How the Internet Works (8th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P3P (Platform for Privacy Preferences) 2nd

packet-switched networks

packets 2nd

     checksums

     DHCPDISCOVER packets

     DHCPOFFER packets

     DHCPREQUEST packets

     envelopes

     filtering, firewalls

    routing

         exterior routing protocols

         input queues

         interior routing protocols

         routing tables

     sniffers, workplace surveillance

pages (Web) [See web pages, home pages.]

Palmtop computers, connecting to Internet

parental controls

parsing documents

passports 2nd

pattern matching

peer-to-peer networks

peer-to-peer software 2nd

personal firewalls 2nd

PGP (Pretty Good Privacy)

phishing 2nd

phone calls

     Skype 2nd

     VoIP

phones (cell), hacks

physical layer (network communications)

piconet

PICS (Platform for Internet Content Selection)

ping (Pocket Internet Groper)

PKZIP software

Platform for Internet Content Selection (PICS)

Platform for Privacy Preferences (P3P) 2nd

plug-ins

Pocket Internet Groper (ping)

podcasting 2nd

Point-to-Point Protocol (PPP) 2nd

port probes

portable MP3 players

ports 2nd

PPP (Point-to-Point Protocol) 2nd

presentation layer (networks)

Pretty Good Privacy (PGP)

price-comparison services (online shopping), Froogle

privacy

     Carnivore spy system (FBI)

     cookies

    cryptography

         algorithms

         decryption

         digital certificates 2nd

         overview

         public-key cryptography

     Echelon spy system (NSA)

     Internet passports 2nd

     spyware

     web bugs 2nd

     web tracking

     workplace surveillance 2nd

private keys

probe request frames

profiles (Bluetooth)

programming languages

    HTML (Hypertext Markup Language)

         body tag

         object tag

     Java

     JavaScript 2nd

protecting against viruses

protecting websites, parental controls

protocols

     CGI (Common Gateway Interface) 2nd

     CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

     DHCP (Dynamic Host Configuration Protocol)

     DNS (Domain Name System)

    FTP (File Transfer Protocol)

         anonymous FTP

         clients

         command links

         daemons

         data connections

         downloading files with

         file compression

         overview

         sessions

     HTTP (Hypertext Transfer Protocol)

     HTTP (Hypertext Transfer Protocol) servers

     ICE (Internet Content and Exchange) 2nd

     ICMP (Internet Control Message Protocol)

     IP (Internet Protocol)

    IP (Internet Protocol) addresses

         dynamic IP addresses 2nd

         overview

         static IP addresses 2nd

     LDAP (Lightweight Directory Access Protocol) 2nd

     NAT (network address translation) 2nd

     OPS (Open Profiling Standard) 2nd

     P3P (Platform for Privacy Preferences) 2nd

     PGP (Pretty Good Privacy)

     PPP (Point-to-Point Protocol)

     SLIP (Serial Line Internet Protocol)

     SOAP (Simple Object Access Protocol)

     TCP (Transmission Control Protocol)

     TCP/IP (Transmission Control Protocol/Internet Protocol)

     UDDI (Universal Description, Discovery and Integration)

proxy servers 2nd

public keys

public wireless hot spots

public-key cryptography

Категории