TCP/IP for dummies / by Candace Leiden and Marshall Wilensky ; foreword by Scott Bradner.

By: Leiden, CandaceContributor(s): Wilensky, MarshallMaterial type: TextTextSeries: --For dummies: Publisher: Hoboken, NJ : Wiley, c2009Edition: 6th edDescription: xvii, 438 p. : ill. ; 24 cmISBN: 9780470450604; 0470450606Subject(s): TCP/IP (Computer network protocol) | Computer network protocolsDDC classification: 004.62 LOC classification: TK5105.585 | .L45 2009Summary: Includes the latest on Web standards and protocols and new hardware, plus timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to: install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies; and numerous practical security tips as well as a Quick Start Security Guide. Learn to "use new methods to guard against phishing, spear-phishing, and vishing." -- Cover, p. [1].
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
TK5105.585 .L45 2009 (Browse shelf (Opens below)) 1 Available STACKS 51952000079286
Books Books Main Library
TK5105.585 .L45 2009 (Browse shelf (Opens below)) 1 Available STACKS 51952000057512

Includes bibliographic references (primarily in the form of many informative web resources) and index.

Includes the latest on Web standards and protocols and new hardware, plus timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to: install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies; and numerous practical security tips as well as a Quick Start Security Guide. Learn to "use new methods to guard against phishing, spear-phishing, and vishing." -- Cover, p. [1].

1 2

There are no comments on this title.

to post a comment.