Get Free Shipping on orders over $0
IT Management : The Complete Guide to Management, Troubleshooting, and Security - Gilbert Held

IT Management

The Complete Guide to Management, Troubleshooting, and Security

By: Gilbert Held

21 November 2012 | Edition Number 1

At a Glance

RRP $126.00

$114.75

or 4 interest-free payments of $28.69 with

 or 

Available for Backorder. We will order this from our supplier however there isn't a current ETA.

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment.

Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network-Wireshark-and explains how to use this program to scan for open ports and discover vulnerability issues.

In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios.

Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking-from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your stored information.

More in Computer Architecture & Logic Design

Inclusive Education : STEM in the Age of Modern AI - B.G.D.A. Madhusanka

RRP $112.00

$97.75

13%
OFF
Inclusive Education : STEM in the Age of Modern AI - B.G.D.A. Madhusanka

RRP $294.00

$254.75

13%
OFF
Basic Computer Architecture - Earl Bermann
Site Reliability Engineering : How Google Runs Production Systems - Betsy Beyer
Building Microservices : Designing Fine-Grained Systems 2nd Edition - Sam Newman
Computer Systems 3ed : A Programmer's Perspective, Global Edition - David O'Hallaron
Simply AI : Facts Made Fast - DK

RRP $22.99

$20.75

10%
OFF
Tidy First? : A Personal Exercise in Empirical Software Design - Kent Beck
Rust Atomics and Locks : Low-Level Concurrency in Practice - Mara Bos
Systems on Silicon : Volume 3 - Peter Ashenden

RRP $113.95

$98.75

13%
OFF
Introduction to Semiconductor Devices for Engineering Students - Leonid Tsybeskov
Introduction to Semiconductor Devices for Engineering Students - Leonid Tsybeskov
AI-Driven National Cyber Defense and Resilience Strategies - Mounia Zaydi