Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SAN (storage area network) 

scanning

    attacks 

schemes (URL)  2nd  3rd 

    defined 

scope (DHCP)

    defining for Windows NT networks  2nd  3rd 

script kiddies 

scripting

    dynamic HTML

        client-side techniques  2nd 

        server-side techniques  2nd  3rd  4th  5th 

scripts

    Active Server Pages

        server-side processing using 

    CGI (common gateway interface)

        security issues  2nd 

    ColdFusion (Allaire)

        server-side processing using 

    Common Gateway Interface (CGI)

        server-side processing using  2nd 

    Internet Server Application Programming Interface (ISAPI)

        server-side processing using 

    Netscape Server Application Programming Interface (NSAPI)

        server-side processing using 

search option

    HTTP URLs 

secondary name servers 

Secure Sockets Layer (SSL)  2nd  3rd  4th  5th  6th  7th 

    public key encryption 

security

    802.11  2nd  3rd  4th  5th 

    access permissions  2nd  3rd 

    computer infiltration  2nd 

        buffer overflow attacks  2nd  3rd 

        CGI script attacks  2nd 

        e-mail worms 

        password guessing  2nd  3rd 

        password interception  2nd 

        password theft  2nd  3rd  4th 

        protection against  2nd  3rd 

        session highjacking 

        Trohan horse program 

    denial of service (DOS) attacks  2nd 

    denial of service attacks  2nd 

    encryption  2nd 

        algorithms for  2nd  3rd  4th  5th  6th  7th  8th  9th 

        asymmetric encryption  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th  13th 

        authentication 

        DES (Data Encryption Standard) 

        integrity verification 

        symmetric encryption  2nd  3rd  4th  5th  6th  7th  8th 

    firewalls  2nd 

        Hypothetical, Inc. example  2nd 

    Kerberos authentication system  2nd  3rd  4th  5th  6th 

    network infiltration

        footprinting 

        probing 

        scanning 

    TCP protocol 

    TCP/IP communications 

        IPSec (IP Security)  2nd  3rd 

        SSL (Secure Sockets Layer)  2nd  3rd  4th 

    virtual private networking (VPN)

        Hypothetical, Inc. example 

    VPNs (virtual private networks)  2nd  3rd  4th  5th  6th 

security issues

    computer infiltration

        Trojan horse program 

    e-mail

        viruses 

        Web-based e-mail 

    Internet communications 

segmenting

    Hypothetical, Inc. example  2nd 

segments (data packages) 

Segments Left field (Routing extension header) 

send command (Telnet) 

sequence control field (802.11 frame format) 

Sequence Number field (TCP data format) 

Serial Line Internet Protocol (SLIP)  2nd  3rd  4th  5th  6th 

server boxes  2nd 

server command (NSLookup utility) 

Server Message Block (SMB)  2nd  3rd  4th 

server-end processing

    Active Server Pages 

    ColdFusion (Allaire) 

    Common Gateway Interface (CGI) scripts  2nd 

    Internet Server Application Programming Interface (ISAPI) 

    Netscape Server Application Programming Interface (NSAPI) 

server-side HTML techniques  2nd  3rd  4th  5th 

    Active Server Pages 

    ColdFusion (Allaire) 

    Common Gateway Interface (CGI) scripts  2nd 

    Internet Server Application Programming Interface (ISAPI) 

    Netscape Server Application Programming Interface (NSAPI) 

servers  2nd 

    certificate 

    DHCP

        leasing IP addresses from  2nd  3rd 

    DHCP (Dynamic Host Configuration Protocol)

        dynamic IP addressing  2nd 

    domain name server (DNS) system 

        caching-only servers  2nd  3rd 

        configuring  2nd  3rd  4th  5th  6th  7th  8th 

        primary servers 

        reverse lookup zone files  2nd 

        secondary servers 

    emerging technologies 

        clustering  2nd  3rd 

        data technologies  2nd  3rd  4th 

        server boxes  2nd 

        Web services  2nd  3rd  4th 

    Web services 

servers (e-mail)  2nd 

    Simple Mail Transfer Protocol (SMTP)

        server response  2nd 

servers (HTTP)

    TCP with  2nd  3rd 

servers (Internet) 

    World Wide Web 

serverss

    proxy 

services

    Application-level 

    file  2nd  3rd 

    name resolution  2nd  3rd 

    print  2nd 

    Process/Application-level 

    redirector 

    redirectors  2nd 

session hijacking 

Session layer (OSI model)  2nd 

set all command (NSLookup utility) 

set command (SNMP) 

set command (Telnet) 

sftp command 

sgmp command 

share points 

shared key authentication 

Shortest Path Tree (SPT) 

signal regeneration 

Simple Mail Tranfer Protocol (SMTP)  2nd  3rd  4th 

    client commands  2nd 

    server response codes  2nd 

Simple Mail Transfer Protocol (SMTP)  2nd 

Simple Network Management Protocol (SNMP)  2nd  3rd  4th  5th 

    address space  2nd  3rd  4th  5th 

    defined 

    disadvantages  2nd  3rd 

    get command 

    getnext command 

    set command 

    structure of  2nd  3rd 

Simple Object Access Protocol (SOAP) 

sites.   [See Web sites]2nd  [See Web sites]

sliding widow method (TCP flow control) 

SLIP (Serial Line Internet Protocol)  2nd  3rd  4th  5th  6th 

SLL Handshake Protocol 

SMB (Server Message Block)  2nd  3rd  4th 

SMTP (Simple Mail Transfer Protocol)  2nd  3rd  4th  5th 

    client commands  2nd 

    server respoonse codes  2nd 

smtp command 

Smurf attacks 

sniffer utilities  2nd  3rd  4th 

SNMP  [See Simple Network Management Protocol]

SNMP (Simple Network Management Protocol (SNMP)  2nd  3rd  4th  5th 

SNMP (Simple Network Management Protocol)

    address space  2nd  3rd  4th  5th 

    disadvantages  2nd  3rd 

    get command 

    getnext command 

    set command 

    structure of  2nd  3rd 

snmp command 

snmp-trap command 

snmputil utility 

SOA (Start of Authority) resource record 

SOAP (Simple Object Access Protocol) 

sockets

    TCP/IP Transport layer  2nd 

Sockets API 

software

    automated updates  2nd  3rd 

Source Address field (IPv6 headers) 

source addresses 

Source IP Address field (IP address headers) 

Source Port field (TCP data format) 

Source Port field (UDP datagram header) 

Source Quench message (ICMP) 

spam messagaes (e-mail)  2nd 

spam messages (e-mail) 

    blacklists  2nd 

Sprint corporation 

SPT  [See Shortest Path Tree]

SSL (Secure Sockets Layer)  2nd  3rd  4th  5th  6th  7th 

    public key encryption 

SSL Alert Protocol 

SSL Change Cipher Spec Protocol 

SSL Handshake Protocol 

SSL Record Protocol  2nd  3rd 

stacks 

standards

    RFCs (Requests for Comment) 

    TCP/IP  2nd  3rd 

Start of Authority (SOA) resource record 

static IP addresses  2nd 

static routing  2nd  3rd 

statically entered IP addresses  2nd 

Statistics group (RMON 1) 

status command (FTP) 

storage area network (SAN) 

storage area networks (SAN)

    defined 

store and forward switching 

stream-oriented processing

    TCP protocol 

Subject field (e-mail) 

subnet mask

    defined 

    with IP addresses  2nd 

subnet masks

    binary pattern equivalents

        Class A  2nd  3rd 

        Class B  2nd 

        Class C 

    converting to dotted decimal format  2nd  3rd  4th 

    defined 

    identifying 

    pairing with IP address 

    using subnets  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 

subnets 

subnetting 

    Class A networks  2nd  3rd 

    Classless Internet Domain Routing (CIDR)  2nd 

    defined  2nd 

    Hypothetical, Inc. example  2nd  3rd 

    identifying subnet mask 

    subnet masks  2nd 

        binary pattern equivalents  2nd  3rd  4th  5th  6th 

        Class A address equivalents  2nd  3rd 

        Class B address equivalents  2nd 

        Class C address equivalents 

        converting to dotted decimal notation  2nd  3rd  4th 

    using subnets  2nd  3rd  4th  5th  6th  7th  8th  9th  10th  11th  12th 

Sun Web site 

sunrpc command  2nd 

supdup command 

supernet masks  2nd  3rd 

supernetting

    defined 

    supernet masks  2nd  3rd 

switches  2nd  3rd  4th 

    cut-through switching 

    store and forward switching 

symmetric encryption  2nd  3rd  4th  5th  6th  7th  8th 

syntax

    e-mail addresses  2nd  3rd  4th 

    HTML

        DOCTYPE declaration 

    ifconfig command 

    ipconfig command 

    ping command 

    rexec command 

    rlogin command 

    route utility  2nd 

    rsh command 

    ruptime command 

    rwho command 

    tcp command 

    URLs 

        HTTP URLs  2nd  3rd 

        relative URLs 

        schemes  2nd 

systat command  2nd 

Категории