Categories
Technical
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Reddington
Viaje
Chroniclers
Icerigger
Retreat
Cebas
thodes
javascript
Gegner
Minimally
Landscapes
Battlefield
集粹
孙德良
Jacsonville
Ongoing
Gaurav
PILOT
Rieu
Perens
Victoria
Nuova
Manoeuvres
Revue
BJERKE
Thymus
Enlightened
Troll
Virulence
clavecin
Ripple
Iriquois
FLARES
Entscheidung
Bordnetze
vita
vivir
Spinal
Positron
COODER
Revolver
Bolshoi
Spindler
Luigi
S01E05
norway
Grind
Modalities
Neuropathies
危险度
Newest
Lectures on Numerical Methods in Bifurcation Problems
Methods for Finding Zeros in Polynomials
Lectures on Stochastic Flows and Applications
Educational Psychology by Edward L. Thorndike
The Last Days of Tolstoy by V. G. Chertkov
Globalization and Responsibility
Lectures on Siegel Modular Forms and Representation by Quadratic Forms
Lectures on Topics In One-Parameter Bifurcation Problems
History of the Incas by Pedro Sarmiento de Gamboa
Linear Algebra: Theorems and Applications
Lectures on Stochastic Differential Equations and Malliavin Calculus
A Short Biographical Dictionary of English Literature
Lectures on Sieve Methods and Prime Number Theory
Dollars and Sense by William Crosbie Hunter
The Theory of the Theatre by Clayton Hamilton
The Mathematics of Investment
Occupiers of Wall Street: Losers or Game Changers
The Solution of the Pyramid Problem
Lectures on Moduli of Curves
Walden by Henry David Thoreau
Methods for Finding Zeros in Polynomials
Lectures on Stochastic Flows and Applications
Educational Psychology by Edward L. Thorndike
The Last Days of Tolstoy by V. G. Chertkov
Globalization and Responsibility
Lectures on Siegel Modular Forms and Representation by Quadratic Forms
Lectures on Topics In One-Parameter Bifurcation Problems
History of the Incas by Pedro Sarmiento de Gamboa
Linear Algebra: Theorems and Applications
Lectures on Stochastic Differential Equations and Malliavin Calculus
A Short Biographical Dictionary of English Literature
Lectures on Sieve Methods and Prime Number Theory
Dollars and Sense by William Crosbie Hunter
The Theory of the Theatre by Clayton Hamilton
The Mathematics of Investment
Occupiers of Wall Street: Losers or Game Changers
The Solution of the Pyramid Problem
Lectures on Moduli of Curves
Walden by Henry David Thoreau
Useful Links
互联网工作原理(2006,第八版)
Posted on 2010-04-27
|
More Simple, clear explanations walk you through every technology Detailed explanations walk you through the technology. DISCOVER HOW THE INTERNET REALLY WORKS... IT'S AMAZINGLY EASY! This new edition has been completely updated for today's hottest Internet technologies, Web connections, hardware, communications and entertainment services, and much more! See how the Internet can deliver any kind of information, anywhere: web pages, email, music, video, phone calls, and more! Discover how your connection to the Internet works... wireless, cable modem, DSL, even cellphones Go behind the scenes with today's most sophisticated websites, applications, and services Protect yourself from the latest Internet dangers, including phishing, web surveillance, and wireless hacking Preston Gralla is the award-winning author of more than 30 books, including How the Internet Works, Complete Idiot's Guide to Internet Privacy and Security, Complete Idiot's Guide to Protecting Your Child Online, and How Wireless Works. He has written frequently about security issues, computer technology, the Internet, and has been a columnist for many magazines, websites and newspapers. Copyright About The Author Acknowledgments We Want to Hear from You! Reader Services Introduction Part 1: Understanding the Internet's Underlying Architecture Chapter 1. What Is the Internet? How the Internet Comes Together An Internet Timeline Chapter 2. How Computer Networks Send Data Across the Internet How Networks Talk with Each Other How Networks Link to the Internet Chapter 3. How TCP/IP Works How the Internet's Basic TCP/IP Protocols Work How IPv6 Works Chapter 4. Understanding the Internet's Software Structure How Client/Server Architecture Works Chapter 5. How Internet Addresses and Domains Work Understanding Internet Addresses and Domains How Domain Name System Servers Work How Static and Dynamic IP Addresses Work How Network Address Translation Works Chapter 6. How Routers Work How Routers Send Data to Their Destination Part 2: Connecting to the Internet Chapter 7. How Computers Connect to the Internet How America Online Connects to the Internet Connecting Your Computer to the Internet How a Modem Makes Its Connection How DSL Makes Its High-Speed Connection Chapter 8. How Internet/Television Connections Work How Cable Modems Work How Internet-Enhanced TV Works How IPTV Works Chapter 9. How Wireless Connections and WiFI Work How to Access the Internet via a Satellite Connection How Cell Phones Access the Internet How Bluetooth Works How Wireless (WiFi) Networks Work How Public Wireless Hot Spots Work How WiMax Works Chapter 10. How Home Networks Work How Home Networks Let You Share Your Internet Connection How a Wireless Media and Music Server Works Part 3: Communicating on the Internet Chapter 11. How Email Works How Email Is Delivered Over the Internet How Email Software Works How a Mailing List Works How Email Is Sent Between Networks How BlackBerries Deliver Email How White Page Directories (LDAP) Work How Encryption Can Keep Email Private Chapter 12. How Email Spam Works How Email Spam Is Sent How Email Spam Is Blocked Chapter 13. How Newsgroups Work How Usenet Works Chapter 14. How Internet Chat and Instant Messaging Work How IRC Works How Instant Messaging Works How Chat Rooms Throw a Party Chapter 15. How Skype and VoIP Work How VoIP (Voice over Internet Protocol) Works How Skype Works How RSS Works Part 4: How the World Wide Web Works Chapter 17. How Web Pages Work How the World Wide Web Works How Web Pages Are Organized on a Website How Websites Are Constructed Chapter 18. How Web Browsers Work How a Web Browser Works What Common Browser Error Messages Mean Chapter 19. How Markup Languages Work How HTML Works How Dynamic HTML Works How XML Works How AJAX Works Chapter 20. How Hypertext Works How Hyperlinks Work Chapter 21. How URLs Work How URLs Are Structured How URLs Help Retrieve Web Documents Chapter 22. How Image Maps and Interactive Forms Work How Image Maps Work How Interactive Forms Work Chapter 23. How Web Host Servers Work How Web Server Software Works Chapter 24. How Websites Work with Databases How the Web Works with Databases Chapter 25. How .NET and Web Services Work Understanding .NET and Web Services Chapter 26. How Grid Computing Works Understanding How Grid Computing Works Part 5: Using the World Wide Web Chapter 27. How Internet Searching Works How Internet Search Engines Work How Meta-Search Software Works Chapter 28. How Google Works How Google Searches the Internet What Google Knows About You Chapter 29. How Map Sites Work How Map Sites Work How Google Earth Works Chapter 30. How Wikis and the Wikipedia Work How the Wikipedia Works Part 6: Using Common Internet Tools Chapter 31. How Telnet Works Understanding Telnet Chapter 32. How FTP Works How an FTP Session Works How File Compression Works Chapter 33. How Agents Work Agents on the Internet Chapter 34. How Java, ActiveX, and JavaScript Work How Java Works How ActiveX Works How JavaScript Works Chapter 35. How CGI Scripting Works Understanding CGI Scripting Part 7: Enjoying Entertainment and Multimedia on the Internet Chapter 36. How Music and Audio Work on the Internet How RealPlayer Streaming Audio Works How MP3 Music Files Work How Internet Radio Broadcasting Works Chapter 37. How iPods, iTunes, and Podcasting Work How iPods Work How iTunes Works How Podcasting Works Chapter 38. How Music Sharing and File Sharing Work How Peer-to-Peer Software Shares Files and Music How BitTorrent Works Chapter 39. How Multicast IP and the MBone Work How Multicast IP Travels Along the MBone Chapter 40. How Virtual Reality Is Created by VRML How Virtual Reality Is Created by VRML Chapter 41. How Animation on the Web Works How Client Pull and Server Push Animation Work How Shockwave Works How Flash Works Part 8: Shopping and Doing Business on the Internet Chapter 42. How Intranets Work Using an Intranet Within a Company How Virtual Private Networks (VPNs) Work Chapter 43. Shopping on the Internet How Online Buying Works How Online Shopping Carts Work How eBay Sells Everything Part 9: Protecting Yourself on the Internet Chapter 44. How Firewalls Work How Corporate Firewalls Work How Personal Firewalls Work How Proxy Servers Work Chapter 45. How Hackers Can Cripple the Internet and Attack Your PC How Smurf Attacks and DOS Attacks Work How Hackers Can Attack Your Computer How Email Viruses Travel in Your Email How Zombies and Bot Networks Work How Hackers Exploit Browsers Chapter 46. The Dangers of Wireless Networking How War Drivers Invade Your Network How "Evil Twin" Hacks Work How Paris Hilton's Cell Phone Was Hacked How Wireless Network Protection Works Chapter 47. How Viruses Work How Viruses Infect Computers How Worms Work Chapter 48. How Internet Sites Can Invade Your Privacy How Cookies Work How Websites Track Your Activities How Web Bugs Can Invade Your Privacy How Internet Passports Work Chapter 49. The Dangers of Spyware and Phishing How Spyware Works Following the Spyware Money Trail How Phishing Works Following the Phishing Money Trail How to Protect Against Spyware Chapter 50. Cryptography, Privacy, and Digital Certificates How Cryptosystems Work How Digital Certificates Ensure Internet Security Chapter 51. How Government and Workplace Surveillance Work How the National Security Agency's Echelon Spy System Works How the FBI's Carnivore System Invaded Your Privacy How Internet Workplace Surveillance Works Chapter 52. Parental Controls on the Internet How Parental Controls Work Glossary Index
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: