Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking with Microsoft Windows Vista: Your Guide to Easy and Secure Windows Vista Networking

Buy
Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware--from wireless NICs to access points to range extenders.

 

We include handy “buyer’s guides” that tell you how to make smart choices when purchasing network hardware. With hardware in hand, we then show you how to roll up your shirtsleeves and put everything together, including configuring a router, laying cable, and connecting the devices. Next, we then show you how to wrangle with Windows Vista’s networking features. These techniques include using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline. And if you are a music and video aficionado, we’ve got you covered with a special chapter that shows you just how to set up a networked Vista PC as your digital media hub!

 

No networking book would be complete without extensive coverage of security issues that affect anyone connected to the Internet. We show you how to secure each computer, secure your global networking settings, and batten down your wireless connections. The last part of the book includes intermediate networking tasks such as

making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista’s built-in web server and FTP server.

 

•    No longer is networking a topic that only geeks need to understand. If you have even one computer on the Internet or if you use wireless in your home or office, you need this book!

•    Extensive hardware coverage that shows you what equipment to buy and how to set it up!

•    Easy to follow buyer’s guides that enable anyone to make smart and informed choices when purchasing networking hardware.

•    Complete and comprehensive coverage of Windows Vista’s networking features.

•    Thwart hackers, crackers, thieves and other Internet malefactors by following our easy to understand chapters on security!

•    Loaded with tips, tricks, and shortcuts to make networking easier and more secure.

•    Chock full of real-world examples and network configurations that you can put to work today!


About the Author


Paul McFedries is a full-time technical writer who has worked with computers in one form or another since 1975 and has used Windows since version 1 was foisted upon an unsuspecting (and underwhelmed) world in the mid-1980s. He is the author of more than 60 computer books that have sold more than three million copies worldwide. His recent titles include the Sams Publishing books Windows Vista Unleashed and Windows Home Server Unleashed and the Que Publishing books Formulas and Functions with Microsoft Excel 2007, Tricks of the Microsoft Office 2007 Gurus, and Microsoft Access 2007 Forms, Reports, and Queries. Please visit Paul’s website at http://www.mcfedries.com/. Paul is also the proprietor of Word Spy (http://www.wordspy.com) a website devoted to tracking new words and phrases as they enter the English language.

(HTML tags aren't allowed.)

Technical Writing for Success
Technical Writing for Success

Taking an applied approach to teaching workplace writing, TECHNICAL WRITING FOR SUCCESS 3E is a comprehensive text designed to focus on skills that employers demand in today's workplace--thinking, listening, composing, revising, and editing. Students are encouraged to acquire many workplace skills through integrated and applied...

Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...

Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global Specification and Validation of Embedded Systems: Integrating Heterogeneous Components
Global modelling and validation is required to master the design of systems made of heterogeneous components. These systems are now omnipresent in our life, and they may be found in several domains such as communications (ex. mobile terminals, optical switches), health (e.g. cardiac stimulators, cochlear implants), transportation (ex. automotive...
Beginning Dreamweaver MX
Beginning Dreamweaver MX
Dreamweaver is used by 1.7 million developers and is the world’s most popular web development tool. With this book you’ll learn how to use the latest version – Dreamweaver MX – to create professional websites that you’ll be proud to publish.

Our fast-paced tutorials walk you through building three complete...

Magento PHP Developer's Guide - Second Edition
Magento PHP Developer's Guide - Second Edition

Get up and running with the highly customizable and powerful e-commerce solution, Magento

About This Book

  • Build your first Magento extension, step by step
  • Extend the core Magento functionality, such as the API
  • A practical and succinct guide to test your Magento code
  • ...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy