| | Copyright |
| | About The Author |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Reader Services |
| | Introduction |
| | Part 1: Understanding the Internet's Underlying Architecture |
| | | Chapter 1. What Is the Internet? |
| | | How the Internet Comes Together |
| | | An Internet Timeline |
| | | Chapter 2. How Computer Networks Send Data Across the Internet |
| | | How Networks Talk with Each Other |
| | | How Networks Link to the Internet |
| | | Chapter 3. How TCP/IP Works |
| | | How the Internet's Basic TCP/IP Protocols Work |
| | | How IPv6 Works |
| | | Chapter 4. Understanding the Internet's Software Structure |
| | | How Client/Server Architecture Works |
| | | Chapter 5. How Internet Addresses and Domains Work |
| | | Understanding Internet Addresses and Domains |
| | | How Domain Name System Servers Work |
| | | How Static and Dynamic IP Addresses Work |
| | | How Network Address Translation Works |
| | | Chapter 6. How Routers Work |
| | | How Routers Send Data to Their Destination |
| | Part 2: Connecting to the Internet |
| | | Chapter 7. How Computers Connect to the Internet |
| | | How America Online Connects to the Internet |
| | | Connecting Your Computer to the Internet |
| | | How a Modem Makes Its Connection |
| | | How DSL Makes Its High-Speed Connection |
| | | Chapter 8. How Internet/Television Connections Work |
| | | How Cable Modems Work |
| | | How Internet-Enhanced TV Works |
| | | How IPTV Works |
| | | Chapter 9. How Wireless Connections and WiFI Work |
| | | How to Access the Internet via a Satellite Connection |
| | | How Cell Phones Access the Internet |
| | | How Bluetooth Works |
| | | How Wireless (WiFi) Networks Work |
| | | How Public Wireless Hot Spots Work |
| | | How WiMax Works |
| | | Chapter 10. How Home Networks Work |
| | | How Home Networks Let You Share Your Internet Connection |
| | | How a Wireless Media and Music Server Works |
| | Part 3: Communicating on the Internet |
| | | Chapter 11. How Email Works |
| | | How Email Is Delivered Over the Internet |
| | | How Email Software Works |
| | | How a Mailing List Works |
| | | How Email Is Sent Between Networks |
| | | How BlackBerries Deliver Email |
| | | How White Page Directories (LDAP) Work |
| | | How Encryption Can Keep Email Private |
| | | Chapter 12. How Email Spam Works |
| | | How Email Spam Is Sent |
| | | How Email Spam Is Blocked |
| | | Chapter 13. How Newsgroups Work |
| | | How Usenet Works |
| | | Chapter 14. How Internet Chat and Instant Messaging Work |
| | | How IRC Works |
| | | How Instant Messaging Works |
| | | How Chat Rooms Throw a Party |
| | | Chapter 15. How Skype and VoIP Work |
| | | How VoIP (Voice over Internet Protocol) Works |
| | | How Skype Works |
| | | Chapter 16. How Blogging and RSS Work |
| | | How Blogging Works |
| | | How RSS Works |
| | Part 4: How the World Wide Web Works |
| | | Chapter 17. How Web Pages Work |
| | | How the World Wide Web Works |
| | | How Web Pages Are Organized on a Website |
| | | How Websites Are Constructed |
| | | Chapter 18. How Web Browsers Work |
| | | How a Web Browser Works |
| | | What Common Browser Error Messages Mean |
| | | Chapter 19. How Markup Languages Work |
| | | How HTML Works |
| | | How Dynamic HTML Works |
| | | How XML Works |
| | | How AJAX Works |
| | | Chapter 20. How Hypertext Works |
| | | How Hyperlinks Work |
| | | Chapter 21. How URLs Work |
| | | How URLs Are Structured |
| | | How URLs Help Retrieve Web Documents |
| | | Chapter 22. How Image Maps and Interactive Forms Work |
| | | How Image Maps Work |
| | | How Interactive Forms Work |
| | | Chapter 23. How Web Host Servers Work |
| | | How Web Server Software Works |
| | | Chapter 24. How Websites Work with Databases |
| | | How the Web Works with Databases |
| | | Chapter 25. How .NET and Web Services Work |
| | | Understanding .NET and Web Services |
| | | Chapter 26. How Grid Computing Works |
| | | Understanding How Grid Computing Works |
| | Part 5: Using the World Wide Web |
| | | Chapter 27. How Internet Searching Works |
| | | How Internet Search Engines Work |
| | | How Meta-Search Software Works |
| | | Chapter 28. How Google Works |
| | | How Google Searches the Internet |
| | | What Google Knows About You |
| | | Chapter 29. How Map Sites Work |
| | | How Map Sites Work |
| | | How Google Earth Works |
| | | Chapter 30. How Wikis and the Wikipedia Work |
| | | How the Wikipedia Works |
| | Part 6: Using Common Internet Tools |
| | | Chapter 31. How Telnet Works |
| | | Understanding Telnet |
| | | Chapter 32. How FTP Works |
| | | How an FTP Session Works |
| | | How File Compression Works |
| | | Chapter 33. How Agents Work |
| | | Agents on the Internet |
| | | Chapter 34. How Java, ActiveX, and JavaScript Work |
| | | How Java Works |
| | | How ActiveX Works |
| | | How JavaScript Works |
| | | Chapter 35. How CGI Scripting Works |
| | | Understanding CGI Scripting |
| | Part 7: Enjoying Entertainment and Multimedia on the Internet |
| | | Chapter 36. How Music and Audio Work on the Internet |
| | | How RealPlayer Streaming Audio Works |
| | | How MP3 Music Files Work |
| | | How Internet Radio Broadcasting Works |
| | | Chapter 37. How iPods, iTunes, and Podcasting Work |
| | | How iPods Work |
| | | How iTunes Works |
| | | How Podcasting Works |
| | | Chapter 38. How Music Sharing and File Sharing Work |
| | | How Peer-to-Peer Software Shares Files and Music |
| | | How BitTorrent Works |
| | | Chapter 39. How Multicast IP and the MBone Work |
| | | How Multicast IP Travels Along the MBone |
| | | Chapter 40. How Virtual Reality Is Created by VRML |
| | | How Virtual Reality Is Created by VRML |
| | | Chapter 41. How Animation on the Web Works |
| | | How Client Pull and Server Push Animation Work |
| | | How Shockwave Works |
| | | How Flash Works |
| | Part 8: Shopping and Doing Business on the Internet |
| | | Chapter 42. How Intranets Work |
| | | Using an Intranet Within a Company |
| | | How Virtual Private Networks (VPNs) Work |
| | | Chapter 43. Shopping on the Internet |
| | | How Online Buying Works |
| | | How Online Shopping Carts Work |
| | | How eBay Sells Everything |
| | Part 9: Protecting Yourself on the Internet |
| | | Chapter 44. How Firewalls Work |
| | | How Corporate Firewalls Work |
| | | How Personal Firewalls Work |
| | | How Proxy Servers Work |
| | | Chapter 45. How Hackers Can Cripple the Internet and Attack Your PC |
| | | How Smurf Attacks and DOS Attacks Work |
| | | How Hackers Can Attack Your Computer |
| | | How Email Viruses Travel in Your Email |
| | | How Zombies and Bot Networks Work |
| | | How Hackers Exploit Browsers |
| | | Chapter 46. The Dangers of Wireless Networking |
| | | How War Drivers Invade Your Network |
| | | How "Evil Twin" Hacks Work |
| | | How Paris Hilton's Cell Phone Was Hacked |
| | | How Wireless Network Protection Works |
| | | Chapter 47. How Viruses Work |
| | | How Viruses Infect Computers |
| | | How Worms Work |
| | | Chapter 48. How Internet Sites Can Invade Your Privacy |
| | | How Cookies Work |
| | | How Websites Track Your Activities |
| | | How Web Bugs Can Invade Your Privacy |
| | | How Internet Passports Work |
| | | Chapter 49. The Dangers of Spyware and Phishing |
| | | How Spyware Works |
| | | Following the Spyware Money Trail |
| | | How Phishing Works |
| | | Following the Phishing Money Trail |
| | | How to Protect Against Spyware |
| | | Chapter 50. Cryptography, Privacy, and Digital Certificates |
| | | How Cryptosystems Work |
| | | How Digital Certificates Ensure Internet Security |
| | | Chapter 51. How Government and Workplace Surveillance Work |
| | | How the National Security Agency's Echelon Spy System Works |
| | | How the FBI's Carnivore System Invaded Your Privacy |
| | | How Internet Workplace Surveillance Works |
| | | Chapter 52. Parental Controls on the Internet |
| | | How Parental Controls Work |
| | Glossary |
| | Index |