Vai al contenuto principale della pagina
Autore: | Stallings William |
Titolo: | Business data communications : infrastructure, networking and security / / William Stallings, Thomas Case |
Pubblicazione: | Boston : , : Pearson, , [2013] |
©2013 | |
Edizione: | Seventh, international edition. |
Descrizione fisica: | 1 online resource |
Disciplina: | 658.054 |
Soggetto topico: | Business - Data processing |
Persona (resp. second.): | CaseThomas |
Nota di bibliografia: | Includes bibliographical references (pages 581-583) and index. |
Nota di contenuto: | Cover -- Contents -- Online Resources -- Preface -- About the Authors -- Chapter 0 Reader's and Instructor's Guide -- 0.1 Outline of This Book -- 0.2 Topic Ordering -- 0.3 Internet and Web Resources -- 0.4 Useful Publications -- Chapter 1 Introduction -- 1.1 Information and Communication -- 1.2 Data Communications and Networking for Today's Enterprise -- 1.3 Convergence and Unified Communications -- 1.4 The Nature of Business Information Requirements -- 1.5 The Transmission of Information -- 1.6 Distributed Data Processing -- 1.7 The Internet and Distributed Applications -- 1.8 Networks -- 1.9 Management Issues -- 1.10 Standards -- 1.11 Key Terms, Review Questions, and Problems -- Appendix 1A Prefixes for Numerical Units -- PART ONE: REQUIREMENTS -- Chapter 2 Business Information -- 2.1 Audio -- 2.2 Data -- 2.3 Image -- 2.4 Video -- 2.5 Performance Measures -- Application Note: File Sizes -- 2.6 Summary -- 2.7 Key Terms, Review Questions, and Problems -- Chapter 3 Distributed Data Processing -- 3.1 Centralized Versus Distributed Processing -- 3.2 Forms of Distributed Data Processing -- 3.3 Distributed Data -- 3.4 Networking Implications of DDP -- 3.5 Big Data Infrastructure Considerations -- Application Note: Distributed Computing Support -- 3.6 Summary -- 3.7 Key Terms, Review Questions, and Problems -- PART TWO: DATA COMMUNICATIONS -- Chapter 4 Data Transmission -- 4.1 Signals for Conveying Information -- 4.2 Transmission Impairments and Channel Capacity -- Application Note: Analog Signals -- 4.3 Summary -- 4.4 Key Terms, Review Questions, and Problems -- Chapter 5 Data Communication Fundamentals -- 5.1 Analog and Digital Data Communications -- 5.2 Data Encoding Techniques -- 5.3 Asynchronous and Synchronous Transmission -- 5.4 Error Detection -- Application Note: Devices, Encoding, Communication Parameters, and Protocols -- 5.5 Summary. |
5.6 Key Terms, Review Questions, and Problems -- Chapter 6 Data Link Control and Multiplexing -- 6.1 Flow Control and Error Control -- 6.2 Motivation for Multiplexing -- 6.3 Frequency-Division Multiplexing -- 6.4 Synchronous Time-Division Multiplexing -- Application Note: Changing Communications -- 6.5 Summary -- 6.6 Key Terms, Review Questions, and Problems -- Appendix 6A: High Level Data Link Control Protocol -- PART THREE: THE INTERNET AND DISTRIBUTED APPLICATIONS -- Chapter 7 The Internet -- 7.1 The Structure of the Internet -- 7.2 Internet Domains -- 7.3 Dynamic Host Configuration Protocol -- Application Note: Fitting DNS into Your Organizational Structure -- 7.4 Summary -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 TCP/IP -- 8.1 A Simple Protocol Architecture -- 8.2 The TCP/IP Architecture -- 8.3 Internetworking -- 8.4 Virtual Private Networks and IP Security -- Application Note: Practical Guide to Networking -- 8.5 Summary -- 8.6 Key Terms, Review Questions, and Problems -- Appendix 8A: TCP, UDP, and IP Details -- Appendix 8B: The Trivial File Transfer Protocol -- Chapter 9 Client/Server, Intranet, and Cloud Computing -- 9.1 The Growth of Client/Server Computing -- 9.2 Client/Server Applications -- 9.3 Middleware -- 9.4 Intranets -- 9.5 Extranets -- 9.6 Service-Oriented Architecture -- 9.7 Cloud Computing -- Application Note: To Be Fat or Thin-That Is the Question -- 9.8 Summary -- 9.9 Key Terms, Review Questions, and Problems -- Chapter 10 Internet-Based Applications -- 10.1 Electronic Mail -- 10.2 Web Access and HTTP -- 10.3 Web Security -- 10.4 Multimedia Applications -- 10.5 Acceptable Use Policies -- Application Note: To Serve or Not to Serve -- 10.6 Summary -- 10.7 Key Terms, Review Questions, and Problems -- Chapter 11 Internet Operation -- 11.1 Internet Addressing -- 11.2 Internet Routing Protocols -- 11.3 Multicasting. | |
11.4 Quality of Service -- 11.5 Differentiated Services -- 11.6 Service Level Agreements -- 11.7 IP Performance Metrics -- Application Note: Where Does My Network Address Come From? -- 11.8 Summary -- 11.9 Key Terms, Review Questions, and Problems -- PART FOUR: LOCAL AREA NETWORKS -- Chapter 12 LAN Architecture and Infrastructure -- 12.1 Background -- 12.2 LAN Configuration -- 12.3 Guided Transmission Media -- 12.4 LAN Protocol Architecture -- Application Note: Cabling Infrastructure -- 12.5 Summary -- 12.6 Key Terms, Review Questions, and Problems -- Appendix 12A: Decibels and Signal Strength -- Chapter 13 Ethernet, Switches, and Virtual LANs -- 13.1 Traditional Ethernet -- 13.2 Bridges, Hubs, and Switches -- 13.3 High-Speed Ethernet -- 13.4 Virtual LANs -- 13.5 Power over Ethernet -- Application Note: Networking with Ethernet -- 13.6 Summary -- 13.7 Key Terms, Review Questions, and Problems -- Chapter 14 Wireless LANs -- 14.1 Overview -- 14.2 Wi-Fi Architecture and Services -- 14.3 IEEE 802.11 MAC and Physical Layer Standards -- 14.4 Gigabit WLANs -- 14.5 IEEE 802.11 Security Considerations -- Application Note: Deploying WLANs -- 14.6 Summary -- 14.7 Key Terms, Review Questions, and Problems -- PART FIVE: WIDE AREA NETWORKS -- Chapter 15 WAN Technology and Protocols -- 15.1 Switching Techniques -- 15.2 Circuit-Switching Networks -- 15.3 Packet-Switching Networks -- 15.4 Traditional Wide Area Network Alternatives -- 15.5 Voice Over IP -- 15.6 Presence -- 15.7 Summary -- 15.8 Key Terms, Review Questions, and Problems -- Chapter 16 WAN Services -- 16.1 Wide Area Networking Alternatives -- 16.2 Frame Relay -- 16.3 Asynchronous Transfer Mode (ATM) -- 16.4 Multiprotocol Label Switching (MPLS) -- 16.5 Wide Area Ethernet -- Application Note: Off-Site Connectivity Solutions -- 16.6 Summary -- 16.7 Key Terms, Review Questions, and Problems. | |
Chapter 17 Wireless WANs -- 17.1 Cellular Wireless Network -- 17.2 Multiple Access -- 17.3 Third-Generation Wireless Communication -- 17.4 Fourth-Generation Wireless Communication -- 17.5 Satellite Communications -- Application Note: Laptops, Netbooks, PDAs, and Cell Phones -- 17.6 Summary -- 17.7 Key Terms, Review Questions, and Problems -- PART SIX: MANAGEMENT ISSUES -- Chapter 18 Computer and Network Security Threats -- 18.1 Computer Security Concepts -- 18.2 Threats, Attacks, and Assets -- 18.3 Intruders -- 18.4 Malicious Software Overview -- 18.5 Viruses, Worms, Bots, and Spam -- 18.6 Keyloggers, Phishing, Spyware -- 18.7 Computer Security Trends -- 18.8 Summary -- 18.9 Key Terms, Review Questions, and Problems -- Chapter 19 Computer and Network Security Techniques -- 19.1 Virtual Private Networks and IPsec -- 19.2 SSL and TLS -- 19.3 Wi-Fi Protected Access -- 19.4 Intrusion Detection -- 19.5 Firewalls -- 19.6 Malware Defense -- Application Note: Security Layers -- 19.7 Summary -- 19.8 Key Terms, Review Questions, and Problems -- Appendix A: Projects for Teaching Business Data Communications -- A.1 Animations and Animation Projects -- A.2 Practical Exercises -- A.3 Wireshark Projects -- A.4 Research Projects -- A.5 Security Case Studies -- A.6 Reading/Report Assignments -- A.7 Writing Assignments -- Glossary. | |
Sommario/riassunto: | Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications. The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students. The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model. |
Titolo autorizzato: | Business data communications |
ISBN: | 0-273-77530-8 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910150214403321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |