Normal view MARC view

Business data communications : (Record no. 38124)

MARC details
000 -LEADER
fixed length control field 10445nam a22004458a 4500
001 - CONTROL NUMBER
control field 38124
003 - CONTROL NUMBER IDENTIFIER
control field AE-DuAU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241127174134.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120705s2013 mau 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2012026915
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780133023893 :
Terms of availability 150.00
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0133023893 :
Terms of availability 150.00
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.2
Item number .S7728 2013
069 ## -
-- 09455094
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (OCLC)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) HF 5548.2 .S7728 2013
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
9 (RLIN) 72892
245 10 - TITLE STATEMENT
Title Business data communications :
Remainder of title infrastructure, networking and security /
Statement of responsibility, etc William Stallings, Thomas Case.
250 ## - EDITION STATEMENT
Edition statement 8th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc c2013.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 599 p. :
Other physical details ill. ;
Dimensions 25 cm
336 ## - CONTENT TYPE
Source rdacontent
Content Type Term text
Content Type Code txt
337 ## - MEDIA TYPE
Source rdamedia
Media Type Term unmediated
Media Type Code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier Type Term volume
Carrier Type Code nc
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 0 Reader's and Instructor's Guide 0.1 Outline of This Book 0.2 Topic Ordering 0.3 Internet and Web Resources 0.4 Useful Publications Chapter 1 Introduction 1.1 Information and Communication 1.2 Data Communications and Networking for Today's Enterprise 1.3 Convergence and Unified Communications 1.4 The Nature of Business Information Requirements 1.5 The Transmission of Information 1.6 Distributed Data Processing 1.7 The Internet and Distributed Applications 1.8 Networks 1.9 Management Issues 1.10 Standards 1.11 Key Terms, Review Questions, and Problems Appendix 1A Prefixes for Numerical Units Case Study I Unified Communications at Boeing (ONLINE) PART ONE REQUIREMENTS Chapter 2 Business Information 2.1 Audio 2.2 Data 2.3 Image 2.4 Video 2.5 Performance Measures Application Note: File Sizes 2.6 Summary 2.7 Key Terms, Review Questions, and Problems Case Study II CORE Credit Union (ONLINE) Chapter 3 Distributed Data Processing 3.1 Centralized Versus Distributed Processing 3.2 Forms of Distributed Data Processing 3.3 Distributed Data 3.4 Networking Implications of DDP 3.5 Big Data Infrastructure Considerations 3.6 Summary 3.7 Key Terms, Review Questions, and Problems Case Study III Managing Massive Data Warehouses at MasterCard International (ONLINE) PART TWO DATA COMMUNICATIONS Chapter 4 Data Transmission 4.1 Signals for Conveying Information 4.2 Transmission Impairments and Channel Capacity Application Note: Analog Signals 4.3 Summary 4.4 Key Terms, Review Questions, and Problems Chapter 5 Data Communication Fundamentals 5.1 Analog and Digital Data Communications 5.2 Data Encoding Techniques 5.3 Asynchronous and Synchronous Transmission 5.4 Error Detection Application Note: Devices, Encoding, Communication Parameters and Protocols 5.5 Summary 5.6 Key Terms, Review Questions, and Problems Chapter 6 Data Link Control and Multiplexing 6.1 Flow Control and Error Control 6.2 Motivation for Multiplexing 6.3 Frequency-Division Multiplexing 6.4 Synchronous Time-Division Multiplexing Application Note: Changing Communications 6.5 Summary 6.6 Key Terms, Review Questions, and Problems Appendix 6A High-Level Data Link Control Protocol Case Study IV Broadband Access: Global and Local Issues (ONLINE) PART THREE THE INTERNET AND DISTRIBUTED APPLICATIONS Chapter 7 The Internet 7.1 The Structure of the Internet 7.2 Internet Domains Application Note: Fitting DNS into your organizational structure 7.3 Dynamic Host Configuration Protocol 7.4 Summary 7.5 Key Terms, Review Questions, and Problems Case Study V Net Neutrality (ONLINE) Chapter 8 TCP/IP 8.1 A Simple Protocol Architecture 8.2 The TCP/IP Protocol Architecture 8.3 Internetworking 8.4 Virtual Private Networks and IP Security Application Note: Practical Guide to Networking 8.5 Summary 8.6 Key Terms, Review Questions, and Problems Appendix 8A TCP, UDP, and IP Details Appendix 8B The Trivial File Transfer Protocol Chapter 9 Client/Server, Intranet, and Cloud Computing 9.1 The Growth of Client/Server Computing 9.2 Client/Server Applications 9.3 Middleware 9.4 Intranets 9.5 Extranets 9.6 Service-Oriented Architecture Application Note: To Be Fat or Thin-That is the Question 9.7 Cloud Computing 9.8 Summary 9.9 Key Terms, Review Questions, and Problems Case Study VI Shifting Sands: Chevron's Migration to the Cloud Chapter 10 Internet-Based Applications 10.1 Electronic Mail 10.2 Web Access and HTTP 10.3 Web Security 10.4 Multimedia Applications Application Note: To Serve or Not to Serve? 10.5 Acceptable Use Policiess 10.6 Summary 10.7 Key Terms, Review Questions, and Problems Case Study VII E-Business at Guardian Life (ONLINE) Chapter 11 Internet Operation 11.1 Internet Addressing 11.2 Internet Routing Protocols 11.3 Multicasting 11.4 Quality of Service 11.5 Differentiated Services 11.6 Service Level Agreements 11.7 IP Performance Metrics Application Note: Where Does My Network Address Come From? 11.8 Summary 11.9 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 12 LAN Architecture and Infrastructure 12.1 Background 12.2 LAN Configuration 12.3 Guided Transmission Media 12.4 LAN Protocol Architecture Application Note: Cabling Infrastructure 12.5 Summary 12.6 Key Terms, Review Questions, and Problems Appendix 12A Decibels and Signal Strength Case Study VIII Carlson Companies Chapter 13 Ethernet, Switches, and Virtual LANs 13.1 Traditional Ethernet 13.2 Bridges, Hubs, and Switches 13.3 High-Speed Ethernet Application Note: Networking with Ethernet 13.4 Virtual LANs 13.5 Power over Ethernet 13.6 Summary 13.7 Key Terms, Review Questions, and Problems Chapter 14 Wireless LANs 14.1 Overview 14.2 Wi-Fi Architecture and Services 14.3 IEEE 802.11 MAC and Physical Layer Standards 14.4 Gigibit WLANs 14.5 IEEE 802.11 Security Considerations Application Note: Deploying WLANs 14.6 Summary 14.7 Key Terms, Review Questions, and Problems Case Study IX St. Luke's Health Care System: Using Mobility to Advance Health Care Delivery PART FIVE WIDE AREA NETWORKS Chapter 15 WAN Technology and Protocols 15.1 Switching Techniques 15.2 Circuit-Switching Networks 15.3 Packet-Switching Networks 15.4 Traditional Wide Area Network Alternatives 15.5 Voice over IP 15.6 Presence 15.7 Summary 15.8 Key Terms, Review Questions, and Problems Chapter 16 WAN Services 16.1 Wide Area Networking Alternatives 16.2 Frame Relay 16.3 Asynchronous Transfer Mode (ATM) Application Note: Off-site Connectivity Solutions 16.4 Multiprotocol Label Switching (MPLS) 16.5 Wide Area Ethernet 16.6 Summary 16.7 Key Terms, Review Questions, and Problems Chapter 17 Wireless WANs 17.1 Cellular Wireless Networks 17.2 Multiple Access 17.3 Third-Generation Wireless Communication 17.4 Fourth-Generation Wireless Communciation 17.5 Satellite Communications Application Note: Laptops, Netbooks, PDAs, and Cell Phones 17.6 Summary 17.7 Key Terms, Review Questions, and Problems Case Study X Choice Hotels PART SIX MANAGEMENT ISSUES Chapter 18 Computer and Network Security Threats 18.1 Computer Security Concepts 18.2 Threats, Attacks, and Assets 18.3 Intruders 18.4 Malicious Software Overview 18.5 Viruses, Worms, Bots, and Spam 18.6 Keyloggers, Phishing, Spyware 18.7 Computer Security Trends 18.8 Key Terms, Review Questions, and Problems Chapter 19 Computer and Network Security Techniques 19.1 Virtual Private Networks and IPsec 19.2 SSL and TLS 19.3 Wi-Fi Protected Access 19.4 Intrusion Detection 19.5 Firewalls 19.6 Malware Defense Application Note: Security Layers 19.7 Key Terms, Review Questions, and Problems Case Study XI Cloud Computing (In)Security Chapter 20 Network Management (ONLINE) Chapter 21 Network Planning and Design (ONLINE) Appendix A Business Data Communications Projects A.1 Animations and Animation Projects A.2 Practical Exercises A.3 Wireshark Projects A.4 Research Projects A.5 Security Case Studies A.6 Reading/Report Assignments A.7 Writing Assignments Glossary References Index ONLINE CHAPTERS AND APPENDICES[1] Chapter 20 Network Management (ONLINE) 20.1 Network Management Requirements 20.2 Network Management Systems 20.3 Simple Network Management Protocol (SNMP) Application Note: How Much Management? 20.4 Key Terms, Review Questions, and Problems Chapter 21 Network Planning and Design (ONLINE) 21.1 The Project Environment-The Big Picture 21.2 Planning 21.3 Design Techniques 21.4 Some Capacity Planning and Network Design Tools Appendix 21A Some Simple Design Algorithms Appendix 21B Selling Books Online-A Case Study Appendix B Standards Organizations B.1 The Importance of Standards B.2 Standards and Regulation B.3 Standards-Setting Organizations Appendix C Uniform Resource Locators (URLs) and Uniform Resource Identifiers (URIs) C.1 Uniform Resource Locator C.2 Uniform Resource Identifier C.3 To Learn More Appendix D The International Reference Alphabet Appendix E The TCP/IP Checksum E.1 Ones-Complement Addition E.2 Use in TCP and IP Appendix F IBM's System Network Architecture (SNA) F.1 Network Architecture F.2 Advanced Program-to-Program Communication F.3 Protocol Architecture Appendix G Fibre Channel G.1 Fibre Channel Elements G.2 Fibre Channel Protocol Architecture Appendix H Bluetooth H.1 Bluetooth Applications H.2 Bluetooth Standards Documents H.3 Protocol Architecture H.4 Usage Models H.5 Piconets and Scatternets Appendix I Multipath Interference and Orthogonal Frequency-Division Multiplexing (OFDM) I.1 Multipath Interference I.2 Orthogonal Frequency-Division Multiplexing Appendix J Cryptographic Algorithms J.1 Symmetric Encryption J.2 Public-Key Cryptography J.3 Message Authentication and Hash Functions J.4 Secure Hash Functions Appendix K Sliding-Window Flow Control and Error Control K.1 Flow Control K.2 Error Control Appendix L The OSI Model L.1 The Model L.2 The OSI Layers Appendix M Code Division Multiple Access [1] Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of this book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business
General subdivision Data processing.
9 (RLIN) 144254
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business
General subdivision Communication systems
-- Data processing.
9 (RLIN) 144255
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Local area networks (Computer networks)
9 (RLIN) 144256
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data transmission systems.
9 (RLIN) 144257
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks.
9 (RLIN) 144258
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic commerce.
9 (RLIN) 144259
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Case, Thomas.
9 (RLIN) 144260
852 1# - LOCATION/CALL NUMBER
-- P150.00usd
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a
b 03-07-13
c 02-28-13
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- audmc
Operator's initials, OID (RLIN) 02-28-13
Cataloger's initials, CIN (RLIN) m
First Date, FD (RLIN) a
-- -
-- eng
-- mau
-- 0
945 ## - LOCAL PROCESSING INFORMATION (OCLC)
g 1
i 5143908
j 0
l audmc
o -
p 551.25
q -
r -
s -
t 1
u 0
v 0
w 0
x 0
y i14907033
z 02-28-13
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
  Library of Congress Classification     American University in Dubai American University in Dubai Main Collection 2013-02-28 551.25   HF 5548.2 .S7728 2013 5143908 2023-11-08 551.25 2015-07-25 Books
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions