Preface |
|
xxiii | |
Chapter 1 The Internet Is Everywhere |
|
3 | (8) |
|
1.1 Basic Facts Do Not Tell The Story |
|
|
5 | (1) |
|
1.2 Imagine Life Without The Internet |
|
|
5 | (1) |
|
1.3 Why You Should Understand Internet Technology |
|
|
6 | (1) |
|
1.4 Learning About The Internet |
|
|
6 | (1) |
|
1.5 Understanding The Big Picture |
|
|
7 | (1) |
|
1.6 Terminology And Technology |
|
|
7 | (1) |
|
1.7 Growth And Adaptability |
|
|
8 | (1) |
|
1.8 The Impact Of The Internet |
|
|
8 | (1) |
|
1.9 Organization Of The Book |
|
|
8 | (1) |
|
|
9 | (2) |
Part I: Before The Internet |
|
11 | (54) |
|
Chapter 2 Telephones Everywhere |
|
|
15 | (8) |
|
|
15 | (1) |
|
2.2 A Communication Service |
|
|
15 | (1) |
|
2.3 Selling Communication |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
2.6 The Difficult Transition |
|
|
17 | (1) |
|
|
18 | (1) |
|
2.8 Relevance To The Internet |
|
|
19 | (1) |
|
|
19 | (4) |
|
Chapter 3 The World Was Once Analog |
|
|
23 | (14) |
|
|
23 | (1) |
|
3.2 Sound, Vibrations, And Analog Recording |
|
|
23 | (1) |
|
3.3 Analog Electronic Devices |
|
|
24 | (1) |
|
3.4 Many Electronic Devices Are Analog |
|
|
25 | (1) |
|
3.5 The First Analog Communication |
|
|
25 | (1) |
|
3.6 Sending An Analog Signal Across A Wire |
|
|
26 | (1) |
|
3.7 Analog Is Simple But Inaccurate |
|
|
27 | (1) |
|
3.8 A Definition Of Digital |
|
|
27 | (1) |
|
|
28 | (1) |
|
3.10 Recording Sound As Numbers |
|
|
28 | (3) |
|
3.11 Converting Between Analog And Digital Forms |
|
|
31 | (1) |
|
3.12 Why Did Digital Music Take Over? |
|
|
32 | (1) |
|
|
33 | (4) |
|
Chapter 4 The Past And Present Digital Network |
|
|
37 | (8) |
|
|
37 | (1) |
|
4.2 The World Was Previously Digital |
|
|
37 | (1) |
|
4.3 A Telegraph Was Digital |
|
|
38 | (1) |
|
|
38 | (1) |
|
4.5 Letters And Digits In Morse Code |
|
|
39 | (1) |
|
4.6 Telegraph Users Did Not Encounter Morse Code |
|
|
40 | (1) |
|
4.7 Virtually Instant Communication |
|
|
40 | (1) |
|
|
40 | (1) |
|
4.9 The Telephone Eventually Became Digital |
|
|
41 | (1) |
|
4.10 Relevance To The Internet |
|
|
41 | (1) |
|
4.11 Binary Encoding Of Data On The Internet |
|
|
42 | (1) |
|
4.12 Why Use Two Symbols? |
|
|
42 | (1) |
|
|
42 | (3) |
|
Chapter 5 Basic Communication |
|
|
45 | (10) |
|
|
45 | (1) |
|
5.2 Communication Using Electricity |
|
|
45 | (1) |
|
|
46 | (1) |
|
5.4 Using Signals To Send Information |
|
|
46 | (1) |
|
5.5 Modem: A Modulator And A Demodulator Combined |
|
|
47 | (1) |
|
5.6 How Modems Allow Two-Way Traffic |
|
|
48 | (1) |
|
5.7 A Character Code For Digital Information |
|
|
48 | (2) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (4) |
|
Chapter 6 Local Area Networks |
|
|
55 | (10) |
|
|
55 | (1) |
|
6.2 The Digital Revolution |
|
|
55 | (1) |
|
6.3 The Move To Multiple Computers |
|
|
56 | (1) |
|
6.4 Removable Media And Manual Transfer |
|
|
56 | (1) |
|
6.5 Early Computers Used Circuit Boards |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
6.9 Wireless LAN (WLAN) Connections |
|
|
60 | (1) |
|
6.10 Wired And Wireless LAN Technologies |
|
|
60 | (1) |
|
6.11 Wireless PAN Technology |
|
|
61 | (1) |
|
6.12 Connecting A Device To An Ethernet |
|
|
61 | (1) |
|
6.13 Connecting A Device To A Wi-Fi Network |
|
|
62 | (1) |
|
|
63 | (1) |
|
6.15 The Importance Of LAN Technology |
|
|
63 | (1) |
|
6.16 Relationship To The Internet |
|
|
64 | (1) |
Part II: A Brief History Of The Internet |
|
65 | (28) |
|
Chapter 7 Internet: Motivation And Beginnings |
|
|
69 | (12) |
|
7.1 A Proliferation Of LANs |
|
|
69 | (1) |
|
7.2 No Technology Solves All Problems |
|
|
70 | (1) |
|
7.3 Wide Area Network Technologies |
|
|
70 | (1) |
|
7.4 Can We Build A Global WAN? |
|
|
71 | (1) |
|
7.5 U.S. Department Of Defense Networking Research |
|
|
72 | (1) |
|
7.6 Experimental Research |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
7.11 The Surprising Choice Of Open Standards |
|
|
74 | (1) |
|
7.12 Open Communication Systems Win |
|
|
75 | (1) |
|
7.13 Placing Internet Technical Documentation Online |
|
|
75 | (1) |
|
7.14 The U.S. Military Adopted TCP/IP |
|
|
76 | (1) |
|
|
77 | (4) |
|
Chapter 8 The Incredible Growth |
|
|
81 | (12) |
|
|
81 | (1) |
|
|
81 | (1) |
|
8.3 Meanwhile, Back In Computer Science |
|
|
82 | (1) |
|
8.4 The Internet Meets Unix |
|
|
82 | (1) |
|
8.5 The U.S. Military Makes A Commitment |
|
|
83 | (1) |
|
8.6 The Internet Doubled In Size In One Year |
|
|
83 | (1) |
|
8.7 Internet For Every Computer Science Department |
|
|
84 | (1) |
|
8.8 Graduate Student Volunteers Contribute |
|
|
85 | (1) |
|
8.9 Internet Governance: The IAB And IETF |
|
|
85 | (1) |
|
8.10 NSF Led Internet Expansion |
|
|
86 | (1) |
|
8.11 NSF Target: All Of Science And Engineering |
|
|
87 | (1) |
|
|
87 | (1) |
|
8.13 On To The ANS Backbone |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (2) |
|
8.16 When Will Growth End? |
|
|
91 | (2) |
Part III: Inside The Internet |
|
93 | (102) |
|
Chapter 9 Packet Switching |
|
|
97 | (10) |
|
|
97 | (1) |
|
9.2 Sharing To Reduce Cost |
|
|
97 | (1) |
|
9.3 Sharing By Taking Turns |
|
|
98 | (1) |
|
|
98 | (1) |
|
9.5 Long Messages And Short Packets |
|
|
99 | (1) |
|
9.6 Each Packet Contains Extra Information |
|
|
99 | (1) |
|
9.7 Devices Have Addresses |
|
|
100 | (1) |
|
|
100 | (1) |
|
9.9 To Humans, Packet Transmission Seems Instantaneous |
|
|
101 | (1) |
|
9.10 Sharing Occurs On Demand |
|
|
101 | (1) |
|
9.11 Relevance To The Internet |
|
|
102 | (1) |
|
|
102 | (5) |
|
Chapter 10 Internet: A Network Of Networks |
|
|
107 | (14) |
|
|
107 | (1) |
|
10.2 Building A Global Network |
|
|
107 | (1) |
|
10.3 Two Fundamental Concepts |
|
|
108 | (1) |
|
10.4 Using A Specialized Computer To Interconnect Networks |
|
|
109 | (1) |
|
10.5 Internet Terminology: Routers And Hosts |
|
|
110 | (1) |
|
10.6 Building A Large Virtual Network |
|
|
111 | (2) |
|
10.7 The Internet Includes Multiple Types Of Networks |
|
|
113 | (1) |
|
10.8 Ownership, ISPs, And Transit Traffic |
|
|
113 | (1) |
|
|
114 | (1) |
|
10.10 Peering Arrangements At The Center Of The Internet |
|
|
115 | (1) |
|
10.11 An Example Trip Through The Internet |
|
|
116 | (1) |
|
10.12 The Internet Approach Revolutionized Networking |
|
|
116 | (1) |
|
|
117 | (4) |
|
Chapter 11 Internet Access Using Broadband And Wireless |
|
|
121 | (10) |
|
|
121 | (1) |
|
11.2 Access Technologies For The Last Mile |
|
|
121 | (1) |
|
11.3 Dial-up Internet Access |
|
|
122 | (1) |
|
11.4 Narrowband And Broadband Access |
|
|
122 | (1) |
|
11.5 Leased Data Circuit Access |
|
|
123 | (1) |
|
11.6 Digital Subscriber Line (DSL) Access |
|
|
123 | (1) |
|
|
124 | (1) |
|
11.8 Wireless Access Technologies |
|
|
125 | (1) |
|
11.9 Cellular Wireless Access (4G and 5G) |
|
|
126 | (2) |
|
|
128 | (3) |
|
Chapter 12 Internet Performance |
|
|
131 | (14) |
|
|
131 | (1) |
|
|
131 | (1) |
|
12.3 What Does Speed Mean? |
|
|
132 | (1) |
|
|
132 | (2) |
|
12.5 Transfers Across The Internet |
|
|
134 | (1) |
|
12.6 Connecting Heterogeneous Networks |
|
|
135 | (2) |
|
12.7 The Effect Of Sharing |
|
|
137 | (2) |
|
12.8 Delays In The Internet |
|
|
139 | (1) |
|
12.9 Should You Pay for Higher Speed Internet? |
|
|
140 | (1) |
|
|
141 | (4) |
|
Chapter 13 IP: Software To Create A Virtual Network |
|
|
145 | (10) |
|
|
145 | (1) |
|
13.2 Protocol: An Agreement For Communication |
|
|
145 | (1) |
|
13.3 Basic Functionality: The Internet Protocol |
|
|
146 | (1) |
|
13.4 Packets Arrive Unchanged |
|
|
146 | (1) |
|
13.5 Internet Software On Your Device |
|
|
147 | (1) |
|
13.6 Internet Packets Are Called Datagrams |
|
|
147 | (1) |
|
13.7 Providing The Illusion Of A Giant Network |
|
|
147 | (1) |
|
13.8 The Internet's Internal Structure |
|
|
148 | (1) |
|
13.9 Datagrams Travel Inside Network Packets |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
13.12 Permanent And Temporary IP Addresses |
|
|
151 | (1) |
|
|
152 | (3) |
|
Chapter 14 TCP: Software For Reliable Communication |
|
|
155 | (8) |
|
|
155 | (1) |
|
14.2 A Packet Switching System Can Be Overrun |
|
|
155 | (1) |
|
14.3 Software To Handle Congestion And Datagram Loss |
|
|
156 | (1) |
|
14.4 The Magic Of Recovering Lost Datagrams |
|
|
156 | (1) |
|
14.5 TCP's Sophisticated Retransmission Algorithm |
|
|
157 | (1) |
|
|
158 | (1) |
|
14.7 TCP And IP Work Together |
|
|
159 | (1) |
|
|
159 | (4) |
|
Chapter 15 Clients, Servers, And Internet Services |
|
|
163 | (8) |
|
|
163 | (1) |
|
15.2 All Services Are Outside The Internet |
|
|
163 | (1) |
|
15.3 Software Provides All Services |
|
|
164 | (1) |
|
15.4 Services Use Client And Server Apps |
|
|
165 | (1) |
|
15.5 A Server Must Always Run |
|
|
165 | (1) |
|
15.6 Multiple Clients Can Access A Server Simultaneously |
|
|
166 | (1) |
|
15.7 Ambiguous Terminology |
|
|
167 | (1) |
|
|
167 | (4) |
|
Chapter 16 Names For Computers |
|
|
171 | (10) |
|
|
171 | (1) |
|
|
171 | (1) |
|
16.3 Computer Names Past And Present |
|
|
172 | (1) |
|
16.4 A Computer's Name Must Be Unique |
|
|
173 | (1) |
|
16.5 Using Suffixes To Make Each Name Unique |
|
|
173 | (1) |
|
16.6 Domain Names With More Than Three Labels |
|
|
174 | (1) |
|
16.7 Top-Level Domains Before And After ICANN |
|
|
174 | (1) |
|
16.8 Domain Names Outside The US |
|
|
175 | (1) |
|
16.9 Translating A Name To An IP Address |
|
|
176 | (1) |
|
16.10 Many Domain Name Servers |
|
|
176 | (1) |
|
16.11 Looking Up A Domain Name |
|
|
177 | (1) |
|
16.12 A Personal Story About A DNS Problem |
|
|
178 | (1) |
|
|
178 | (3) |
|
Chapter 17 Sharing An Internet Connection (NAT) |
|
|
181 | (8) |
|
|
181 | (1) |
|
17.2 Multiple Devices Sharing A Single IP Address |
|
|
181 | (1) |
|
17.3 Wireless Routers And NAT |
|
|
182 | (1) |
|
17.4 How A Wireless Router Works |
|
|
182 | (1) |
|
17.5 Datagram Modification |
|
|
183 | (1) |
|
17.6 Your Device Can Act Like A Wireless Router |
|
|
184 | (1) |
|
17.7 You Probably Use NAT Every Day |
|
|
184 | (1) |
|
17.8 Why Internet Size Is Difficult To Estimate |
|
|
185 | (1) |
|
|
185 | (4) |
|
Chapter 18 Why The Internet Works Well |
|
|
189 | (6) |
|
|
189 | (1) |
|
18.2 The Internet Works Extremely Well |
|
|
189 | (1) |
|
18.3 Flexibility To Accommodate Arbitrary Networks |
|
|
190 | (1) |
|
18.4 Flexibility To Accommodate New Apps Quickly |
|
|
190 | (1) |
|
18.5 The Advantage Of Being Open And Vendor Independent |
|
|
191 | (1) |
|
18.6 An Extremely Efficient Design |
|
|
191 | (1) |
|
18.7 Packet Switching Is A Fundamentally Better Idea |
|
|
192 | (1) |
|
18.8 Can The Success Be Replicated? |
|
|
192 | (2) |
|
|
194 | (1) |
Part IV: Internet Services |
|
195 | (118) |
|
Chapter 19 Electronic Mail |
|
|
199 | (8) |
|
|
199 | (1) |
|
19.2 Functionality And Significance |
|
|
199 | (1) |
|
19.3 Mailboxes And Email Addresses |
|
|
200 | (1) |
|
19.4 Sending An Email Message Directly |
|
|
200 | (1) |
|
19.5 Personal Computers And Email Providers |
|
|
200 | (1) |
|
19.6 An Example Email Exchange |
|
|
201 | (1) |
|
19.7 Email Delays And Retry Attempts |
|
|
202 | (1) |
|
19.8 Providers, Fees, And Access |
|
|
202 | (1) |
|
|
203 | (1) |
|
19.10 Undisclosed Recipients |
|
|
203 | (1) |
|
|
204 | (3) |
|
Chapter 20 The World Wide Web: Browsers And Basics |
|
|
207 | (10) |
|
|
207 | (1) |
|
20.2 Browsers And Web Servers |
|
|
207 | (1) |
|
20.3 URLs And Their Meaning |
|
|
208 | (1) |
|
20.4 Web Pages With Links To Other Pages |
|
|
208 | (1) |
|
20.5 Linking Across Web Servers |
|
|
209 | (1) |
|
|
210 | (1) |
|
20.7 A Page With Multimedia Items |
|
|
211 | (1) |
|
20.8 Fetching A Page That Contains Multiple Items |
|
|
212 | (1) |
|
|
212 | (1) |
|
20.10 Plugins And Other Add-on Software Modules |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (3) |
|
Chapter 21 The World Wide Web: HTML And Web Pages |
|
|
217 | (10) |
|
|
217 | (1) |
|
21.2 Accommodating Display Hardware |
|
|
217 | (1) |
|
21.3 HTML, A Language Used For Web Documents |
|
|
218 | (1) |
|
21.4 Specifying Formatting Guidelines |
|
|
219 | (1) |
|
21.5 A Link Embedded In A Web Page |
|
|
220 | (1) |
|
21.6 An Image On A Web Page |
|
|
221 | (2) |
|
21.7 Point-And-Click Web Page Design |
|
|
223 | (1) |
|
|
224 | (3) |
|
Chapter 22 The World Wide Web: Web Pages That Change |
|
|
227 | (14) |
|
|
227 | (1) |
|
22.2 Conventional Web Pages And Static Content |
|
|
227 | (1) |
|
22.3 How A Browser Accesses A Static Web Page |
|
|
228 | (1) |
|
22.4 Accessing A Page That Has Changeable Content |
|
|
229 | (1) |
|
22.5 Frames Within A Browser Window |
|
|
230 | (1) |
|
22.6 Advertising And Frames |
|
|
231 | (1) |
|
22.7 Personalized Web Pages And Dynamic Content |
|
|
231 | (1) |
|
22.8 Pop-Ups And Pop-Up Blockers |
|
|
232 | (1) |
|
22.9 User Interaction With Forms |
|
|
232 | (1) |
|
22.10 Shopping Carts And Cookies |
|
|
233 | (1) |
|
22.11 Should You Accept Cookies? |
|
|
234 | (1) |
|
|
234 | (1) |
|
22.13 Animation With A Browser Script |
|
|
235 | (1) |
|
22.14 Java, JavaScript, And HTML5 |
|
|
236 | (1) |
|
|
237 | (4) |
|
Chapter 23 Social Networking And Personal Publishing |
|
|
241 | (6) |
|
|
241 | (1) |
|
23.2 The Publish-Subscribe Paradigm Changes |
|
|
241 | (1) |
|
23.3 The Rise Of Internet Publishing Services |
|
|
242 | (1) |
|
23.4 Discussion Forums And Bulletin Boards |
|
|
242 | (1) |
|
23.5 Moderated Discussions And Editorial Control |
|
|
242 | (1) |
|
23.6 Essays And Personal Opinions (Blogs) |
|
|
243 | (1) |
|
23.7 Cooperative Publishing (Wikis) |
|
|
243 | (1) |
|
23.8 Personal Web Pages And Social Networking Sites |
|
|
244 | (1) |
|
|
244 | (3) |
|
Chapter 24 The Internet Of Things (IoT) |
|
|
247 | (10) |
|
|
247 | (1) |
|
24.2 Connected Devices Without Human Operators |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
24.5 Embedded Computer Systems |
|
|
249 | (1) |
|
24.6 The Internet Of Things |
|
|
249 | (1) |
|
24.7 Gadgets And Wireless Network Connections |
|
|
250 | (1) |
|
24.8 Centralized And Mesh IoT Networks In A Home |
|
|
250 | (1) |
|
24.9 A Wireless IoT Mesh In A Home |
|
|
251 | (1) |
|
24.10 Smart Homes, Buildings, And Factories |
|
|
252 | (1) |
|
24.11 Civil And Power Infrastructure: Bridges And Grids |
|
|
253 | (1) |
|
|
253 | (4) |
|
Chapter 25 Internet Search (Search Engines) |
|
|
257 | (10) |
|
|
257 | (1) |
|
25.2 Databases And Structured Information |
|
|
257 | (1) |
|
25.3 Classification Of Information |
|
|
258 | (1) |
|
25.4 Searching Unstructured Web Pages |
|
|
259 | (1) |
|
25.5 A Demonstration Of Keyword Search |
|
|
260 | (1) |
|
25.6 Indexing: How An Internet Search Engine" Operates |
|
|
260 | (2) |
|
25.7 Personalized Search Results |
|
|
262 | (1) |
|
25.8 Indexing The Entire Web |
|
|
263 | (1) |
|
25.9 Advertising Pays For Searching |
|
|
263 | (1) |
|
|
264 | (3) |
|
Chapter 26 Voice And Video Communication (VoIP) |
|
|
267 | (12) |
|
|
267 | (1) |
|
26.2 Real-Time Information |
|
|
267 | (1) |
|
26.3 The Two Types Of Real-Time Transfer |
|
|
268 | (1) |
|
26.4 Streaming Real-Time Data Over The Internet |
|
|
268 | (1) |
|
26.5 Real-Time Streams, Packets, And Jitter |
|
|
269 | (1) |
|
|
270 | (1) |
|
26.7 Accommodating Low Throughput |
|
|
271 | (1) |
|
26.8 The User's View Of A Playback Buffer |
|
|
271 | (2) |
|
26.9 The Effect Of Pausing Playback |
|
|
273 | (1) |
|
26.10 The Effect Of Network Congestion |
|
|
273 | (1) |
|
26.11 How To Overcome A Start-Stop Cycle |
|
|
274 | (1) |
|
26.12 Teleconferencing Services |
|
|
275 | (1) |
|
26.13 Using Internet Technology For Telephone Service |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (3) |
|
Chapter 27 File Transfer And Data Sharing |
|
|
279 | (10) |
|
|
279 | (1) |
|
|
279 | (1) |
|
27.3 An Example File Transfer |
|
|
280 | (1) |
|
27.4 An Example URL For Folder Contents |
|
|
281 | (1) |
|
|
282 | (1) |
|
27.6 File Transfer For An Average User |
|
|
282 | (1) |
|
27.7 Exchanging Information Without Running A Server |
|
|
283 | (1) |
|
27.8 Transfer Vs. Collaborative Work |
|
|
284 | (1) |
|
27.9 Peer-To-Peer File Sharing |
|
|
284 | (1) |
|
|
285 | (4) |
|
Chapter 28 Remote Desktop |
|
|
289 | (8) |
|
|
289 | (1) |
|
|
289 | (1) |
|
28.3 Remote Access With Modern Graphical Devices |
|
|
290 | (1) |
|
28.4 How Remote Desktop Works |
|
|
291 | (1) |
|
28.5 Remote Desktop Software |
|
|
292 | (1) |
|
28.6 Assessment Of Remote Login And Remote Desktop |
|
|
292 | (1) |
|
28.7 Unexpected Results From Remote Access |
|
|
293 | (1) |
|
|
294 | (3) |
|
Chapter 29 Cloud Services And Cloud Computing |
|
|
297 | (16) |
|
|
297 | (1) |
|
29.2 A Brief History Of Computing |
|
|
297 | (2) |
|
29.3 Maintaining Computers |
|
|
299 | (1) |
|
29.4 Data Inconsistencies |
|
|
299 | (1) |
|
29.5 Data Synchronization With A Direct Connection |
|
|
299 | (1) |
|
29.6 Selecting Data Items For Synchronization |
|
|
300 | (1) |
|
29.7 Synchronization Problems And Internet Synchronization |
|
|
300 | (3) |
|
|
303 | (1) |
|
29.9 Types Of Cloud Services |
|
|
303 | (1) |
|
29.10 Cloud Applications And The Internet of Things |
|
|
304 | (1) |
|
29.11 Generalized Cloud Computing |
|
|
305 | (1) |
|
29.12 Cloud Computing From A Company's Perspective |
|
|
306 | (1) |
|
29.13 Public, Private, And Hybrid Cloud |
|
|
307 | (1) |
|
29.14 Cloud Data Centers And Racks Of Computers |
|
|
307 | (1) |
|
29.15 Generalized Cloud Computing For An Individual |
|
|
308 | (1) |
|
29.16 The Disadvantage Of Using The Cloud |
|
|
309 | (1) |
|
29.17 Virtualization Technology Used For Cloud Computing |
|
|
310 | (1) |
|
|
310 | (3) |
Part V: Other Aspects Of Internet Technology |
|
313 | (58) |
|
Chapter 30 Network Security (Encryption And Firewalls) |
|
|
317 | (16) |
|
|
317 | (1) |
|
30.2 Cybercrime And Cyber Security |
|
|
317 | (1) |
|
30.3 The Unsecure Internet |
|
|
318 | (1) |
|
30.4 Keeping Conversations Confidential |
|
|
319 | (1) |
|
30.5 Computer Encryption And Mathematics |
|
|
319 | (1) |
|
30.6 Confidential Web Browsing |
|
|
320 | (1) |
|
30.7 No Network Is Absolutely Secure |
|
|
321 | (1) |
|
|
321 | (1) |
|
30.9 Two Keys Means Never Having To Trust Anyone |
|
|
322 | (2) |
|
30.10 Authentication: User IDs And Passwords |
|
|
324 | (1) |
|
30.11 Two-Factor Authentication |
|
|
324 | (1) |
|
30.12 Using Encryption For Authentication |
|
|
325 | (1) |
|
30.13 Wireless Network Security |
|
|
325 | (1) |
|
30.14 Network Firewall: Protection From Unwanted Packets |
|
|
326 | (1) |
|
30.15 Packet Filtering In A Firewall |
|
|
327 | (1) |
|
30.16 Trojan Horses And Firewall Protection |
|
|
327 | (1) |
|
30.17 Residential And Individual Firewalls |
|
|
328 | (1) |
|
30.18 Other Recommended Precautions |
|
|
329 | (1) |
|
|
330 | (3) |
|
Chapter 31 Security Scams: Fooling Users |
|
|
333 | (8) |
|
|
333 | (1) |
|
31.2 Traditional Scams And Cybercrime |
|
|
333 | (1) |
|
31.3 The Foreign Bank Scam |
|
|
334 | (1) |
|
|
334 | (1) |
|
31.5 The Software Update Scam |
|
|
335 | (1) |
|
31.6 Password Change Scam |
|
|
335 | (1) |
|
31.7 Misleading SSID Scam |
|
|
336 | (1) |
|
31.8 Man-In-The-Middle Attacks |
|
|
336 | (1) |
|
31.9 Misleading Email Addresses And Web Site URLs |
|
|
337 | (1) |
|
31.10 Malware In Email Attachments |
|
|
338 | (1) |
|
|
338 | (3) |
|
Chapter 32 Secure Access From A Distance (VPNs) |
|
|
341 | (12) |
|
|
341 | (1) |
|
32.2 An Employee At A Remote Location |
|
|
341 | (1) |
|
32.3 Secure Remote Desktop |
|
|
342 | (1) |
|
32.4 Using A Leased Circuit For Secure Telecommuting |
|
|
343 | (1) |
|
32.5 VPN Technology: Secure, Low-Cost Remote Access |
|
|
343 | (1) |
|
32.6 VPN From An Employee's Perspective |
|
|
344 | (1) |
|
|
344 | (1) |
|
32.8 The Illusion Of A Direct Connection |
|
|
345 | (1) |
|
32.9 Obtaining A Corporate IP Address |
|
|
346 | (1) |
|
32.10 Exchanging Packets With The VPN Server |
|
|
347 | (1) |
|
32.11 The Significance Of VPNs |
|
|
348 | (1) |
|
|
349 | (4) |
|
Chapter 33 Internet Economics And Electronic Commerce |
|
|
353 | (12) |
|
|
353 | (1) |
|
|
353 | (2) |
|
33.3 Network Capacity And Router Hardware |
|
|
355 | (1) |
|
33.4 Service Provider Fee Structures |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
33.7 Peering Arrangements Among Tier 1 ISPs |
|
|
358 | (1) |
|
33.8 Security Technology And E-commerce |
|
|
358 | (1) |
|
|
359 | (1) |
|
33.10 Certificates Contain Public Keys |
|
|
359 | (1) |
|
|
360 | (1) |
|
33.12 How Digital Cash Works |
|
|
360 | (1) |
|
33.13 Business And E-commerce |
|
|
361 | (1) |
|
33.14 The Controversy Over Net Neutrality |
|
|
361 | (1) |
|
|
362 | (3) |
|
Chapter 34 A Global Digital Library |
|
|
365 | (6) |
|
|
365 | (1) |
|
|
365 | (1) |
|
34.3 Is The Internet A Digital Library? |
|
|
366 | (1) |
|
34.4 New Services Replace Old Services |
|
|
366 | (1) |
|
34.5 Digital Formats, Standards, And Archival Storage |
|
|
367 | (1) |
|
34.6 Organizing A Library |
|
|
368 | (1) |
|
34.7 The Disadvantage Of Imposing Structure |
|
|
369 | (1) |
|
34.8 Searching An Unstructured Collection |
|
|
369 | (1) |
|
34.9 What Is The Internet? |
|
|
370 | (1) |
|
|
370 | (1) |
Index |
|
371 | |