Business Data Communications and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.
The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Flexible organization. The ordering of topics is presented with a top-down approach, with the early part of the book dealing with applications and upper-level protocols. However, the book is designed to support a bottom-up approach as well.
Detailed examination of client/server computing and service oriented architecture. Provides students with information about how these vital topics for corporate data communication work, allowing them to understand their functions and the approach for organizing enterprise systems.
Detailed discussion of all networking technologies, including LANs and WANs. Students can compare and evaluate competing approaches and thus understand each better. Wireless networks and quality of service are especially important topics.
Solid coverage of the TCP/IP set of protocols. Students are given the foundation and context for understanding the protocols and standards that form the foundation for all data networking.
Extensive use of real-world case studies. Shows students how companies have dealt with the real issues, problems, and opportunities presented by communications and network technology.
Numerous questions, homework problems, and worked-out examples. Offers students a chance to apply and test their knowledge.
Tables and figures. Helps students clarify concepts to aid in comprehension.
Suggested readings, key word lists, and recommended Web Sites conclude each chapter, and encourage students to further explore topics of interest. Seven online appendices provide supplemental material for students.
Chapter 0.Reader’s and Instructor’s Guide
Case Study I Unified Communications at Boeing (ONLINE)
Part One REQUIREMENTS
Chapter 2.Business Information
Case Study II CORE Credit Union (ONLINE)
Chapter 3.Distributed Data Processing
Case Study III Managing Massive Data Werehouses MasterCard
Part Two DATA COMMUNICATIONS
Chapter 4.Data Transmission
Chapter 5.Data Communication Fundamentals
Chapter 6.Data Link Control and Multiplexing
Case Study IV Broadband Access: Global and Local Issues (ONLINE)
Part Three THE INTERNET AND DISTRIBUTED APPLICATIONS
Chapter 7.The Internet
Case Study V Net Neutrality (ONLINE)
Chapter 9.Client/Server, Intranet, and Cloud Computing
Case Study VI Shifting Sands: Chevron’s Migration to the Cloud (ONLINE)
Chapter 10. Internet-Based Applications
Case Study VII E-Business at Guardian Life (ONLINE)
Chapter 11.Internet Operation
Part Four LOCAL AREA NETWORKS
Chapter 12.LAN Architecture and Infrastructure
Case Study VIII Carlson Companies (ONLINE)
Chapter 13.Ethernet, Switches, and Virtual LANs 390
Case Study IX St. Luke’s Health Care System: Using Mobility to Advance Health Care Delivery (ONLINE)
Part Five WIDE AREA NETWORKS
Chapter 15.WAN Technology and Protocols
Chapter 16.WAN Services
Chapter 17.Wireless WANs
Case Study X Choice Hotels (ONLINE)
Part Six MANAGEMENT ISSUES
Chapter 18.Computer and Network Security Threats
Chapter 19.Computer and Network Security Techniques
Case Study XI Cloud Computing (In)Security (ONLINE)
Chapter 20.Network Management (ONLINE)
Chapter 21. Network Planning and Design (ONLINE)