Networking bible: [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more]
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXII, 890 S. Ill. |
ISBN: | 9780470431313 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035706054 | ||
003 | DE-604 | ||
005 | 20091127 | ||
007 | t | ||
008 | 090902s2009 a||| |||| 00||| eng d | ||
020 | |a 9780470431313 |9 978-0-470-43131-3 | ||
035 | |a (OCoLC)698838842 | ||
035 | |a (DE-599)BVBBV035706054 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 004.6 |2 22 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Sosinsky, Barrie |e Verfasser |4 aut | |
245 | 1 | 0 | |a Networking bible |b [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] |c Barrie Sosinsky |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2009 | |
300 | |a XXII, 890 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017759894&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017759894 |
Datensatz im Suchindex
_version_ | 1804139424557039616 |
---|---|
adam_text | Titel: Networking bible
Autor: Sosinsky, Barrie
Jahr: 2009
Table of Contents
About the Author iii
Acknowledgments xx
Introduction xxi
Part I: Network Basics 1
Chapter 1: Networking Introduction 3
Defining Computer Networking 4
Network Type Overview 5
Transmission Types 7
Point-to-point communication 7
Broadcast communication 7
Topologies 8
Physical topologies 9
Bus systems 10
Star networks 11
Rings 13
Mesh networks 14
Trees or hierarchical networks 15
Hybrid topologies 16
Logical topologies 16
Logical daisy chain topology 17
Logical star topology 18
Logical mesh topology 18
Summary 19
Chapter 2: The Network Stack 21
Standard Development Organizations 21
The OSI Reference Model 23
How Layers Communicate 24
The Physical Layer 28
The Data Link Layer 28
The Network Layer 29
The Transport Layer 30
The Session Layer 31
The Presentation Layer 31
The Application Layer 31
The TCP/IP Reference Model 32
Comparing the OSI and TCP/IP Reference Models 33
Summary 34
Chapter 3: Architecture and Design 35
Network Architecture and Topology 36
Point-to-point , 38
Physical point-to-point connections 39
Virtual point-to-point connections 40
Packet switched or transient connections 42
Switched connections 44
Switched and Packet Networks 45
Bus Architectures 46
Network segments 47
Collision domains 48
Signal termination 50
Connection Points 50
Peer-to-Peer Networks 53
Client-Server Networks 54
Multi-Tiered Networks 56
Thin Client/Server 58
Terminal servers 58
X Window networks 59
Summary 59
Chapter 4: Network Discovery and Mapping 61
Network Discovery 62
Node advertisement 67
Browsing 68
Polling 70
Connections 70
Simple Network Management Protocol 73
Windows Management Instrumentation 77
Mapping 78
Summary 80
Chapter 5: Bandwidth and Throughput 81
Bandwidth and Capacity 82
Beads flow through a pipe of syrup 82
Signaling 83
Bandwidth 87
Sampling theory 88
Multiplexing 91
. Time Division Multiplexing 92
Frequency Division Multiplexing 93
Other multiplexing technologies 94
Flow Control 96
Traffic Engineering 97
Packet shaping 97
Leaky Bucket algorithm 98
Token Bucket algorithm 99
Quality of Service 101
Summary 102
Part II: Hardware 105
Chapter 6: Servers and Systems 107
Network Server Types 108
Capacity and Loading Ill
Three approaches Ill
Solution frameworks 112
Microsoft Operations Framework 115
Microsoft Solutions Framework 115
Server and Systems Sizing 117
Defining levels of service 117
Response time 118
Throughput 118
Availability 119
Reliability 120
Scalability 120
Adaptability 120
Security 120
Quantifying performance 120
Performance relationships 122
Eliminating bottlenecks 125
Network modeling 129
Server upgrades 131
Summary 133
Chapter 7: The Network Interface 135
What Is a Network Interface? 135
Physical network interfaces 136
Logical network interfaces 137
Network Addressing 138
Physical addresses 138
Logical addresses 139
Configuring Network Interfaces 141
Bindings and Providers 144
Isolation and Routing 146
Physical isolation 147
Protocol isolation 148
Bus Interfaces for NICs 149
A sample network adapter 151
Network drivers 152
Summary 153
Chapter 8: Transport Media 155
Wired Media 155
Wiring the physical plant 156
Twisted pair 158
Coaxial cable 161
Ethernet wiring 162
Fiber-optic cable 167
Attenuation and dispersal 168
Physical description 171
Fiber-optic networks 174
Wireless 176
Electromagnetic radiation 176
Information and transmission 179
Wireless connections 181
Radio links 181
Microwave links 182
Summary 183
Chapter 9: Routing, Switching, and Bridging 185
Circuit versus Packet Switching 185
Layer 1 and Layer 2 Connection Devices 189
Passive hubs 189
Repeaters 190
Switches 191
Bridges 192
Routers 195
Control plane 197
Forwarding plane 197
Routing topologies 199
Optimization methods 201
Distance vector routing 201
The Bellman-Ford algorithm 202
Count-to-infinity 204
Routing Information Protocol 204
Destination-Sequenced Distance Vector Routing 206
Link state routing 206
Dijkstra s algorithm 207
Open Shortest Path First 209
Intermediate System to Intermediate System Routing 210
Path vector routing 211
A path vector example 212
The Border Gateway Protocol 212
Network loops 214
The Spanning Tree Protocol 216
Node/bridge hierarchy 217
Network segment costs 220
Dynamic optimization 220
Rapid Spanning Tree Protocol 222
Onion Routers 226
Tor 228
Tor clients 228
Hidden services 229
Gateways 231
Summary 231
Part III: Network Types 233
Chapter 10: Home Networks 235
Features of a Home Network 236
Broadband Connections 240
Wireless Connections 241
Wired Connections 242
Ethernet 242
Phone lines 243
Power over Ethernet 246
HomePlug Powerline 246
HomePlug modulation 248
Frames and sequences 250
Security 252
Home Network Servers 252
Summary 254
Chapter 11: Peer-to-Peer Networks and Personal LANs 255
Peer-to-Peer Networks 256
Pure P2P networks 257
Small world networks 257
Gnutella 257
Freenet 259
Hybrid P2P systems 260
Napster 260
Torrents 260
Friend-to-Friend Networks 264
Bus Networking 264
Universal serial bus 265
FireWire 268
Bluetooth 270
Connections 271
Profiles 273
Summary 274
Chapter 12: Local Area Networking 275
Introduction 276
The IEEE 802 LAN standards 277
Broadcast channels 277
Ethernet 281
Ethernet frames 284
Frame structure 286
Burst mode 288
VLAN frames 288
Carrier Sense Multiple Access with Collision Detection 289
Full-duplex operation 291
Token Ring Networks 291
Fiber Distributed Data Interface Networks 297
Automation Networks 301
X10 and home automation 302
Process control systems 308
Modbus 311
BACnet and LonTalk 314
OPC 314
Summary 317
Chapter 13: Wide Area Networks and Backbones 319
What Is a WAN? 320
Circuit Switching Networks 321
The Public Switched Telephone Network 322
Integrated Services Digital Network 325
Digital Subscriber Line 326
Cable network 331
T- and E-Carrier Networks 331
Synchronous Optical Networking 333
SONET architecture 334
Framing 335
Packet over SONET 338
Packet Switching Networks 340
X.25 Networks 341
Switched Multi-megabit Data Services 342
Asynchronous Transfer Mode 342
Frame Relay 345
Multi Protocol Label Switching 346
The Internet and Internet2 347
Internet Exchange Points 348
Internet2 350
Summary 351
Chapter 14: Wi-Fi Networks 353
Wireless Networking 354
Wi-Fi networks 356
IEEE 802. llx Standards 357
802.11 legacy 359
802.1 ly 361
Modulation 362
Direct-Sequence Spread Spectrum 365
Frequency Hopping Spread Spectrum 367
Orthogonal Frequency Division Multiplexing 368
802.11 protocol 369
Collision avoidance 370
802.11 frame structure 371
Connection example 373
Wireless Access Points and Gateways 375
Repeaters and bridges 375
Wireless Distribution System 378
Wireless Routers and Gateways 380
Router configuration 382
Router upgrades 382
OLPC XO Wireless Network 384
Antennas 385
Antenna characteristics 385
Multiple-Input Multiple-Output 389
Wireless Software 391
Security 393
Wired Equivalent Privacy 394
Wi-Fi Protected Access 396
Summary 398
Chapter 15: Storage Networking 399
Storage Networking 400
Storage Network Types 401
SANs versus NAS 403
Business Continuance Volumes 403
Storage virtualization 404
The Shared Storage Networking Model 406
The shared tape extension 407
The Storage Domain 412
Aggregation 413
Device models 413
Fibre Channel Networks 417
Fibre Channel standards 418
Port designations 418
The Fibre Channel Protocol 419
Fibre Channel traffic management 421
Fibre Channel flow control 421
Fibre Channel Arbitrated Loops 422
Fibre Channel Switched fabrics 423
Fibre Channel addressing 423
Zoning 424
Storage over IP 425
iSCSI protocol 426
Fibre Channel over IP 428
Internet Fibre Channel Protocol 429
Storage Area Network Management 429
Internet Storage Name Service 430
Summary 431
Chapter 16: High-Speed Interconnects 433
High-Performance Computing 434
Beyond Gigabit Ethernet 435
lOGBase-T 436
Higher-Speed Gigabit Ethernet 437
TCP Offloading Engines 437
Zero Copy Networks 440
Virtual Interface Architecture 441
InfiniBand 443
Network Clusters 445
Load balancing 448
Grid systems 449
Summary 451
Part IV: TCP/IP Networking 453
Chapter 17: Internet Transport Protocol 455
Transmission Control Protocol 456
Packet Structure 457
Header fields 458
Flags 459
Checksum field 459
Control fields 460
Data field 460
Protocol Operation 461
Connections 464
Flow Control 465
Sliding windows 465
Congestion control 466
Multiplexing 466
User Datagram Protocol 467
Ports 469
Problems with TCP 472
Summary 474
Chapter 18: The Internet Protocols 475
Internet Protocol Overview 476
Internet Protocol Version 4 478
Addressing 478
Dividing the namespace 478
Reserved addresses 483
Zero Configuration addressing 486
IP datagrams 486
Subnetting 494
Setting an IP Address 497
Static addressing 498
Dynamic addressing 499
Dynamic Host Configuration Protocol 500
Configuration 501
Securing DHCP 502
Bootstrap Protocol 503
Internet Control Message Protocol 503
Internet Protocol Version 6 506
Addressing 508
IPv6 compressed notation 509
IPv6 calculators 510
Dual-stack IPv6/IPv4 addresses 512
Address scopes and zones 512
IPv6 datagrams 515
IPv6 Neighbor Discovery 517
ICMPv6 518
Summary 519
Chapter 19: Name Resolution Services 521
HOSTS Files 522
Address Resolution Protocol 525
ARP requests 526
Reverse Address Resolution Protocol 526
Viewing the ARP cache 527
Network Basic Input/Output System 528
Windows Internet Name Service 529
Domain Name System 530
DNS requests 531
DNS topology 533
Resource records 534
Name Resolution versus Directory Services 539
Summary 539
Part V: Applications and Services 541
Chapter 20: Network Operating Systems 543
What Is a Network Operating System 544
Protocols and services 545
General versus Special-Purpose NOS 545
NOS Systems and Software 547
UNIX 548
POSIX 550
STREAMS and sockets 551
Single UNIX specification 552
Linux 553
Distributions 554
LAMP 554
Linux Standard Base 555
Solaris 555
Novell NetWare and Open Enterprise Server 557
Windows Server 557
Summary 559
Chapter 21: Domains and Directory Services 561
Directory Services and Domains 562
Banyan VINES 563
Domain types 563
Interoperability 565
Domain Servers 565
Directory Services 566
Synchronization and replication 567
Single sign on 568
Namespaces 568
Policy engines 570
Role-Based Access Control 574
Identity management 575
X.500andLDAP 576
Network Information Service 577
LDAP servers 578
LDAPData Interchange Format 578
Novell eDirectory 579
Distinguished Names 580
Microsoft Active Directory 580
Replication 584
Summary 585
Chapter 22: File Services and Caching 587
Network Attached Storage 588
Features 589
NAS versus SAN 590
Network file caching 591
File Service Protocols 593
Network File System 593
Server Message Block/Common Internet File System 594
Samba 595
Samba security 596
Samba name resolution and browse lists 597
Samba on Ubuntu 598
Distributed File System 601
Summary 604
Chapter 23: Web Services 605
The Hypertext Transfer Protocol 606
HTTP requests 607
HTTP status codes 609
Static versus dynamic pages 613
Web Services 614
Service Oriented Architectures 616
Summary 619
Chapter 24: Mail Protocols 621
The Three Main Protocols 622
Polled e-mail 622
Push e-mail 624
Message Parts 624
Simple Mail Transfer Protocol 626
Multipurpose Internet Mail Extensions 627
Base64 encoding 629
MIME rendering 631
Post Office Protocol 632
Web mail clients 633
Internet Message Access Protocol 634
Mail Servers 634
Setting Up a Mail Client 636
Summary 638
Chapter 25: Streaming Media 639
How Streaming Works 640
Streaming versus progressive downloads 640
Unicasting versus multicasting 644
Streaming Protocols 646
Real-Time Streaming Protocol 646
Real-Time Transport Protocol 647
Real-Time Control Protocol 649
Synchronized Markup Integration Language 650
Encoding 651
Streaming Servers 653
Streaming file formats 656
Players 656
Flash 657
Silverlight 659
Summary 660
Chapter 26: Telephony and VoIP 661
Telephony 662
Private Branch Exchange Systems 663
Asterisk 663
Cisco Unified Communications Manager 665
Microsoft Response Point 665
Voice over Internet Protocol 666
Analog telephone adapters 669
Internet Protocol phones 670
VoIP protocols 672
Skinny Call Control Protocol 672
Real-Time Transport Protocol and Real-Time Transfer Control 673
Session Traversal Utilities for NAT 673
The H.323 Protocol 673
Inter-Asterisk exchange Protocol 674
Media Gateway Control Protocol 674
Computer Telephony Integration 674
Video Telephony 676
Mobile VoIP 677
Webcams 677
Summary 679
Part VI: Network Security 681
Chapter 27: Security Protocols and Services 683
Network Security Overview 684
Network vulnerabilities 684
The National Vulnerability Database 687
Points of Attack 688
Principles of secure network design 690
Location Awareness and Network Access Protection 692
Internet Security Protocols 694
IPsec 695
Transport Layer Security 698
HTTPS 700
Encryption and Cryptography 702
Brute force and ignorance 703
Symmetric key algorithms 704
Block ciphers 705
Stream ciphers 705
Hash functions 706
Asymmetric or public key algorithms 708
Kerberos 708
Summary 711
Chapter 28: Firewalls, Gateways, and Proxy Servers 713
Firewalls 714
Firewall features 714
Personal firewalls 716
Router firewalls 717
Hardware firewalls 718
Server firewalls 719
Security gateways 720
Network zones 720
Stateless filters 722
Stateful filters 723
Application filters 726
Deny by default 727
Network Address Translation 728
Proxy Servers 732
Transparent proxy servers and honeypots 735
Reverse proxy servers 735
Summary 737
Chapter 29: Virtual Private Networks 739
VPN Technologies 740
VPN types 740
VPN links 741
Site-to-site topologies 743
VPN hardware 745
VPN software 746
The Windows Server 2008 VPN Service 747
The Vista client 749
Encryption 752
Tunneling 752
Tunneling Protocols 753
Generic Routing Encapsulation 753
IPsec tunnels 754
Secure Sockets Layer/Transport Layer Security 754
Point-to-Point tunneling protocols 754
Point-to-Point Tunneling Protocol 754
Layer 2 Forwarding Protocol 755
Layer 2 Tunneling Protocol 755
Summary 756
Part VII; Network Management and Diagnostics 757
Chapter 30: Network Management 759
The Importance of Network Management 760
FCAPS ; 760
Fault management 762
Event log files 762
Alarms 764
Event correlation 765
Configuration management 766
Consoles 767
Software lifecycles and deployments 768
Accounting and administration 775
Performance management 776
Security management 780
Network Management Software Categories 780
Network Frameworks 781
Summary 784
Chapter 31: Network Diagnostic Commands 785
Network Diagnostics 786
Network Commands 786
Command line tools 786
Network Shells 802
The Windows NetShell 802
Telnet sessions 809
PowerShell 810
Summary 824
Chapter 32: Remote Access 825
Remote Access 826
Remote connection protocols 828
Remote access services 828
Remote desktops 829
RADIUS Servers 832
RADIUS sessions 834
RADIUS roaming 836
The Diameter protocol 836
Summary 838
Appendix A: TCP - UDP Port Assignments 839
Index 859
|
any_adam_object | 1 |
author | Sosinsky, Barrie |
author_facet | Sosinsky, Barrie |
author_role | aut |
author_sort | Sosinsky, Barrie |
author_variant | b s bs |
building | Verbundindex |
bvnumber | BV035706054 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)698838842 (DE-599)BVBBV035706054 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01316nam a2200337 c 4500</leader><controlfield tag="001">BV035706054</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091127 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090902s2009 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470431313</subfield><subfield code="9">978-0-470-43131-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698838842</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035706054</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sosinsky, Barrie</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Networking bible</subfield><subfield code="b">[create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more]</subfield><subfield code="c">Barrie Sosinsky</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 890 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017759894&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017759894</subfield></datafield></record></collection> |
id | DE-604.BV035706054 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:43:52Z |
institution | BVB |
isbn | 9780470431313 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017759894 |
oclc_num | 698838842 |
open_access_boolean | |
physical | XXII, 890 S. Ill. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Sosinsky, Barrie Verfasser aut Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] Barrie Sosinsky Indianapolis, IN Wiley 2009 XXII, 890 S. Ill. txt rdacontent n rdamedia nc rdacarrier Computer networks Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017759894&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Sosinsky, Barrie Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] Computer networks Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4070085-9 |
title | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] |
title_auth | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] |
title_exact_search | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] |
title_full | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] Barrie Sosinsky |
title_fullStr | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] Barrie Sosinsky |
title_full_unstemmed | Networking bible [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] Barrie Sosinsky |
title_short | Networking bible |
title_sort | networking bible create a secure network for home or enterprise learn basic building blocks and standards set up for broadcasting streaming and more |
title_sub | [create a secure network for home or enterprise ; learn basic building blocks and standards ; set up for broadcasting, streaming, and more] |
topic | Computer networks Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017759894&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT sosinskybarrie networkingbiblecreateasecurenetworkforhomeorenterpriselearnbasicbuildingblocksandstandardssetupforbroadcastingstreamingandmore |