Upgrading and Repairing Networks (5th Edition)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

W3C (World Wide Web Consortium) 2nd

Wake on LAN (WOL)

WANs (wide area networks) 2nd

     back doors

     forged email

    LAN

         comparing

         connections

     passwords

     PHY

     preventing attacks

     protocols

     routers

    security

         host computers

         network sniffers

         preventive measures

         spoofing

         training

         Tripwire

         updating

         virus-checking applications

     Trojan horses

     types of attacks

     viruses

WAP

wardriving

WatchGuard SOHO

Web

     archives

     browsers

     pages, saving

Web sites

     ACPI

     Bluetooth

Web-based printers folder

WECA (Wireless Ethernet Compatibility Alliance) 2nd

WEP (Wired Equivalent Privacy) 2nd

WEPCrack

WfM (Wired for Management) 2nd

Wi-Fi [See 802.11b networks, decline of.]

wide area networks [See WANs (wide area networks), LAN, comparing .]

Wildpackets

WILL command

Windows

    2000

         Administration Tools

         auditing policies

         DHCP servers

         directories

         Event Viewer

         groups

        migrating from Novell Netware [See NetWare, decline Windows 2000 migration.]

        MMC [See MMC (Microsoft Management Console), DHCP.]

         name resolution

         printers, adding

         Professional

         Professional Client

         servers

         support

         Telnet

         user groups

         user-level permissions

         WINS

    2000 Server

         ActiveState ActivePerl 5.6

         DFS

         DNS

         Korn Shell command

         NetWare

         passwords

         Telnet

        Unix [See Unix, DNS servers.]

         upgrading

         user name mapping

         Windows 2003 Server upgrade

    2003

         Active Directory

         ActiveState ActivePerl 5.6

         auditing policies

         BOOTP

         DFS

         DNS

         Event Viewer

         groups

         installing

         Korn Shell command

         NetWare

         operating systems

         passwords

         servers

         Telnet 2nd

        Unix [See Unix, NIS.]

         upgrading to

         user name mapping

         WINS

     95

     98

     Components Wizard 2nd

     firewalls

     FTP command-line clients

     integrated Windows authentication

    Internet Naming Service [See WINS (Windows Internet Naming Service), NetBIOS.]

     ipconfig command

     Mobile devices

     netstat command

     NFS

    NT [See NT (Windows), domains, controllers .]

    NT 4.0

         configuring

         Event Viewer

         migrating from Novell Netware

         printers

     permissions

     ping command

    print servers

         adding printers

         printers/printing devices

    Server 2003

         DHCP

         DOS-mode, booting in

         Itanium servers

         upgrading to

         Windows 2000

     SFU

     SOHO

     Vista

    XP

         64-bit support

         DOS-mode, booting in

         network connection repair

         Windows 2000 and

    XP Professional

         auditing

         printing

         VPN connections

         Windows 2003 Server

windows

     backup

     congestion

     offered

     sizes

     sliding

WinDump command

winipcfg command

WINS (Windows Internet Naming Service) 2nd

     configuring

     NetBIOS

    Windows

         2000

         2003 Server

wire-mapping

Wired Equivalent Privacy (WEP) 2nd

Wired for Management (WfM) 2nd

Wired Protected Access [See WPA (Wired Protected Access), Personal certification.]

wireless

    devices

         2.4GHz devices

         PDAs

     Ethernets

     IEEE 802.11

    routers

         APs, comparing

         features of

         integrated Ethernet switches

     topologies

Wireless Equivalent Privacy (WEP) 2nd

Wireless Ethernet Compatibility Alliance (WECA) 2nd

wireless networks

    802.11-based [See 802.11-based networks.]

     ad-hoc networks 2nd

     adapters, installing

     advantages 2nd

     AMA

     APs

     definition

     IEEE 2nd

     interference

     LANs, connecting to

     manual client configuration

     needs, determining

     PANs

     public places/spaces 2nd

     radio wave transmission

    security

         features/standards crossreference

         knowing your users

         neighbors

         overview 2nd

         SSIDs

         WEP

         wired networks, comparing

         WPA [See also WPA (Wired Protected Access), WPA2.]

         WPA2 2nd

     Service Pack 2 wireless network setup wizard

     setup wizard

    SOHO [See SOHO (small offices and home offices), routers.]

     spread-spectrum technologies 2nd

     topologies of

Wireless-B [See also 802.11b networks, decline of.]

Wireless-G broadband router installation

     LAN connections

     PCs, configuring 2nd

     properties sheet tabs

     saving configurations

     wireless access ports, configuring

wiring

     drawings

     records

     reports

     structured

         backbone cabling system

         horizontal cabling system

         work area specification

     terminologies

         ACR

         attenuation 2nd

         bandwidth 2nd

         characteristic impedance

         cross-talk

         dialectic

         electromagnetic field

         EMI

         FEXT 2nd

         frequency 2nd

         full-duplex communication

         half-duplex communication

         impedance

         leakage

         minimal velocity of propagation

         NEXT 2nd

         Power SUM

         radio frequencies

         shields

         TDR 2nd

     twisted-pair 2nd

     work orders

wizards

     Add Printer 2nd

     Administration Tools Setup

     Installation

     Windows Components 2nd

WMM certification

WOL (Wake on LAN)

WON'T command

word processors

WordPerfect Office X3

work area specifications

work patterns, assessing

workgroups (Windows NT)

     domains

         controllers

         models

     replication between domain controllers

     trust relationships

workstations

     backbones

     backups

     BOOTP

         client/server exchanges (DHCP)

         DHCP

         downloading operating systems

         options fields

         packet formats

         request/reply mechanisms

     Gigabit Ethernets

     limiting

     NIC

World Wide Web Consortium (W3C) 2nd

WPA (Wired Protected Access)

     Enterprise certification

     overview

     Personal

     Personal certification

     Pre-Shared Key with TKIP

     RADIUS

     vulnerabilities, overcoming

     WEP

     WPA2 2nd

WPA2

     Enterprise certification

     Personal

     Personal certification

WRITE command

Категории