Logo

Introduction to Networking: How the Internet Works

Large book cover: Introduction to Networking: How the Internet Works

Introduction to Networking: How the Internet Works
by

Publisher: net-intro.com
ISBN/ASIN: 1511654945
ISBN-13: 9781511654944
Number of pages: 119

Description:
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. While very complex, the Internet operates on a few relatively simple concepts that anyone can understand. This book was written for everyone -- no technical knowledge is required.

Home page url

Download or read it online for free here:
Download link
(1.6MB, PDF)

Similar books

Book cover: An Introduction to ATM NetworksAn Introduction to ATM Networks
by - Wiley
Asynchronous Transfer Mode (ATM) has become an integral part of the networking infrastructure. This introductory text on ATM networks describes their development, architecture, congestion control, deployment, and signaling in an accessible way.
(6773 views)
Book cover: Analytical Network and System AdministrationAnalytical Network and System Administration
by - Wiley
Network and system administration here refers to the skill of managing complexity. This book describes the science behind these complex systems, independent of the operating systems they work on. The book provides a unique approach to an old problem.
(1813 views)
Book cover: Introduction to Networking TechnologiesIntroduction to Networking Technologies
- IBM Redbooks
This tutorial describes a sampling of technologies of various types. It compares the technologies available in the three major technology areas: application support, transport networks, and subnetworking, with the applicability of these technologies.
(13003 views)
Book cover: Secrets of Network Cartography: A Comprehensive Guide to NmapSecrets of Network Cartography: A Comprehensive Guide to Nmap
by - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(8093 views)