Home Networking for Dummies, 4th Edition
- Planning and installing your network
- The differences between Ethernet cable, phone lines, and wireless technology
- Configuring computer sharing
- Setting up and managing users
- Installing, managing, and troubleshooting the network printer
- Understanding UNC format, mapping drives, and traveling on the network
- Working with remote files
- Securing your network from viruses, spyware, and other baddies
Along with the basics, this book introduces fun ways to use your network, including sharing music, keeping shopping lists, creating photo albums, setting up a family budget, and instant messaging. It also provides ways to keep your network safe for kids, such as talking to your child about the Internet, creating site filters, and ISP E-mail filtering features. With this trusty guide your home will be fully connected and you’ll be working more efficiently in no time!
Table of Contents
Part I: Network Basics.
Chapter 1: Planning the Lay of the LAN.
Chapter 2: Installing Network Adapters.
Chapter 3: Installing Ethernet Cable.
Chapter 4: Using Wires That Are Already There.
Chapter 5: Look Ma, No Wires.
Part II: Configuring Computers for Networking.
Chapter 6: Putting It All Together.
Chapter 7: Configuring Computer Sharing.
Chapter 8: Setting Up Users.
Part III: Communicating Across the Network.
Chapter 9: Printing Across the Network.
Chapter 10: Getting Around the Neighborhood.
Chapter 11: Using Files from Other Computers.
Part IV: Network Security and Maintenance.
Chapter 12: Making Your Network Secure.
Chapter 13: Disaster Planning and Recovery.
Chapter 14: Using Windows Maintenance Tools.
Part V: The Part of Tens.
Chapter 15: Ten Clever Things to Do on Your Network.
Chapter 16: Ten Fun Things to Do on Your Network.
Chapter 17: Ten Ways to Make the Internet Safe for Children.
Sign up now »
In a sluggish economy, getting the best ROI on every IT dollar spent is the top priority for almost every business. Storage budgets in most IT environments continue to remain ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes