How the Internet Works (8th Edition)
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] P3P (Platform for Privacy Preferences) 2nd packet-switched networks packets 2nd checksums DHCPDISCOVER packets DHCPOFFER packets DHCPREQUEST packets envelopes filtering, firewalls routing exterior routing protocols input queues interior routing protocols routing tables sniffers, workplace surveillance pages (Web) [See web pages, home pages.] Palmtop computers, connecting to Internet parental controls parsing documents passports 2nd pattern matching peer-to-peer networks peer-to-peer software 2nd personal firewalls 2nd PGP (Pretty Good Privacy) phishing 2nd phone calls Skype 2nd VoIP phones (cell), hacks physical layer (network communications) piconet PICS (Platform for Internet Content Selection) ping (Pocket Internet Groper) PKZIP software Platform for Internet Content Selection (PICS) Platform for Privacy Preferences (P3P) 2nd plug-ins Pocket Internet Groper (ping) podcasting 2nd Point-to-Point Protocol (PPP) 2nd port probes portable MP3 players ports 2nd PPP (Point-to-Point Protocol) 2nd presentation layer (networks) Pretty Good Privacy (PGP) price-comparison services (online shopping), Froogle privacy Carnivore spy system (FBI) cookies cryptography algorithms decryption digital certificates 2nd overview public-key cryptography Echelon spy system (NSA) Internet passports 2nd spyware web bugs 2nd web tracking workplace surveillance 2nd private keys probe request frames profiles (Bluetooth) programming languages HTML (Hypertext Markup Language) body tag object tag Java JavaScript 2nd protecting against viruses protecting websites, parental controls protocols CGI (Common Gateway Interface) 2nd CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) DHCP (Dynamic Host Configuration Protocol) DNS (Domain Name System) FTP (File Transfer Protocol) anonymous FTP clients command links daemons data connections downloading files with file compression overview sessions HTTP (Hypertext Transfer Protocol) HTTP (Hypertext Transfer Protocol) servers ICE (Internet Content and Exchange) 2nd ICMP (Internet Control Message Protocol) IP (Internet Protocol) IP (Internet Protocol) addresses dynamic IP addresses 2nd overview static IP addresses 2nd LDAP (Lightweight Directory Access Protocol) 2nd NAT (network address translation) 2nd OPS (Open Profiling Standard) 2nd P3P (Platform for Privacy Preferences) 2nd PGP (Pretty Good Privacy) PPP (Point-to-Point Protocol) SLIP (Serial Line Internet Protocol) SOAP (Simple Object Access Protocol) TCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) UDDI (Universal Description, Discovery and Integration) proxy servers 2nd public keys public wireless hot spots public-key cryptography |