p. 117, missing content. Access involves two different issues: stopping unauthorized people from accessing the telecommunications room and enabling authorized people to get in for maintenance and troubleshooting.
p. 165, third paragraph under “Calculating Subnets,” fourth sentence, should read 22=4.
p. 165, last line should read as follows: Figure 7.34 shows the first four available host IDs for each of the four new network IDs.
p. 444, third paragraph, fourth sentence should read thick clients, not think clients.
p. 460, first Exam Tip: throughput speeds should be Mbps, not Gbps.
p. 489, second paragraph, third sentence should read just a programmer, not a just programmer.