Linux Clearly Explained by Bryan PfaffenbergerThis work offers comprehensive coverage of the Linux Operating System, presented with a practical presentation. The author details the steps to loading and configuring the Linux OS and offers insight into running the Windows programme
Call Number: QA76.76.O63 P434 1999
ISBN: 9780125531696
Publication Date: 1999-07-01
Understanding Operating Systems by Ida M. Flynn; Ann McIver-McHoesUNDERSTANDING OPERATING SYSTEMS provides a basic understanding of operating systems theory, a comparison of the major operating systems in use, and a description of the technical and operational tradeoffs inherent in each. The effective two-part organization covers the theory of operating systems, their historical roots, and their conceptual basis (which does not change substantially), culminating with how these theories are applied in the specifics of five operating systems (which evolve constantly). The authors explain this technical subject in a not-so-technical manner, providing enough detail to illustrate the complexities of stand-alone and networked operating systems. UNDERSTANDING OPERATING SYSTEMS is written in a clear, conversational style with concrete examples and illustrations that readers easily grasp.
Call Number: QA76.76.O63 F59 2001
ISBN: 9780534376666
Publication Date: 2000-11-22
Networks
Designing Campus Networks by Terri Quinn-Andry; Kitty HallerNine-year-old Oskar Schell is an inventor, amateur entomologist, Francophile, letter writer, pacifist, natural historian, percussionist, romantic, Great Explorer, jeweller, detective, vegan, and collector of butterflies. When his father is killed in the September 11th attacks on the World Trade Centre, Oskar sets out to solve the mystery of a key he disovers in his father's closet. & It is a search which leads him into the lives of strangers, through the five boroughs of New York, into history, to the bombings of Dresden and Hiroshima, and on an inward journey which brings him ever closer to some kind of peace.
Call Number: TK5105.7.Q56 1998 (Mays Landing)
ISBN: 9781578700301
Publication Date: 1998-01-22
Off Campus access username and password can be found in Blackboard on the
Institution Page. Students: look for Student Tools to Stay Connected at Atlantic Cape. Faculty: look for Key information about Libraries and Tutoring. Or you can contact the library for username and password.
TCP/IP Clearly Explained by Pete LoshinTCP/IP Clearly Explained, Second Edition provides a clear and complete introduction to the most widely used TCP/IP protocols, in plain language that makes complicated networking concepts accessible to readers without computer science background. A comprehensive introduction to all important topics related to TCP/IP, this book is for anyone interested in learning how the Internet works from a nuts and bolts perspective. Features: * Presents increased coverage of the WWW, and Web related applicaions, protocols and specifications such as HTTP, HTML, Java, and Active X * Introduces TCP/IP in a clear, concise, and complete manner * Includes all important topics related to TCP/IP, and are explained in context of actual applications and products that use the protocols described therein * Contains clear illustrations of protocol headers and network traffic flow
Call Number: eBook
ISBN: 9780124558267
Publication Date: 1999-07-13
Networks by Steven KarrisNo previous knowledge of data communications and related fields is required for understanding this text. It begins with the basic components of telephone and computer networks and their interaction, centralized and distributive processing networks, Local Area Networks (LANs), Metropolitan Area Networks (MANs), Wide Area Networks (WANs), the International Standards Organization (OSI) Management Model, network devices that operate at different layers of the OSI model, and the IEEE 802 Standards. This text also introduces several protocols including X.25, TCP/IP, IPX/SPX, NetBEUI, AppleTalk, and DNA. The physical topologies, bus, star, ring, and mesh are discussed, and the ARCNet, Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI) are described in detail. Wiring types and network adapters are well covered, and a detailed discussion on wired and wireless transmissions including Bluetooth and Wi-Fi is included. An entire chapter is devoted to the various types of networks that one can select and use for his needs, the hardware and software required, and tasks such as security and safeguarding data from internal and external disasters that the network administrator must perform to maintain the network(s) he is responsible for. Two chapters serve as introductions to the Simple Network Management Protocol (SNMP) and Remote Monitoring (RMON). This text includes also five appendices with very useful information on how computers use numbers to condition and distribute data from source to destination, and a design example to find the optimum path for connecting distant facilities. Each chapter includes True-False, Multiple-Choice, and problems to test the reader's understanding. Answers are also provided.
Call Number: eBook
ISBN: 9781934404157
Publication Date: 2009-01-01
Practical Network Automation by Abhishek RatanGet More from your Network with Automation tools to increase its effectiveness.About This Book* Get started with network automation (and different automation tasks) with relevant use cases* Apply software design principles such as Continuous Integration and DevOps to your network toolkit* Guides you through some best practices in automationWho This Book Is ForIf you are a network engineer looking for an extensive guide to help you automate and manage your network efficiently, then this book is for you. What You Will Learn* Get the detailed analysis of Network automation* Trigger automations through available data factors* Improve data center robustness and security through specific access and data digging* Get an Access to APIs from Excel for dynamic reporting* Set up a communication with SSH-based devices using netmiko* Make full use of practical use cases and best practices to get accustomed with the various aspects of network automationIn DetailNetwork automation is the use of IT controls to supervise and carry out every-day network management functions. It plays a key role in network virtualization technologies and network functions.The book starts by providing an introduction to network automation, SDN, and its applications, which include integrating DevOps tools to automate the network efficiently. It then guides you through different network automation tasks and covers various data digging and reporting methodologies such as IPv6 migration, DC relocations, and interface parsing, all the while retaining security and improving data center robustness. The book then moves on to the use of Python and the management of SSH keys for machine-to-machine (M2M) communication, all followed by practical use cases. The book also covers the importance of Ansible for network automation including best practices in automation, ways to test automated networks using different tools, and other important techniques.By the end of the book, you will be well acquainted with the various aspects of network automation.Style and approachA clear, concise, and straightforward book that will enable you to automate networks and improve performance.
Call Number: eBook
ISBN: 9781788299466
Publication Date: 2017-11-16
Help Desk
Off Campus access username and password can be found in Blackboard on the
Institution Page. Students: look for Student Tools to Stay Connected at Atlantic Cape. Faculty: look for Key information about Libraries and Tutoring. Or you can contact the library for username and password.
Creating a Customer-Focused Help Desk by Andrew HilesThis volume came about as a result of the authors' own practical experience in Help Desk operation and management and of hundreds of workshops the authors have conducted world-wide over the last fifteen years. It is intended to be a practical reference guide, but the suggestions, checklists and templates all need to be interpreted and amended in the light of the culture, technology, service maturity and constraints of each individual organization.Delegates frequently ask us: "What is the best Help Desk software package?" or "What is the best way to set up a Help Desk?" Our only response has to be "Best for whom? It all depends." A key objective of this book is to show how and why "It all depends" and to provide readers with the best possible information on which to understand and evaluate options and to select the best - for them. If there is one thing we have learned over the last years, it is this: Good service has no history. Bad service has infinite history. Based on extensive feedback from delegates from most of the Fortune 1,000 companies who have attended courses presented through Frost & Sullivan (Europe), AIC (South Africa), Monadnock (UK), The Infomatics Resource Centre (UK), IIR (UK), Digital Equipment (UK), Logtel (South America), CEL (Asia Pacific), UPMOCL (Middle East), Finborough Seminars, as well as delegates of in-company training for organizations like Dow Europe (Switzerland), The Intervention Board, BP, Shell International Petroleum, Logica (UK), Arthur Andersen (UK), Rolls Royce (UK), Global One (Germany and USA), Caterpillar (Switzerland), GAK (Netherlands), European Commission (Belgium), Transnet (South Africa), Sun Valley (UK), Nikon Precision (UK).
Call Number: eBook
ISBN: 9781944480066
Publication Date: 2016-06-01
Working with Legacy Systems by Robert AnnettUnderstand the crux of legacy systems--their architecture, analysis, and security constraints Key Features Understand what legacy systems are and strategies for their maintenance Explore basic and advanced architectures of legacy systems Discover how to analyze and secure legacy systems Book Description The IT industry is constantly evolving with the introduction of new technologies. While it is important to keep up with advancements, maintaining legacy systems is equally necessary to ensure that the infrastructure of your organization functions to the best of its ability. Sound knowledge of techniques that can be used for maintaining legacy systems can help you avoid common pitfalls. The book begins with a quick overview of what a real legacy system looks like, how it works, and common issues that may be faced when trying to maintaining it. You'll then explore the architecture of a legacy system in detail and understand each of its components. As you progress, you'll discover a variety of techniques for analyzing a legacy system and how to apply them. Once you get to grips with the security constraints associated with legacy systems, you'll explore ways to secure them. Finally, you'll be able to easily make changes in legacy systems to enhance their performance. By the end of this book, you'll have developed the skills and confidence to work with legacy systems and efficiently maintain them. What you will learn Perform static and dynamic analyses of legacy systems Implement best practices to secure your legacy systems Use techniques such as data cleansing and process cleansing to stabilize your system Apply structural changes in your legacy system to make it highly available Identify and resolve common issues with legacy systems Understand a variety of tests that can help you secure and maintain legacy systems Who this book is for If you're new to working with legacy systems and want to understand how they work and how to maintain them, this book is for you.