Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
|
Buy Now
Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Loot Price: R5,203
Discovery Miles 52 030
|
|
Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Expected to ship within 12 - 17 working days
|
Windows Networking Tools: The Complete Guide to Management,
Troubleshooting, and Security explains how to use built-in Windows
networking tools and third-party networking products to diagnose
network problems, address performance issues, and enhance the
overall security of your system and network. It starts with a
review of the major components of the TCP/IP protocol suite, as
well as IP and MAC addressing, to provide a clear understanding of
the various networking tools and how they are used in a LAN and a
TCP/IP networking environment. Although the book focuses on
built-in Windows networking tools, it also investigates a number of
third-party products that can enhance the performance of your
computer. It identifies tools to help you to understand the traffic
flow and operational status of your network , illustrates the use
of numerous tools, and shows you several methods to protect your
computers from malicious software. It also examines one of the best
programs for examining the flow of data on a network Wireshark and
explains how to use this program to scan for open ports and
discover vulnerability issues. In addition to helping you gain
insight into existing problems, the text highlights built-in
Windows networking tools that can help to determine if you can
expect future bandwidth bottlenecks or other problems to occur
under different growth scenarios. Placing the proven methods of an
industry veteran at your fingertips, the book includes a chapter
devoted to software programs that can enhance the security of your
network. It explains how to negate the operation of unwanted
advertisement trackers as well as how to minimize and alleviate the
various types of hacking from keyboard loggers to network viruses.
In the event your computational device is lost or stolen a
cryptographic program is described that results in data becoming
meaningless to the person or persons attempting to read your
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.