Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

EA (Extension Bit)

EAP-SIM certification

EAP-TLS certification

EAP-TTLS/MSCHAPv2 certification

EBCDIC (Extended Binary-Coded Decimal Interchange Code) 2nd

ECC (error correction code)

eDirectory 2nd

effective rights (NetWare)

EGP (Exterior Gateway Protocols)

egress LSRs

EHLO command

EIA (Electronics Industries Association)

EISA (Extended ISA) 2nd

electrical barriers

electromagnetic fields

Electronics Industries Association (EIA)

email

     forged

     IMAP4

         client commands

         commands

         data formatting

         mailbox naming

         states

         system flags

         universal commands

     POP3

    relays

         open

         testing

     SMTP

         commands

         extensions

         models

         response codes

         transactions

EMI (electromagnetic interference)

Enable Burst Handling

enabling

     Active Directory schema

     auditing 2nd

Encapsulating Security Payload (ESP)

encapsulation

     L2TP

     layers

encryption

     authentication

     digital certificates 2nd

     PGP

     privacy

     SSL handshakes

     types 2nd

         public key

         RSA public key

         single-key

         symmetric

End of File (EOF)

End of Record (EOR)

end user licensing agreements (EULAs)

end users, surveying [See also users, training.]

endpoints

EOF (End of File)

EOR (End of Record)

error correction code (ECC)

errors [See also troubleshooting, planning resources.]

     BERT

     ethernets

     failed login attempts

     giant frames

     LDAP

     monitoring

     multiple network

escalation procedures (security)

ESDP (Bluetooth Extended Service Discovery Profile)

ESE (Extensible Storage Engine)

ESP (Encapsulating Security Payload)

establishing

     baselines 2nd

     LCP

     NCP

ethernet

     10 Gigabit Ethernet

     adapters

     backbones

     backoff algorithm

     collisions

     Fast Ethernet

     frames

         802.2 LLC standard

         802.3 standard

         Ethernet II/PARC

     full-duplex switches

     Gigabit 2nd

     history 2nd

     overview

     security

     switches

    topologies

         bus

         hybrid LAN

         restrictions

         star

     troubleshooting

     types

Ethernet II

Ethertest LAN Analyzer for Windows

evaluating

     competing products

     components

     contracts

     networks

     upgrade needs

even parity

Event Log (Windows NT)

Event View (Action menu)

Event Viewer

     failed login attempts

    Windows

         2000/2003

         NT 4.0

events

     AUDITCON tool

     audits, configuring

     directories

     files

     printers

     Windows 2003 servers

Everyone group

exclusions (DHCP)

exclusive locks

executing [See also applying, routers.]

     Active Directory schema

     firewalls

     pilot programs

     Start/Search method

     WINS

executive overviews

existing trees, joining

expanding LANs

Expert Observer

expirations

     passwords

     user accounts

explicit tagging

EXPN command

export-import filters

exportfs command

exporting

     records

     tools

Extended Binary-Coded Decimal Interchange Code (EBCDIC) 2nd

Extended ISA (EISA)

Extensible Storage Engine (ESE)

Extension Bit (EA)

extensions

     fields

     headers

     SMTP

Exterior Gateway Protocols (EGP)

External Data Representation (XDR)

external hard disks

external USB 2.0 hard drives

Extinction Intervals

Категории