Skip to content

TCP/IP for Dummies

Spend $50 to get a free DVD!

ISBN-10: 0764507265

ISBN-13: 9780764507267

Edition: 4th 2000

Authors: Candace Leiden

List price: $24.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

TCP/IP for Dummies has been completely updated to reflect changes with TCP/IP and more. This edition will describe what's new with the World Wide Web, e-mail technology, e-commerce and the internationalisation of TCP/IP.
Customers also bought

Book details

List price: $24.99
Edition: 4th
Copyright year: 2000
Publisher: John Wiley & Sons, Incorporated
Publication date: 8/11/2000
Binding: Paperback
Pages: 408
Size: 7.50" wide x 9.24" long x 1.03" tall
Weight: 1.540
Language: English

About the Authors Candace Leiden is the Chief Technologist at the Cardinal Software Group, a training and consulting corporation. Forced to learn about computers because she was afraid of slide rules, Candace has worked as a software developer, a system and network administrator, and a database administrator and architect. She currently specializes in performance management and tuning for large production databases on a variety of Linux, UNIX, and Windows 2000 systems. Candace is also the author of TCP/IP For Dummies, published by Hungry Minds, Inc., and of more than 20 technical courseware manuals for large international corporations, the United Nations, and the U.S. Department of Defense on Linux, UNIX, and Oracle. She also speaks at technical conferences worldwide. Terry Collings has been working in the computer field since 1981 and has experience in MS-DOS, Windows, Netware, and UNIX, as well as the hardware on which these systems run. He is an Instructional Technologist at Muhlenberg College in Allentown, Pennsylvania. He also teaches a wide range of computer and technology related courses in the evenings at Allentown Business School.

Foreword
Introduction
About This Book
Conventions Used in This Book
Foolish Assumptions
How This Book Is Organized
Icons Used in This Book
Where to Go from Here
TCP/IP Basics and Buzzwords
Understanding TCP/IP Basics
Pronunciation Guide
Dear Emily Post: What's a Protocol?
TCP/IP Protocols--Rules for the Internet
Checking Out RFCs: The Written Rules
What's a Transport?
The TCP/IP Declaration of Independence
What You Need to Know about Networks
What's a Network?
Packets, Protocols, and TCP/IP
How Ethernet Works
How Token Ring Works
Getting More Speed
Choosing between Ethernet and Token Ring
Geographical Types of Networks
SOHO Is Not Just a London Neighborhood
Internetworking Technologies: Client/Server, P2P, and Grid
What Exactly Is Client/Server, Anyway?
The Server Part of Client/Server
The Client Part of Client/Server
Are You Being Served?
How TCP/IP Supports Client/Server
Recognizing Other Internetworking Styles
TCP/IP and Internets, Intranets, and Extranets
The Internet versus an internet
Who's in Charge of TCP/IP and the Internet, Anyway?
What Is an Intranet?
What's a Virtual Private Network (VPN)?
Getting Technical with Protocols and Addresses
Introducing the TCP/IP Model and the Protocols
Taking a Modular Approach to Networking
The TCP/IP Protocol Suite
The Protocols (And You Thought There Were Only Two!)
Nice Names and Agonizing Addresses
What Did You Say Your Computer's Name Was Again?
Translating Host Names into Numbers
What's in an IP Address?
Getting an IP Address
The Four Sections of the IPv4 Address
For Math Nerds Only: Biting Down on Bits and Bytes
DHCP Gives Network Administrators Time to Rest
Will the Internet Ever Run Out of Addresses?
Back to the Comfort Zone
Not Enough Addresses? Try Subnets, DHCP, CIDR, NAT
Working with Subnets and Subnet Masks
DHCP Gives Network Administrators Time to Rest
CIDR (Classless Inter-Domain Routing) Juices Up the Internet
NAT (Network Address Translation)
Configuring TCP/IP
Setting Up and Configuring TCP/IP: The Basic Steps
Configuring Clients to Use TCP/IP
Configuring a Server to Use TCP/IP
The Network Files
Dealing with the Devil
IPv6--IP on Steroids
If It Ain't Broke, Don't Fix It--Well, Maybe It Could Be Improved
Wow! Eight Sections in an IPv6 Address?
Shorthand for Non-Stenographers
What about Subnet and Supernet Masks?
Special IPv6 Addresses
IPv6--and the Using Is Easy
Setting Up IPv6
Other Delicious IPv6 Morsels
Sharing the Planet--IPv6 and IPv4 Can Coexist
Welcome to the 6Bone
When ... You Made It!
Using and Configuring TCP/IP Services
Resolving Names and Addresses with DNS
Getting to Know DNS
DNS = Does Nifty Searches
Revisiting Client/Server--You Can't Get Away from It
The Internet's Definition of Domain
Servers, Authority, and Other Techie Stuff
Configuring a DNS Client
E-Mail and Other Communication Services
Is E-Mail TCP/IP?
E-Mail Addresses: @ Marks the Spot
Understanding How Internet Mail Works
Setting Up Your MUA
Mutt
"Alias Smith and Jones"
Configuring a Mail Server (MTA)
Interconnecting Internet Mail with Proprietary Mail
Free E-Mail with All the Trimmings
Going Beyond E-Mail with Usenet News
Are E-Mail and News Too Slow for You?
ET Should Have Used Internet Phone
Getting Started with Web Clients and Servers
What Are Hypertext and Hypermedia?
Understanding How Web Browsers Work
How Does Information Get on the Web?
Using Your Search Engine
Web Services
Reducing the Web's Wait
Who's in Charge of the Web?
Sharing Files with FTP and rcp
The FTP Blue Plate Special
Using Anonymous FTP to Get Good Stuff
Choosing Your FTP Client Application
Using FTP to Transfer Files
Beyond the Basics (Just a Little)
Smart FTP Tricks
Installing and Configuring an FTP Server
Using rcp (Not Just Another Copy Program)
Sharing Compute Power across a Network
Sharing Other People's Computers
Telnet: A Protocol, Application, and Service
R you Ready foR MoRe Remote log-ins?
Stealing Cycles with rsh
What? They Don't Trust You? No Problem: rexec to the Rescue!
Sniffing Out Security Holes with SSH
Working with Secure Clients and Servers
Using a Secure telnet Client with a Secure Server
The Most Important telnet Tip for Servers
The Second Most Important telnet Tip for Servers
Stealing Cycles on a Very Large Scale
Mobile IP, Dialup Networking, and IP Telephony
Mobile IP for Hassle-Free Travel
Connecting with Dialup Protocols
Understanding IP Telephony
Network Hardware and Security
The Dreaded Hardware Chapter
What's Hardware Got to Do with It?
Keep Layers in Mind
Packets Chew through Network Layers
Modems
Satisfy Your Need for Speed with Other Things That People Call Modems
Stretching the Network
Rowter or Rooter? Dosesn't Matter
Choosing a Router
Configuring a Router on Windows NT Server
Getting Started with Routing Protocols
Gateways: The Ultimate Interpreters
The Party's Over--It's Decision Time
Troubleshooting Connectivity Problems Step by Step
Getting Started with ping
Chasing Network Problems Step by Step
Using ps to Diagnose Network Services
Protecting and Monitoring Network Security
Looking Back at Early Security
What's Involved in Network Security?
Jump-starting Security in Only Four Steps
Sweating the Small Stuff!
Using Built-in Security Tools
Protecting Your Network
Introducing Firewalls
Analyzing Windows Internet Security
Securing E-Mail and Other TCP/IP Applications
Don't Believe Everything You Read, Part One: E-Mail
Don't Believe Everything You Read, Part Two: Usenet News
Passwords May Not Be As Safe As You Think
Be Aware of Security Pitfalls in Your Applications and Services
Advanced Security
Getting Started with Encryption and Authentication
Kerberos--Guardian or Fiend?
Using Secure Protocols for Secure Internet Transactions
IPSec (IP Security Protocol)
Getting Started with VPNs (Virtual Private Networks)
The Part of Tens
Ten Strange but Real TCP/IP Network Devices (No Kidding!)
Soda Machines
Toasters
You Better Watch Out, You Better Not Pout
From the North Pole to the South Pole
A Telescope in California
The Refrigerator
The Streets of Seattle (for Anne Marie)
An Interactive Model Railroad
Tend a Garden Even If You Have No Land
Space: The Final Frontier on the Web?
Watch Your Back--Ten Practical Security Tips
Protecting Your Business
Take a Free "Snoop Test"
Browse Anonymously
Use Secure Clients
Use Secure Servers
Be CERTain You Know the Dangers
Know What Your Browser Is Doing
Keep Security Up-to-Date
Clear the Browser Cache
Cover Your Browser's Tracks in the Windows Registry
Ten Ways to Get RFCs
Making Friends with the Editor
Finding the RFC Index
Using the Web to Get an RFC (And More)
Using Anonymous FTP to Get an RFC
Getting an RFC via E-Mail
About the CD
System Requirements
Using the CD with Microsoft Windows
Using the CD with Linux or UNIX
Using the CD with the Mac OS
What You'll Find
Bonus chapters
Browsers
Messaging and IP telephony tools
Networking utilities and tools
Reference information
Security applications
Troubleshooting the CD
Index