Networking for Dummies, 8th Edition
Written for even the most network-shy novice, it begins with the most basic of basics—“A network is nothing more than two or more computers connected by a cable (or wireless adapter) so that they can share information”—and progresses through all the essentials, from cables, routers and hubs to building a wireless network. In clear, simple language, peppered with enough wry quips and jabs at the cult of IT to make it fun, Doug Lowe walks you through:
- What a network is and how to use it
- How to build a wired or wireless network
- How to secure and optimize a network
- How to troubleshoot a network
- Safely connecting a network to the Internet
- Networking with all major operating systems
This new edition of the bestselling guide features extensive updates on the latest networking tools and trends—including new Windows Vista and Server 2003 R2—the latest broadband options, new storage and back-ups, and an all new-chapter on VoIP and Internet telephony.
Table of Contents
Part I: Let’s Network!
Chapter 1: Networks Will Not Take Over the World, and Other Network Basics.
Chapter 2: Life on the Network.
Chapter 3: More Ways to Use Your Network.
Part II: Building Your Own Network.
Chapter 4: Planning Your Network.
Chapter 5: Oh, What a Tangled Web We Weave: Cables, Adapters, and Other Stuff.
Chapter 6: Dealing with TCP/IP.
Chapter 7: Setting Up a Server.
Chapter 8: Configuring Windows XP and Vista Clients.
Chapter 9: Wireless Networking.
Part III: Getting Connected.
Chapter 10: Connecting Your Network to the Internet.
Chapter 11: Running a Mail Server.
Chapter 12: Creating an Intranet.
Chapter 13: Is It a Phone or a Computer? (Or, Understanding VoIP and Convergence).
Chapter 14: Connecting from Home.
Part IV: Network Management For Dummies.
Chapter 15: Welcome to Network Management.
Chapter 16: Managing User Accounts with Active Directory.
Chapter 17: Managing Network Storage.
Chapter 18: Network Performance Anxiety.
Chapter 19: Solving Network Problems.
Chapter 20: How to Stay on Top of Your Network and Keep Its Users Off Your Back.
Part V: Protecting Your Network.
Chapter 21: Backing Up Your Data.
Chapter 22: Securing Your Network.
Chapter 23: Hardening Your Network.
Part VI: Beyond Windows.
Chapter 24: Networking with Linux.
Chapter 25: Macintosh Networking.
Part VII: The Part of Tens.
Chapter 26: More Than Ten Big Network Mistakes.
Chapter 27: Ten Networking Commandments.
Chapter 28: Ten Things You Should Keep in Your Closet.
Chapter 29: Layers of the OSI Model.
Sign up now »
- FTLead Software EngineerSA
- FTR&D EngineerSA
- FTQuality ManagerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTOS Web Applications DeveloperNSW
- FTSenior Python DeveloperNSW
- FTTechnical Business AnalystNSW
Integrated Computing Platforms, such as EMC VSPEX RAs, provide a solution by eliminating the time (and cost) of designing, testing, and engineering integrated environments with components built independently of one ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- AusCERT 2013: Kill the password, says Mozilla
- AusCERT 2013: Unmanaged, unknown privileged logins opening the door for APTs: Cyber-Ark
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia