Introduction to Networking: How the Internet Works
by Charles Severance
Publisher: net-intro.com 2015
ISBN/ASIN: 1511654945
ISBN-13: 9781511654944
Number of pages: 119
Description:
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. While very complex, the Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone -- no technical knowledge is required.
Download or read it online for free here:
Download link
(1.6MB, PDF)
Similar books
An Introduction to Computer Networks
by Peter L Dordal - Loyola University Chicago
A free general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text ...
(17101 views)
by Peter L Dordal - Loyola University Chicago
A free general-purpose textbook about computer networking, complete with diagrams and exercises. It is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, or as a supplemental text ...
(17101 views)
Understanding OSI
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(20749 views)
by John Larmouth - Prentice Hall
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(20749 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13164 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13164 views)
Serial Programming
by Robert Horning, at al. - Wikibooks
This book explains different aspects of serial data communication. The focus will be around the implementation of RS-232 based serial data communication and will explore a wide range of implementations and uses for serial data transfer.
(14248 views)
by Robert Horning, at al. - Wikibooks
This book explains different aspects of serial data communication. The focus will be around the implementation of RS-232 based serial data communication and will explore a wide range of implementations and uses for serial data transfer.
(14248 views)