Data Communication and Networking

Nonfiction, Computers, Networking & Communications, LANs & WANs, Network Protocols, Computer Security
Cover of the book Data Communication and Networking by George Hill, George Hill publications
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: George Hill ISBN: 1230001589757
Publisher: George Hill publications Publication: March 12, 2017
Imprint: Language: English
Author: George Hill
ISBN: 1230001589757
Publisher: George Hill publications
Publication: March 12, 2017
Imprint:
Language: English

Students of Computer Science & Engineering and Information Technology in general and  Computer Networks in particular. It will help them to understand the concept of data communication and modulation techniques,
to comprehend the use of different types of transmission media and network devices, to understand the error detection and correction in transmission of data, to understand the concept of flow control, error control and LAN protocols.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Students of Computer Science & Engineering and Information Technology in general and  Computer Networks in particular. It will help them to understand the concept of data communication and modulation techniques,
to comprehend the use of different types of transmission media and network devices, to understand the error detection and correction in transmission of data, to understand the concept of flow control, error control and LAN protocols.

More books from Computer Security

Cover of the book Penetration Testing Bootcamp by George Hill
Cover of the book Cloud Computing and Security by George Hill
Cover of the book Detection of Intrusions and Malware, and Vulnerability Assessment by George Hill
Cover of the book Advances in Cryptology – ASIACRYPT 2017 by George Hill
Cover of the book Some Tutorials In Computer Hacking by George Hill
Cover of the book Security in Computing by George Hill
Cover of the book Nmap 6: Network exploration and security auditing Cookbook by George Hill
Cover of the book Hands-On Web Penetration Testing with Metasploit by George Hill
Cover of the book Information Security Auditor by George Hill
Cover of the book Penetration Testing with BackBox by George Hill
Cover of the book Information Security Theory and Practice by George Hill
Cover of the book Datenschutz Cloud-Computing by George Hill
Cover of the book Digital-Forensics and Watermarking by George Hill
Cover of the book Adware and Spyware by George Hill
Cover of the book Information Warfare by George Hill
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy