Absolute Beginners Guide to Networking (4th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sales   2nd  

Samba   2nd  

       configuring   2nd   3rd  

       SWAT (Samba Web Administration Tool)   2nd   3rd   4th   5th   6th   7th  

       Web site  

Samba Web Administration Tool (SWAT)   2nd   3rd   4th   5th   6th   7th  

Sams Teach Yourself .NET XML Web Services in 24 Hours  

Sams Teach Yourself Microsoft Office 2003 in 24 Hours  

Sams Teach Yourself Microsoft Windows Server 2003 in 24 Hours   2nd   3rd  

Sams Teach Yourself Samba in 24 Hours  

Sams Teach Yourself Windows Server 2003 in 24 Hours  

SANS Web site  

SAP (Service Advertising Protocol)  

SAPs (service access points)  

scalable networks  

SCL (server connection license)  

SCSI (Small Computer System Interface) drives   2nd  

SDRAM (Synchronous Dynamic RAM)  

secondary zones  

sectors (hard drives)  

Secure Electronic Transaction (SET)  

Secure HTTP (SHTTP)  

Secure Socket Layer (SSL)  

security   2nd  

       access permissions  

       attacks  

               denial-of-service attacks  

               eavesdropping  

               IP address spoofing  

               man-in-the-middle attacks  

               password attacks  

               protecting against   2nd  

       backups   [See backups ]

       CHAP (Challenge Handshake Authentication Protocol)  

       crackers  

       cryptography  

       firewalls   2nd   3rd   4th   5th   6th   7th  

               application-gateway firewalls  

                circuit-level firewalls  

               manufacturers  

               packet filter firewalls  

               proxy server capabilities  

               Shields Up Web site   2nd  

                software-only firewalls   2nd  

               ZoneAlarm  

       groups   2nd  

       importance of   2nd  

       Internet  

       IP networks  

       local  

       networks  

       NTFS permissions

               assigning  

               file permissions   2nd  

               folder permissions   2nd  

               guidelines   2nd  

       online transaction security   2nd  

       PAP (Password Authentication Protocol)  

       passwords   2nd   3rd   4th  

               assigning   2nd  

               guidelines   2nd   3rd  

               strong passwords  

       peer-to-peer networks   2nd  

       SET (Secure Electronic Transaction)  

       share permissions   2nd   3rd   4th   5th   6th   7th  

       share-level security  

       SHTTP (Secure HTTP)  

       SSL (Secure Socket Layer)  

       Trojan horses   2nd  

        user accounts  

               access tokens  

               concurrent connections  

               creating   2nd  

               disabling  

               logon hours  

               passwords   2nd   3rd   4th  

               remote connections  

               usernames   2nd  

       user authentication  

       viruses   2nd   3rd  

               boot sector viruses  

               Brain virus  

               defined  

               F-Secure Web site  

               file viruses  

               macro viruses   2nd  

               multipartite viruses  

               PE_LOVGATE.J virus  

               protecting against   2nd   3rd  

               SANS Web site  

       Web servers  

       Windows Server 2003   2nd   3rd   4th  

       worms  

               WORM_KWBOT.C worm  

Security Log  

segmenting

       packets  

Select a Zone Type dialog box  

Select Network Component Type dialog box   2nd   3rd   4th   5th  

selecting   [See choosing]

       connection types   2nd   3rd  

       ISPs   2nd   3rd  

Sequenced Packet Exchange (SPX)  

Serial Line Internet Protocol (SLIP)  

serial ports  

serial transmission  

server connection license (SCL)  

Server Health Log  

Server Message Block (SMB)  

server-based networks   2nd   3rd   [See also LANs]

       Active Directory  

       advantages   2nd   3rd  

       cost   2nd  

       disadvantages   2nd  

       managing   2nd  

       navigating  

       requirements  

       servers  

servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

       AnalogX Proxy Server   2nd   3rd  

       application servers  

       client/server databases   2nd  

       communication servers  

       configuration   2nd   3rd   4th  

       defined  

       DHCP (Dynamic Host Configuration Protocol)

               configuring   2nd   3rd   4th   5th   6th  

       DNS servers   2nd   3rd  

       file servers  

       FTP (File Transfer Protocol)   2nd   3rd  

       hardware configuration   2nd  

       Lotus Domino Server  

       Microsoft Exchange Server   2nd  

               administration   2nd  

               Outlook client   2nd   3rd  

        names

               friendly names  

       naming  

       peer-to-peer networks  

       print servers  

       proxy servers   2nd   3rd   4th  

               firewalls  

       RAS (Remote Access Services) servers   2nd   3rd  

               server configuration   2nd   3rd  

               tunneling  

       remote access servers  

       SharePoint Portal Server   2nd   3rd   4th  

       SQL Server  

       tape backup units  

       tunnel servers   2nd  

       Web servers   2nd   3rd   4th  

               hardware  

               managing  

               NetWare Enterprise  

               running  

               security  

       Windows Server 2003

               Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               communications servers  

               configuration   2nd  

               domain controllers  

               file servers   2nd  

               folder shares   2nd   3rd   4th   5th  

                Group Policy snap-in   2nd   3rd   4th  

               installation   2nd   3rd   4th   5th   6th   7th   8th   9th  

               Microsoft Networking model   2nd   3rd  

               NTFS permissions   2nd   3rd   4th   5th   6th   7th  

               print servers  

               printer sharing   2nd   3rd   4th  

               remote access servers  

               security   2nd   3rd   4th  

               shared Internet connections   2nd  

               Web servers  

               Web site  

       WINS (Windows Internet Naming Service)   2nd  

Service (SRV) resource records  

service access points (SAPs)  

Service Advertising Protocol (SAP)  

services  

       DNS (Domain Name System)   2nd  

               forward lookup zones  

               how it works   2nd  

               namespaces   2nd   3rd  

               resource records   2nd  

               reverse lookup zones  

               root domains  

               server configuration   2nd   3rd   4th  

               top-level domains   2nd  

       eDirectory   2nd  

               defined   2nd   3rd  

       NDS (Novell Directory Services)  

       RAS (Remote Access Services)   2nd   3rd  

               client configuration   2nd   3rd  

               server configuration   2nd   3rd  

               tunneling  

       Red Hat Linux network services   2nd   3rd   4th   5th  

       Web hosting services   2nd   3rd  

       WINS (Windows Internet Naming Service)   2nd  

Session layer (OSI model)   2nd   3rd  

SET (Secure Electronic Transaction)  

Shadow Copy  

share level security  

share permissions   2nd   3rd   4th  

shared resources   2nd  

       browsing   2nd   3rd   4th  

       printers   2nd   3rd  

SharePoint Portal Server   2nd   3rd   4th  

shares   2nd  

       creating   2nd  

       permissions   2nd   3rd   4th   5th   6th   7th  

sharing

       applications  

       applications with SharePoint Portal Server   2nd   3rd   4th  

       databases   2nd  

       directories   2nd  

       files  

               peer-to-peer networks   2nd   3rd   4th   5th   6th   7th  

       folders   2nd   3rd   4th   5th   6th   7th  

       hardware  

       Internet connections   2nd  

               IP addressing   2nd   3rd  

               NAT (Network Address Translation)   2nd   3rd   4th  

               proxy servers   2nd   3rd  

               required hardware  

               Windows Server 2003   2nd  

       printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

               peer-to-peer networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  

       workspaces   2nd   3rd   4th  

Sharing tab (Properties dialog box)   2nd  

Shields Up Web site   2nd  

SHTTP (Secure HTTP)  

signals

       baseband signals  

       broadband signals  

SIMMs (Single Inline Memory Modules)  

Simple Mail Transport Protocol (SMTP)   2nd   3rd  

simplex communication  

Single Inline Memory Modules (SIMMs)  

sites   [See Web sites]

Sites and Services snap-in (Active Directory)  

size

       peer-to-peer networks   2nd   3rd  

slash (/)  

SLIP (Serial Line Internet Protocol)   2nd  

Small Computer System Interface (SCSI) drives   2nd  

SMB (Server Message Block)  

smb.conf file  

SMTP (Simple Mail Transport Protocol)   2nd   3rd  

snap-ins

       Active Directory Domains and Trusts  

       Active Directory Sites and Services  

       Active Directory Users and Computers  

       Group Policy snap-in   2nd   3rd   4th  

       Licensing snap-in  

SnapServer  

sneakernet  

Sniffer Technologies  

sniffers   2nd  

sniffing  

snooping  

SOA (Start of Authority) resource records  

software   [See applications]

       network client software   2nd  

       NOS (network operating system)

               client configuration   2nd  

               defined   2nd  

               installing   2nd   3rd   4th  

               licensing   2nd   3rd   4th  

               network client software   2nd  

               network printing   2nd   3rd  

               network shares   2nd  

               protocols   2nd   3rd  

               redirectors   2nd  

               server configuration   2nd   3rd   4th  

       peer-to-peer networks  

       redirectors   2nd  

       software piracy  

       software-only firewalls   2nd  

       Trojan horses   2nd  

       viruses   2nd   3rd  

               boot sector viruses  

               Brain virus  

               defined  

               F-Secure Web site  

               file viruses  

               macro viruses   2nd  

               multipartite viruses  

               PE_LOVGATE.J virus  

               protecting against   2nd   3rd  

               SANS Web site  

       worms  

               WORM_KWBOT.C worm  

Software & Information Industry Association  

software piracy  

software-only firewalls   2nd  

SONET (Synchronous Optical Network/Synchronous Digital Hierarchy)  

SpartaCom, Inc

       Artisoft  

Special Edition Using HTML and XHTML  

Special Edition Using TCP/IP  

specifications

       IEEE

               Ethernet   2nd  

speed

       data transmission speed  

       disk speed  

       modems  

       Token-Ring  

SPX (Sequenced Packet Exchange)  

SQL (Structured Query Language)  

SQL Server  

SRV (Service) resource records  

SSL (Secure Socket Layer)  

star topology   2nd   3rd  

Start of Authority (SOA) resource records  

static addresses  

static IP addresses  

statistics (Network Monitor)   2nd   3rd  

storage

       hard drives   [See hard drives]

       NAS (network attached storage)  

storage pools

       creating   2nd   3rd   4th  

       defined  

strategy

       backups   2nd   3rd   4th   5th  

striping disks   2nd   3rd   4th  

strong passwords  

Structured Query Language (SQL)  

subnet masks

       IP addresses   2nd   3rd  

subnets   2nd  

subnetting  

        borrowing bits   2nd  

       Class B networks   2nd   3rd   4th  

       host addresses   2nd  

       host ranges   2nd  

suite applications  

SuperStack 3 firewall  

surge protection  

SWAT (Samba Web Administration Tool)   2nd   3rd   4th   5th   6th   7th  

switched networks   2nd   3rd  

       circuit switching   2nd  

               defined  

               DSL (Digital Subscriber Line)   2nd   3rd   4th   5th  

               ISDN   2nd   3rd  

       defined  

       packet switching   2nd  

               ATM (Asynchronous Transfer Mode)   2nd   3rd  

               Frame Relay   2nd  

               history and development  

switches   2nd   3rd  

       IMPs (Interface Message Processors)  

synchronizing

       applications  

       PDAs (Personal Digital Assistants) with PCs   2nd  

Synchronous Dynamic RAM (SDRAM)  

synchronous modems   2nd  

Synchronous Optical Network/Synchronous Digital Hierarchy (SONET)  

SYS$LOG.ERR file  

System Log  

system logs  

System Monitor  

Категории