Analytical Network and System Administration
by Mark Burgess
Publisher: Wiley 2004
Number of pages: 384
Description:
Network and system administration usually refers to the skill of keeping computers and networks running properly. But in truth, the skill needed is that of managing complexity. This book describes the science behind these complex systems, independent of the actual operating systems they work on.
Download or read it online for free here:
Download link
(multiple PDF files)
Similar books
Data Communications
by Brian Brown
Contents: Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Standards Organizations; Data Codes; Asynchronous and Synchronous Protocols; Bit Orientated Protocols; Modems; TCP/IP and Inter-Networking; etc.
(13623 views)
by Brian Brown
Contents: Cables and Network Communication Systems; The Public Telephone Switched Network; The Internet; Standards Organizations; Data Codes; Asynchronous and Synchronous Protocols; Bit Orientated Protocols; Modems; TCP/IP and Inter-Networking; etc.
(13623 views)
Implementing CIFS: The Common Internet File System
by Christopher Hertel - Prentice Hall PTR
CIFS is Microsoft's standard for Internet file sharing. This book is a cross-platform guide to CIFS capabilities and behavior for developers who want to add CIFS compatibility to their products, and for network and system administrators.
(18697 views)
by Christopher Hertel - Prentice Hall PTR
CIFS is Microsoft's standard for Internet file sharing. This book is a cross-platform guide to CIFS capabilities and behavior for developers who want to add CIFS compatibility to their products, and for network and system administrators.
(18697 views)
Secrets of Network Cartography: A Comprehensive Guide to Nmap
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13755 views)
by James Messer - NetworkUptime.com
Different Nmap scans are profiled, with advantages, disadvantages, and usage guidelines for each one. Real world Nmap scenarios are presented from the perspective of the enterprise security manager, including spyware remnant identification.
(13755 views)
Bulding the Gigabit City
by Craig Settles - Smashwords
Building the Gigabit City helps you: navigate past the hype about gigabit networks; understand what super-fast Internet access can and cannot do to improve your community; do effective needs analysis; and plan effective broadband strategy.
(9834 views)
by Craig Settles - Smashwords
Building the Gigabit City helps you: navigate past the hype about gigabit networks; understand what super-fast Internet access can and cannot do to improve your community; do effective needs analysis; and plan effective broadband strategy.
(9834 views)