The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

The Virtual Bookcase : Shelf Computer networks

Local area networks, wide area networks, Internet, wireless networks, technologies, theory, management and planning of networks.

Shelf parts : First Previous Next Last


Shop for this book
Amazon.co.uk
Book description
Nobody wants to shell out a lot of money for something they'll use once or, with any luck, never. But that's where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be pressing, but internal incentives are working against them. This book provides a methodology responsive to those problems. With careful planning, it can actually improve system performance instead of encumbering it. Even if your organization isn't budgeted for disaster recovery planning, you can implement this methodology now, at minimum cost, and reap immediate returns. For companies a... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Disaster Proofing Information Systems : A Complete Methodology for Eliminating Single Points of Failure

Shop for this book
Amazon.co.uk
Book description
IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system--it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol. While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collect... Rest of this review on the detail page
I want to add the first review for this book!
Reviews (1) and details of IRC Hacks

Shop for this book
Amazon.co.uk
Book description
This hands-on resource provides you with a comprehensive picture of the Internet protocol stack and the role of TCP/IP in data communication. It serves as a detailed guide to the protocols, networks, codes, signals, and equipment that make it possible to communicate using TCP/IP. You find complete bit-level descriptions of the functions performed by the headers and frames of the TCP/IP suite, making it easy for you to analyze individual data packets. The book offers you a through understanding of advanced LAN and WAN technologies, and gives you an integrated view of bridging, routing and tagging operations.
I want to add my review for this book!
Reviews (2) and details of A Professional's Guide To Data Communication In a TCP/IP World

Shop for this book
Amazon.co.uk
Book description
The Internet and email has become a communications bonanza, allowing people to socialize, do business, shop, and enhance their education just about anywhere there is a computer. As convenient as all this communication is, it also creates piles of electronic clutter that accumulate on your computer, creating a blizzard of overstuffed files, annoying spam, and pop-ups, and making you vulnerable to dangerous hackers and viruses. Degunking Your Email, Spam, and Viruses is organized according to a special cleaning process and written in everyday language that is designed for all computer users. With our unique 12-step Degunking program, you'll learn all the tried-and-true techniques to keep your computer clutter-free of spam and viruses and runn... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Degunking Your Email, Spam, and Viruses

Shop for this book
Amazon.co.uk
Book description
Steal This File Sharing Book tackles the thorny issue of file sharing networks such as Kazaa, Morpheus, and Usenet. It explains how these networks work and how to use them. It exposes the dangers of using file sharing networks--including viruses, spyware, and lawsuits--and tells how to avoid them. In addition to covering how people use file sharing networks to share everything from music and video files to books and pornography, it also reveals how people use them to share secrets and censored information banned by their governments. Includes coverage of the ongoing battle between the software, video, and music pirates and the industries that are trying to stop them.
I want to add the first review for this book!
Reviews (1) and details of Steal This File-Sharing Book
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement