Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Networks (5th Edition)

Buy
Computer Networks (5th Edition), 9780132126953 (0132126958), Prentice Hall, 2010

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in 1996, computer networks, especially the Internet, had become a daily reality for millions of people. By the fourth edition, in 2003, wireless networks and mobile computers had become commonplace for accessing the Web and the Internet. Now, in the fifth edition, networks are about content distribution (especially videos using CDNs and peer-to-peer networks) and mobile phones are small computers on the Internet.

Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments.

Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key principles, then illustrates them utilizing real-world example networks that run through the entire book—the Internet, and wireless networks, including Wireless LANs, broadband wireless and Bluetooth. The Fifth Edition includes a chapter devoted exclusively to network security. The textbook is supplemented by a Solutions Manual, as well as a Website containing PowerPoint slides, art in various forms, and other tools for instruction, including a protocol simulator whereby students can develop and test their own network protocols.

(HTML tags aren't allowed.)

HTML5 Games Most Wanted: Build the Best HTML5 Games
HTML5 Games Most Wanted: Build the Best HTML5 Games

HTML5 Games Most Wanted gathers the top HTML5 games developers and reveals the passion they all share for creating and coding great games. You'll learn programming tips, tricks, and optimization techniques alongside real-world code examples that you can use in your own projects. You won't just make...

Sams Teach Yourself Facebook in 10 Minutes
Sams Teach Yourself Facebook in 10 Minutes

Sams Teach Yourself Facebook in 10 Minutes offers straightforward, practical answers

when you need fast results. By working through 10-minute lessons, you’ll learn everything you

need to know to quickly and easily get up to speed with Facebook.

...
Linux Unwired
Linux Unwired
Linux Unwired is a one-stop wireless information source for on-the-go Linux users. Whether you're considering Wi-Fi as a supplement or alternative to cable and DSL, using Bluetooth to network devices in your home or office,or want to use cellular data plans for access to data nearly everywhere, this book will...

Absolute Beginner's Guide to Computer Basics (3rd Edition)
Absolute Beginner's Guide to Computer Basics (3rd Edition)

Think setting up your new PC is going to be a challenge that you don't have time for? Think again. Absolute Beginner's Guide to Computer Basics, Third Edition can make setting up and learning about your new computer fun and easy. Step-by-step instructions and helpful illustrations will show you...

Serial Killer Investigations
Serial Killer Investigations

In 1977, FBI Special Agent Robert Ressler first used the term ‘serial killer’ after a visit to Bramshill Police Academy, near London, where someone referred to a ‘serial burglar’. The inspired coinage was soon in general use to describe killers such as necrophile Ed Kemper (ten victims), schizophrenic Herb Mullin (14),...

Lifehacker: 88 Tech Tricks to Turbocharge Your Day
Lifehacker: 88 Tech Tricks to Turbocharge Your Day
Redefine your personal productivity by tweaking, modding, mashing up, and repurposing Web apps, desktop software, and common everyday objects. The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy