Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

P tag (HTML) 

P2P (peer-to-peer) networks  2nd  3rd  4th 

packet sniffers  2nd  3rd  4th 

    intercepting passwords using  2nd 

packets

    Point-to-Point Protocol (PPP) 

Padding field (IP address headers) 

Padding field (TCP data format) 

PAP (Password Authentication Protocol) 

paragraphcs

    HTML documents 

parameters

    in HTTP URLs 

parsing

    host files 

passive open state (TCP connections 

Password Authentication Protocol (PAP) 

password compromise

    methods

        guessing passwords  2nd  3rd 

        iintercepting  2nd 

        Trohan horse programs 

        Trojan horse programs 

        user/administrator inattention  2nd 

    preventing  2nd  3rd 

    security risks  2nd 

passwords

    clear text

        security issues  2nd 

    importance of changing 

    selecting  2nd 

path command 

path MTU (IPv6) 

payload length (IPv6) 

Payload Length field (IPv6 headers) 

peer-to-peer (P2P) networks  2nd  3rd  4th 

performance problems

    TCP/IP networks

        traffic problems  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th 

performance, optimizing

    DHCP server for  2nd  3rd 

    subnetting for  2nd 

Perl language

    CGI scripts 

physical addresses  2nd  3rd  4th 

    limitations 

    mapping to IP 

    relating to logical IP addresses 

Physical layer (OSI model)  2nd 

Pine e-mail reader  2nd  3rd 

ping

    source of 

ping command 

ping utility  2nd 

Ping utility  2nd  3rd  4th  5th  6th  7th  8th  9th  10th 

ping utility 

Point of Presence (POP) 

Point of Presence (POP) connections

    defined 

point-to-point connections (dial-up networking)  2nd  3rd 

Point-to-Point Protocol (PPP)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 

Point-to-Point Tunneling (PPTP) 

POP  [See Point of Presence]

POP (Point of Presence) 

POP (Post Office Protocol) 

pop command 

pop2 command 

POP3 (Post Office Protocol)  2nd  3rd 

pop3 command 

portmap command 

ports  2nd  3rd 

    firewalls  2nd 

    in HTTP URLs 

    TCP/IP Transport layer  2nd  3rd  4th  5th  6th  7th  8th 

        firewalls  2nd 

    well-known ports  2nd  3rd  4th  5th  6th  7th 

Post Office Protocol (POP) 

    defined 

Post Office Protocol (POP3)  2nd  3rd 

power users  2nd 

PPP (Point-to-Point Protocol)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 

PPP (Point-to-Point protocol)

    RFC 1661 

PPTP (Point-to-Point Tunneling Protcol) 

Presentation layer (OSI model)  2nd 

primary name servers 

print services

    TCP/IP Application layer)  2nd 

private networks

    reserved address ranges 

probes (network managment)

    defined 

probing

    attacks 

Process/Application-level services  2nd 

professional hackers 

proprietary protocols 

protocol dysfunction 

    diagnositc utilities

        arp 

        configuration information utilities 

        Ping 

    diagnostic utilities

        arp  2nd  3rd 

        configuration information utilities  2nd  3rd  4th 

    diagnostic utilties

        Ping  2nd  3rd  4th  5th 

Protocol identifier field (IP address headers) 

protocol suite

    IPX/SPX 

protocol suites

    communication processes 

    defined 

protocol systems  2nd 

    TCP/IP  2nd 

        data packages  2nd  3rd  4th 

        layers  2nd  3rd  4th 

        stack 

protocols

    ARP (Address Resolution Protocol)  2nd 

    ARP (address resolution protocol)  2nd  3rd 

    ARP (Address Resolution Protocol)

        defined 

    Boot PROM (BOOTP) 

    BOOTP 

    connection-oriented  2nd  3rd 

    connectionless  2nd  3rd 

    DHCP (Dynamic Host Configuration Protocol)  2nd  3rd  4th 

        ack (acknowledgment) messages  2nd 

        defined  2nd 

        DHCP Manager utility 

        Discover messages 

        Linux network configuration  2nd 

        Offer messages 

        relay agents  2nd 

        Request messages 

        time fields  2nd 

        Windows NT configuration  2nd  3rd  4th  5th  6th  7th  8th  9th 

    Directory Access Protocol (DAP) 

    displaying statistics about

        netstat utility  2nd 

    Dyanmic Host Configuration (DHCP)

        Request messages 

        Windows NT configuration 

    Dynamic Host Configuration Protocol (DHCP) 

    EAP (Extensible Authentication Protocol) 

    File Transfer Protocol (FTP)  2nd 

        anonymous FTP 

        ascii command 

        binary command 

        bye command 

        cd command 

        close command 

        defined 

        dir command 

        file type specification 

        ftp command 

        get command 

        ls command 

        mget command 

        mkdir command 

        mput command 

        open command 

        put command 

        pwd command 

        quit command 

        rmdir command 

        starting sessions 

        status command 

        type command 

        user command 

    File Transfer Protocol (FTP)L

        help command 

    Hypertext Transfer Protocol (HTTP) 

    ICMP (Internet Control Message Protocol) 

        defined 

        Destination Unreachable message 

        Echo Request and Echo Reply messages 

        Fragmentation Needed message 

        routing loops 

        Source Quench message 

        Time Exceeded message 

    IGMP (Internet Group Management Protocol) 

    Interent

        e-mail retrieval protocols  2nd  3rd  4th  5th  6th 

        Hypertext Transfer Protocol (HTTP)  2nd  3rd  4th 

    Internet

        e-mail retrieval protocols  2nd 

        Hypertext Transfer Protocol (HTTP)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 

    Internet Message Access Protocol (IMAP)  2nd 

    Internet Protocol (IP) 

        IP addresses  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th  14th  15th  16th  17th  18th  19th  20th  21st  22nd  23rd  24th  25th  26th  27th  28th  29th  30th  31st  32nd  33rd  34th  35th  36th  37th  38th  39th  40th  41st  42nd  43rd  44th 

    Lightweight Directory Access Protocol (LDAP) 

    modem  2nd  3rd  4th 

        Point-to-Point (PPP)  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th 

        Serial Line Internet Protocol (SLIP)  2nd  3rd  4th  5th  6th 

    Post Office Protocol (POP) 

    PPTP (Point-to-Point Tunneling Protocol) 

    proprietary 

    RARP (Reverse Address Resolution Protocol) 

        defined 

    Remote Monitoring (RMON) 

        RMON 1 version  2nd  3rd  4th  5th 

        RMON 2 version 

    routers

        Border Gateway Protocol (BGP) 

        dynamic routing algorithms  2nd  3rd  4th  5th  6th  7th  8th  9th 

        Exterior Gateway Protocol (EGP) 

        Interior Gateway Protocol (IGP) 

        Open Shortest Path First (OSPF)  2nd 

        Routing Information Protocol (RIP)  2nd  3rd 

    security tools

        IPSec (IP Security)  2nd  3rd 

        SSL (Secure Sockets Layer)  2nd  3rd  4th 

    Simple Mail Tranfer Protocol (SMTP)  2nd  3rd  4th 

        client commands  2nd 

        server response codes  2nd 

    Simple Mail Transfer Protocol (SMTP) 

    Simple Network Management Protocol (SNMP)  2nd  3rd  4th  5th 

        address space  2nd  3rd  4th  5th 

        disadvantages  2nd  3rd 

        get command 

        getnext command 

        set command 

        structure of  2nd  3rd 

    Simple Object Access Protocol (SOAP) 

    TCP  2nd  3rd 

        active open state 

        connections  2nd  3rd  4th  5th  6th  7th 

        data format  2nd  3rd  4th  5th  6th 

        end notification  2nd 

        flow control  2nd 

        passive open state 

        resequencing 

        security 

        stream-oriented processing 

    TCP (Transport Control Protocol) 

    TCP/IP

        with SSL (Secure Sockets Layer)  2nd  3rd  4th 

    Trivial File Transfer Protocol (TFTP) 

        defined  [See Trivial File Transfer Protocol]

        RFC 1350 

    UD  2nd  3rd 

    UDP  2nd 

        datagram header  2nd 

    UDP (User Datagram Protocol) 

    UDP protocol 

        datagram header 

    WAP (Wireless Application Protocol)  2nd  3rd  4th 

    wireless technologies

        Bluetooth architecture for  2nd  3rd  4th  5th 

proxy server software

    non-unique IP addresses and 

proxy servers 

pseudo-headers  2nd 

PTR resource record 

public key encryption  2nd  3rd  4th 

    digital certificates  2nd  3rd  4th  5th 

    digital signatures  2nd  3rd  4th 

put command (FTP) 

pwd command (FTP) 

Категории