory appendix that lists Web sites for additional utilities, tools, games, and more
In 1989, James started contributing to Unix Today! magazine, and he continues to cover technology for major technology publications (such as Network World) today. His first book, Integrating Unix and NetWare Networks, was published by Novell Press in 1993, and he has continued writing books, articles, and jokes about technology and real life ever since.
His 14 (now 15) books include a best-selling series of five NetWare books for Sybex, and others on Internet technology, technology business management, and humor. James presented a series of NetWare and Internet technology tutorials for Networld+InterOp from 1994 through 1997. Media appearances include technology expert commentary for KRLD News Radio, Dallas, TX, and WGBH 89.7, National Public Radio, Boston.
An objective voice for the technology consumer, James writes a weekly column called Small Business Technology for Network World. He also presents topics such as The Hilarious Pain of Data Security to groups under the umbrella of GaskinGuides to Technology. Although unaffiliated with any vendor, James is biased toward cost-effective and intelligent technology products for small- and medium-sized businesses.
Table of Contents
Part I: Determining Which Broadband Is Right for You.
Chapter 1: Why You Need Broadband Internet Access.
Chapter 2: Getting Familiar with Broadband Technology.
Chapter 3: Types of Broadband Providers.
Chapter 4: Types of Alternative Broadband Providers.
Chapter 5: Emerging Broadband Service Options.
Chapter 6: Pros and Cons: Choosing Your Best Broadband Option.
Part II: Practicing Safe Broadband.
Chapter 7: Understanding Computer Security.
Chapter 8: Examining Your Home Broadband Hookup.
Chapter 9: Examining the Multitenant Broadband Hookup.
Part III: Moving from Stand-Alone PCs to a Network.
Chapter 10: Server and Storage Options.
Chapter 11: What You Need to Know About Desktop Networking.
Chapter 12: What You Need to Know About TCP/IP Networks and Routing.
Chapter 13: Backup and Disaster Recovery.
Part IV: Linking Your Network Devices.
Chapter 14: Wired Connection Options.
Chapter 15: Wireless Connection Options.
Chapter 16: Wireless Security in Depth.
Chapter 17: Avoiding Wireless Eavesdropping and Hacking.
Part V: Troubleshooting.
Chapter 18: Troubleshooting Internet Access Problems.
Chapter 19: Troubleshooting Your Side of the Connection.
Appendix A: Quick Hits Roundup.
Appendix B: Additional Web Directory Listings.
Appendix C: Broadband, Internet, and Networking Definitions.
Sign up now »
The total volume of data being processed and stored by businesses is rising exponentially. IDC has estimated that the size of the "digital universe" will increase 29 fold between 2010 ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes