全国计算机等级考试一本通——三级网络技术

全国计算机等级考试一本通——三级网络技术
ISBN-10
7115354405
ISBN-13
9787115354402
Category
Computers / Networking / General
Pages
677
Language
Chinese
Published
2014-11-01
Publisher
BEIJING BOOK CO. INC.
Authors
全国计算机等级考试命题研究中心, 未来教育教学与研究中心编著

Description

为了帮助考生在最短的时间内顺利通过计算机等级考试,全国计算机等级考试命题研究中心和未来教育教学与研究中心联合策划、编写了本书。本书共12章,主要内容包括网络系统结构与设计的基本原则、中小型网络系统总体规划与设计、IP地址规划技术、路由设计技术基础、局域网技术基础及应用、交换机及其配置、路由器配置及使用、无线局域网设备安装与调试、计算机网络环境及应用系统的安装与调试、网络安全技术、网络管理技术,以及无纸化真考题库。本书所配光盘主要提供三部分内容一一综合自测、真考题库和考试大纲。其中,真考题库部分包含全套真考题库试题,完全模拟真考环境,带领考生提前进入“考场”,其自动评分的功能可帮助考生了解自己对知识的掌握程度。书与光盘的完美结合,为考生通过考试提供实实在在的帮助。本书可作为全国计算机等级考试三级网络技术科目的培训教材和自学用书,也可以作为学习网络技术的参考书。

Similar books

  • Voice Over IP
    By Uyless D. Black

    Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.

  • Electronic Communications Systems
    By William C. House

    The men responsible for turning such possibilities into realities are Phillip Whittaker , the president of S.B.s. , and John E. Fox , director of marketing and business planning . Whittaker , fifty - eight , is a silver - haired veteran ...

  • Computer Networking Illuminated
    By Todd King, Diane Barrett

    Included are numerous Challenge Exercises, which allow students to gain hands-on experience with networking related tools and utilities, and Challenge Scenarios.

  • Cisco IOS Configuration Fundamentals
    By Cisco Systems, Inc

    Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...

  • From Millwrights to Shipwrights to the Twenty-first Century: Explorations in a History of Technical Communication in the United States
    By R. John Brockmann

    The millwrights ' and millers ' resistance to Evans's message was so great that their first recorded reaction was : “ It will not do ! it cannot do !! it is impossible that it should do !!! " 9 Nevertheless , Evans persisted in his ...

  • Principles, Protocols, and Architecture
    By Douglas Comer, David L. Stevens

    Principles, Protocols, and Architecture

  • Network Security Illustrated
    By Jason Albanese, Wes Sonnenreich

    The device has a chin rest , a keypad , and a card - swiping receptacle that resembles those used in retail stores . Steve places his chin on the rest , at which time his retina is scanned .

  • XML: Designing XML internet applications
    By David Megginson

    XML: Designing XML internet applications

  • Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
    By Bill Pennington, David Pollino, Tony Bradley

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.

  • 软件定义网络核心原理与应用实践
    By 刘江, 魏亮, 黄韬

    本书分为核心原理和应用实践两大部分, 对软件定义网络(SDN)技术进行了剖析和解读. 第一部分首先阐述了SDN的设计思想与体系架构, ...