Muutke küpsiste eelistusi

TCP / IP For Dummies 6th edition [Pehme köide]

(Lotus Development Corp., Winchester, Massachusetts), (The Cardinal Software Group, LLC, Winchester, Massachusetts)
  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 226x188x28 mm, kaal: 612 g, Screen captures: 0 B&W, 0 Color
  • Ilmumisaeg: 07-Aug-2009
  • Kirjastus: For Dummies
  • ISBN-10: 0470450606
  • ISBN-13: 9780470450604
Teised raamatud teemal:
  • Pehme köide
  • Hind: 32,20 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 37,89 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 464 pages, kõrgus x laius x paksus: 226x188x28 mm, kaal: 612 g, Screen captures: 0 B&W, 0 Color
  • Ilmumisaeg: 07-Aug-2009
  • Kirjastus: For Dummies
  • ISBN-10: 0470450606
  • ISBN-13: 9780470450604
Teised raamatud teemal:
Provides information on TCP/IP standards and protocols, covering such topics as configuring a network, routing, DNS, Web services, security, email, social networking, mobile IP, VoIP, and file sharing.

Packed with the latest information on TCP/IP standards and protocols

TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect go-to resource for TCP/IP veterans.

The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Step-by-step instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more.

  • Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computer-to-computer communications; intranets, private internets, and the Internet are all built on TCP/IP
  • The book shows you how to install and configure TCP/IP and its applications on clients and servers; explains intranets, extranets, and virtual private networks (VPNs); provides step-by-step information on building and enforcing security; and covers all the newest protocols
  • You'll learn how to use encryption, authentication, digital certificates, and signatures to set up a secure Internet credit card transaction

Find practical security tips, a Quick Start Security Guide, and still more in this practical guide.

Introduction 1(1)
About This Book
1(1)
Conventions Used in This Book
2(1)
Foolish Assumptions
2(1)
How This Book is Organized
3(2)
TCP/IP from Names to Addresses
3(1)
Getting Connected
3(1)
Configuring Clients and Servers: Web, E-Mail, and Chat
4(1)
Even More TCP/IP Applications and Services
4(1)
Network Troubleshooting and Security
4(1)
The Part of Tens
5(1)
Icons Used in This Book
5(1)
Where to Go from Here
6(1)
Part I: TCP/IP from Names to Addresses
7(82)
Understanding TCP/IP Basics
9(10)
Following Rules for the Internet: TCP/IP Protocols
10(3)
Who's in charge of the Intenet and TCP/IP?
10(2)
Checking out RFCs: The written rules
12(1)
Examining Other Standards Organizations That Add to the Rules
13(1)
Distinguishing Between the Internet, an Internet, and an Intranet
13(1)
Extending Intranets to Extranets
14(1)
Introducing Virtual Private Networks
15(1)
Exploring Geographically Based Networks
16(3)
Networks connected by wires and cables
16(1)
Wireless networks
17(1)
The geography of TCP/IP
17(2)
Layering TCP/IP Protocols
19(24)
Taking a Timeout for Hardware
19(3)
Starting with network connection media
20(1)
Colliding with Ethernet
20(2)
Stacking the TCP/IP Layers
22(3)
The physical layer
23(1)
The data link layer
24(1)
The internet layer
24(1)
The transport layer
24(1)
The application layer
25(1)
Chewing through Network Layers: A Packet's Journey
25(3)
Understanding TCP/IP: More than just protocols
27(1)
Determining whether your network has a protocol, an application, or a service
27(1)
Plowing through the Protocol List (In Case You Thought Only Two Existed)
28(15)
Physical layer protocols
29(1)
Data link layer protocols
29(1)
Internet layer protocols
29(2)
Transport layer protocols
31(5)
Application layer protocols
36(7)
Serving Up Clients and Servers
43(8)
Understanding the Server Side
43(2)
Examining the server's job
44(1)
Identifying types of servers
44(1)
Using dedicated servers
45(1)
Understanding the Client Side
45(1)
Defining a client
45(1)
Clients, clients everywhere
46(1)
Answering the Question ``Are You Being Served?''
46(1)
Supporting TCP/IP with Client/Server and Vice Versa
47(1)
Recognizing Other Internetworking Styles: Peer-to-Peer Computing
47(4)
Determining whether peer-to-peer workgroups are still handy
48(1)
P2P applications---P2P across the Internet
48(3)
Nice Names and Appetizing Addresses
51(22)
What Did You Say Your Host's Name Is?
52(2)
Playing the numbers game
52(1)
Identifying a computer as uniquely yours
53(1)
Translating names into numbers
54(1)
Taking a Closer Look at IP Addresses
54(1)
Savoring Classful Addressing
55(1)
Recognizing the Parts of an IP Address
56(2)
Class A is for a few enormous networks
57(1)
Class B is for lots of big networks
57(1)
Class C is for millions of small networks
57(1)
Class D is for multicasting
57(1)
Biting Down on Bits and Bytes
58(2)
Obtaining an IP Address
60(4)
Choosing whether to go public or stay private
60(1)
Obeying the network police
61(1)
Obtaining a globally unique IP address
61(1)
Acquiring a static address
62(1)
Getting dynamic addresses with DHCP
62(1)
Finding out your IP address
62(2)
Resolving Names and Addresses with DNS
64(1)
Understanding the minimum amount of information about DNS
64(1)
Using DNS to ``Do Nifty Searches''
65(1)
Describing Fully Qualified Domain Names (FQDNs)
65(3)
Branching out into domains
66(2)
Stalking new domains
68(1)
Determining Whether the Internet Will Ever Fill Up
68(1)
Choking on bandwidth
68(1)
Panicking about not having enough addresses
69(1)
Dishing Up More Kinds of Addresses
69(4)
MAC: Media Access Control
69(1)
Port numbers
70(3)
Need More Addresses? Try Subnetting and NAT
73(16)
Working with Subnets and Subnet Masks
74(5)
Defining subnet masks
76(1)
Why a network has a mask when it has no subnets
76(1)
Subnetting 101
77(2)
Letting the DHCP Protocol Do the Work for You
79(4)
One administrator's nightmare is another's fantasy
80(1)
Understanding how the DHCP protocol works---it's client/server again
81(1)
Being evicted after your lease expires
82(1)
Sharing Addresses with Network Address Translation (NAT)
83(6)
Understanding how NAT works
83(1)
Securing NAT
84(1)
Using NAT and DHCP to work together
84(2)
Swallowing NAT incompatibilities
86(1)
Digesting NAT-PT (Network Address Translation-Protocol Translation)
87(2)
Part II: Getting Connected
89(110)
Configuring a TCP/IP Network---the Software Side
91(24)
Installing TCP/IP? Probably Not
91(3)
Detecting whether TCP/IP is installed
92(1)
Determining whether it's IPv4, IPv6, or both
92(1)
Savoring TCP/IP right out of the box
93(1)
Six Steps to a Complete TCP/IP Configuration
94(3)
Determining whether your computer is a client or server or both
95(1)
Gathering client information
95(1)
Setting up your NIC(s)
95(1)
Deciding on a static IP address or a DHCP leased address
96(1)
Choosing how your host will translate names into IP addresses
97(1)
Gathering server information
97(1)
Setting TCP/IP Client Properties
97(7)
Configuring TCP/IP on a Mac OS X client
98(2)
Configuring a TCP/IP client on a Linux or Unix client
100(2)
Configuring a TCP/IP client on Windows Vista
102(1)
Configuring a TCP/IP client on Windows XP
103(1)
Setting TCP/IP from Scratch
104(1)
Installing TCP/IP from Scratch
105(2)
Feasting on Network Files
107(6)
The local hosts file
107(2)
The trusted hosts file, hosts.equiv
109(1)
Freddie's nightmare: Your personal trust file
110(1)
The services file
111(2)
Daemons Aren't Devils
113(2)
Relishing your daemons
113(1)
Finding the daemons on your computer
113(2)
Networking SOHO with Wireless
115(16)
Gulping the Minimum Hardware Details
116(2)
NICs
116(1)
Routers
117(1)
Setting Up a Home Wireless Network in Four Steps
118(6)
Choose your wireless hardware
118(2)
Connect your wireless router
120(1)
Set up your wireless router
121(3)
Connect your computers
124(1)
Securing Your Network
124(1)
Securing the wired side
125(1)
Securing the wireless side
125(3)
Broadband for Everyone? We Hope
128(3)
Using wireless hotspots
128(1)
Paying for broadband wireless service
129(1)
Going anywhere you want to connect to the Internet with WiMAX
129(2)
Advancing into Routing Protocols
131(32)
Understanding Routing Lingo
132(3)
Routing Through the Layers---the Journey of a Packet
135(11)
A new message heads out across the Net
135(2)
The message visits the router
137(2)
Into an Internet router and out again
139(1)
Reaching the destination
140(3)
Getting a Handle on How Routers Work
143(3)
Getting Started with Routers
146(2)
Swallowing Routing Protocols
148(1)
Nibbling on IGP protocols
149(5)
Exterior Gateway Protocols (EGP)
152(2)
Understanding How BGP Routers Work
154(1)
Juicing Up Routing with CIDR
154(2)
C Is for Classless
156(1)
CIDR pressing the routing tables
157(3)
You say ``subnet,'' aggregating.net says ``aggregate''
159(1)
Securing Your Router
159(1)
Coring the apple with Denial of Service (DoS) Attacks
160(3)
Hijacking routers
160(1)
Eavesdropping on BGP
161(1)
It's so sad
161(1)
S-BGP (Secure BGP): Proposals to make BGP routing secure
161(2)
IPv6: IP on Steroids
163(18)
Say Hello to IPv6
163(2)
Digesting IPv4 limitations
164(1)
Absorbing IPv6 advantages
164(1)
If it Ain't Broke, Don't Fix It---Unless it Can Be Improved
165(1)
Wow! Eight Sections in an IPv6 Address?
165(4)
Why use hexadecimal?
166(1)
There's good news and there's bad news
166(1)
Take advantage of IPv6 address shortcuts
167(2)
Special IPv6 Addresses
169(1)
IPv6---and the Using is Easy
169(4)
Checking out the network with autodiscovery
170(1)
Ensuring that your address is unique
171(1)
Automatically assigning addresses
172(1)
Realizing that autoregistration says ``Let us serve you''
172(1)
IPv6 Installation
173(3)
Configuring IPv6 on Windows XP and Windows Server 2003
173(2)
Welcoming IPv6 to Mac OS X
175(1)
Getting started with IPv6 in Unix and Linux
175(1)
Other Delicious IPv6 Morsels
176(3)
Security for all
176(2)
Faster, better multimedia
178(1)
Support for real-time applications
178(1)
Improved support for mobile computing
178(1)
Share the Planet---IPv6 and IPv4 Can Coexist
179(1)
Stacking IPv4 and Iv6
179(1)
Tunneling IPv6 through IPv4
180(1)
Whew---You Made It!
180(1)
Serving Up DNS (The Domain Name System)
181(18)
Taking a Look at the DNS Components
182(1)
Going Back to DNS Basics
183(1)
Revisiting Client/Server with DNS
184(3)
Dishing up DNS client/server definitions
184(1)
Snacking on resolvers and name servers
184(2)
Who's in charge here?
186(1)
Serving a DNS client's needs
186(1)
Oops! Can't help you
187(1)
Who's Responsible for Name and Address Information?
187(2)
Understanding Servers and Authority
189(4)
Primary name server: Master of your domain
189(1)
Secondary name servers
190(2)
Caching servers
192(1)
Understanding Domains and Zones
193(2)
Problem Solving with Dynamic DNS (DYNDNS)
195(1)
Diving into DNSSEC (DNS Security Extensions)
195(4)
Why does DNS need DNSSEC?
196(1)
Glimpsing behind the scenes of DNSSEC
197(2)
Part III: Configuring Clients and Servers: Web, E-Mail, and Chat
199(92)
Digesting Web Clients and Servers
201(38)
Standardizing Web Services
201(1)
Deciphering the Languages of the Web
202(5)
HTML
202(2)
HTML 4
204(1)
XML
205(1)
XHTML
205(1)
HTML + MIME = MHTML
205(1)
Java and other Web dialects
205(1)
Hypertext and hypermedia
206(1)
Understanding How Web Browsing works
207(7)
Serving up a Web page
207(2)
Storing user information as cookies
209(1)
Managing cookies with your browser
210(2)
Dishing up multimedia over the Internet
212(2)
Feeding Web Pages with Atom and RSS
214(1)
Reducing the Web's Wide Waistline to Increase Speed
215(3)
Proxy Serving for Speed and Security
218(5)
Caching pages
219(1)
Improving security with filtering
220(1)
Setting up a proxy client
220(3)
Finishing touches
223(1)
Setting up a Caching Proxy Server
223(5)
Outlining the general steps for installing and configuring squid
223(1)
Configuring squid for Microsoft Windows Server 2008
224(4)
Browsing Securely
228(2)
Ensuring that a site is secure
228(1)
Using your browser's security features
229(1)
Setting Up a Web Server
230(5)
Setting up the Apache HTTP Server
231(3)
Speeding up Apache
234(1)
Making Apache more secure
234(1)
Adding Security to HTTP
235(2)
Taking a look at HTTPS
236(1)
Getting up to speed on SSL
236(1)
Stepping through an SSL Transaction
237(1)
Using Digital Certificates for Secure Web Browsing
238(1)
Minimum Security Facilities
239(6)
What's the Worst that Could Happen?
239(1)
Jump-Starting Security with the Big Three
240(3)
Installing a personal firewall
241(1)
Vaccinating your system with the anti-s
242(1)
Encrypting data so snoopers can't read it
243(1)
Adding a Few More Basic Protections
243(2)
Eating up E-Mail
245(16)
Getting the Big Picture about How E-Mail Works
245(1)
Feasting on E-Mail's Client-Server Delights
246(6)
E-mail clients
246(1)
E-mail clients versus Web mail clients
247(1)
E-mail servers
247(2)
Postfix: Configuring the fastest-growing MTA
249(3)
Sharpening the Finer Points of Mail Servers
252(3)
Transferring e-mail by way of store-and-forward
253(1)
Transferring e-mail by way of DNS MX records
254(1)
Understanding How SMTP Works with MTAs
255(1)
Defining E-Mail Protocols
255(1)
Adding More Protocols to the Mix
256(5)
POP3
256(1)
IMAP4
257(1)
HTTP
258(1)
LDAP
258(1)
DNS and its MX records
258(3)
Securing E-Mail
261(24)
Common Sense: The Most Important Tool in Your Security Arsenal
261(1)
Being Aware of Possible Attacks
262(5)
Phishing
263(1)
Popping up and under
263(1)
Getting spied on
263(2)
Meeting malware
265(1)
Bombing
265(1)
Have you got anything without spam? Spam, spam, spam!
266(1)
Spoofing
267(1)
Finding Out Whether You're a Victim
267(1)
Playing Hide-and-Seek with Your E-Mail Address
268(1)
Layering Security
269(9)
Letting your ISP protect your network
269(1)
Building your own walls
270(1)
Securing e-mail on the server side
271(3)
Securing e-mail on the client side
274(4)
Suitely extending e-mail security
278(1)
Using Secure Mail Clients and Servers
278(7)
Setting up a secure IMAP or POP client
279(2)
Setting up a secure mail server
281(1)
Encrypting e-mail
281(4)
Beyond E-Mail: Social Networking and Online Communities
285(6)
Thumbing to Talk About
286(1)
Choosing a Communication Method
287(2)
Getting together with IRC
288(1)
Jabbering with XMPP
288(1)
Feeding Your Craving for News
289(1)
Getting Even More Social
290(1)
Part IV: Even More TCP/IP Applications and Services
291(50)
Mobile IP---The Moveable Feast
293(6)
Going Mobile
294(1)
Understanding How Mobile IP Works
294(2)
Sailing into the Future: Potential Mobile IPv6 Enhancements
296(1)
Mobilizing Security
297(2)
Understanding the risks
297(1)
Using basic techniques to protect your mobile devices
298(1)
Saving Money with VoIP (Voice Over Internet Protocol)
299(10)
Getting the Scoop on VoIP
299(1)
Getting Started Using VoIP
300(4)
Get broadband
300(1)
Decide how to call
301(1)
Make the call
302(1)
Convert the bits back into voice (with VoIP software)
303(1)
Converse
303(1)
Yo-Yo Dieting: Understanding How VoIP Packets Move through the Layers
304(1)
Trekking the Protocols from RTP to H.323
304(2)
Talking the talk with the TCP/IP stack and more
305(1)
Ingesting VoIP standards from the ITU
306(1)
Vomiting and Other Vicious VoIP Vices
306(1)
Securing Your Calls from VoIP Violation
306(2)
You, too, can be a secret agent
307(1)
Authenticating VoIP-ers
307(1)
Keeping voice attacks separate from data
308(1)
Defending with firewalls
308(1)
Testing Your VoIP Security
308(1)
File and Print Sharing Services
309(24)
Defining Basic File Sharing Terms
309(1)
Using FTP to Copy Files
310(6)
Understanding how FTP works
310(1)
Using anonymous FTP to get good stuff
311(1)
Choosing your FTP client
312(1)
Transferring the files
312(3)
Securing FTP file transfers
315(1)
Using rcp or scp to Copy Files
316(1)
Sharing Network File Systems
317(2)
Nifty file sharing with NFS (Network File System)
317(1)
Solving the buried file update problem with NFSv4
318(1)
Examining the mount Protocol
319(1)
Automounting
320(1)
Configuring an NFS Server
320(4)
Edit the exports file
321(1)
Update the netgroup file
321(1)
Start the daemons
322(1)
Configuring an NFS Client
323(1)
Picking Up Some NFS Performance Tips
324(1)
Hardware tips
324(1)
Server tips
325(1)
Client tips
325(1)
Weighing performance against security
325(1)
Getting NFS Security Tips
325(1)
Sharing Files off the Stack
326(2)
Using Windows network shares
326(1)
Using Samba to share file and print services
327(1)
Working with Network Print Services
328(3)
Valuing IPP features
329(1)
Setting up Windows Server 2008 print servers over IPP
330(1)
Printing with the Common Unix Print System (CUPS)
331(2)
Sharing Compute Power
333(8)
Sharing Network Resources
333(1)
Accessing Remote Computers
334(2)
Using a telnet client
334(1)
``R'' you ready for more remote access?
335(1)
Executing commands with rsh and rexec
335(1)
Securing Remote Access Sessions
336(1)
Taking Control of Remote Desktops
337(1)
Sharing Clustered Resources
338(1)
Clustering for high availability
338(1)
Clustering for load balancing
338(1)
Clustering for supercomputing
339(1)
Sharing Compute Power with Grid and Volunteer Computing
339(2)
Part V: Network Troubleshooting and Security
341(70)
Staying with Security Protocols
343(30)
Determining who is Responsible for Network Security
344(1)
Following the Forensic Trail: Examining the Steps for Securing your Network
344(1)
Prescribing Preventive Medicine for Security
345(2)
Observing Symptoms of Malware Infection
347(26)
Uncovering more contagions
348(7)
Diagnosing Security Ailments with netstat, ps, and Logging
355(1)
Monitoring network use with ps
355(2)
Nosing around with netstat
357(5)
Examining logs for symptoms of disease
362(1)
Syslog-ing into the next generation
363(7)
Microsoft proprietary event logging
370(3)
Relishing More Meaty Security
373(16)
Defining Encryption
374(1)
Advancing Encryption with Advanced Encryption Standard (AES)
375(1)
Peering into Authentication
376(5)
Do you have any ID? A digital certificate will do
377(1)
Getting digital certificates
377(1)
Using digital certificates
378(1)
Checking your certificates
379(1)
Coping with certificate problems
380(1)
IPSec (IP Security Protocol): More Authentication
381(1)
Kerberos---Guardian or Fiend?
382(7)
Understanding Kerberos concepts
382(1)
Playing at Casino Kerberos
383(1)
Training the dog---one step per head
384(1)
Setting up a Kerberos server step by step
385(2)
Setting up a Kerberos client step by step
387(2)
Troubleshooting Connectivity and Performance Problems
389(22)
Chasing Network Problems from End to End
390(1)
Getting Started with Ping
390(6)
Pinging away with lots of options
391(2)
And now, for ``some-ping'' completely different: Running ping graphically
393(2)
Death by ping
395(1)
Diagnosing Problems Step by Step
396(10)
Pinging yourself and others
396(5)
Using nslookup to query a name server
401(2)
Using traceroute (tracert) to find network problems
403(3)
Simplifying SNMP, the Simple Network Management Protocol
406(5)
Just barely describing how SNMP works
406(1)
Using SMNP programming free
407(4)
Part VI: The Part of Tens
411(10)
Ten More Uses for TCP/IP
413(4)
Ten More Resources for Information about TCP/IP Security
417(4)
Index 421
Candace Leiden consults on systems and database performance and instructional design for international courseware. Marshall Wilensky was a consultant and network manager for multiprotocol networks at Harvard University's Graduate School of Business Administration. Both are internationally known speakers.