Upgrading and Repairing Networks (5th Edition)
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
AAL (ATM Adaption Layer) AC (alternating current) Academic Source Release (ASR) Accelerated Graphics Port (AGP) Accent Points dual-mode 2nd acceptable use statements network security 2nd 3rd 4th 5th access Anonymous Access Arbitrated Loops CSMA/CD 2nd databases X.500 2nd 3rd 4th 5th 6th 7th dial-in allowing LDAP 2nd 3rd 4th 5th Linux 2nd 3rd 4th 5th 6th 7th 8th 9th methods token-passing bus 2nd Token-Ring 2nd NBMA (nonbroadcast mulitple access) NetWare NTFS Windows NT R-utilities 2nd 3rd share-level permissions 2nd Windows 95/98 2nd Windows NT shared network media SMB 2nd 3rd 4th 5th 6th 7th 8th Unix 2nd 3rd 4th 5th 6th 7th 8th 9th user -level permissions 2nd Windows NT/2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th users limiting time 2nd VPN (virtual private network) 2nd 3rd Web-based printers folders managing 2nd 3rd 4th 5th Windows NT adding users to groups 2nd assigning group memberships 2nd built-in user groups 2nd 3rd creating user groups 2nd 3rd groups 2nd managing user accounts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th wireless networking selecting locations 2nd 3rd 4th workstations limiting 2nd Access Code field Access Control List (ACL) 2nd 3rd routers Access Control Lists (ACLs) access control mechanisms (network security) auditing 2nd identifying users 2nd 3rd passwords 2nd 3rd 4th 5th 6th 7th resource protections Access Points 2nd 3rd access points (APs) 2nd 3rd 4th 5th Account Information dialog box 2nd 3rd 4th 5th 6th account lockouts passwords Account Policy dialog box 2nd accounts Account Information dialog box 2nd 3rd 4th 5th computers managing 2nd 3rd 4th generic naming interdomain trust relationships 2nd 3rd 4th creating 2nd 3rd 4th 5th time limiting 2nd tracking user searching 2nd 3rd users complete trust models 2nd managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th moving between Linux/NetWare 2nd 3rd Unix 2nd 3rd 4th Windows NT creating workstations limiting 2nd ACK ( Acknowledgement ) 2nd ACK (acknowledgement) acknowledgement (ACK) Acknowledgment (ACK) 2nd ACL (Access Control List) 2nd 3rd routers ACL (Asynchronous Connection-Less) 2nd ACLs (Access Control Lists) ACPI (Advanced Configuration and Power Interface) 2nd 3rd 4th ACPI (Advanced Configuration and Power Management Interface) ACR (attenuation to cross talk ratio) acronyms 2nd 3rd 4th ACT (Access Control Commands) 2nd Action menu Event Viewer 2nd 3rd 4th 5th MMC 2nd 3rd 4th 5th 6th 7th 8th configuring properties 2nd MMC (Microsoft Management Console) 2nd WINS managing 2nd 3rd 4th 5th 6th Active Directory ADSI (Active Directory Service Interface) 2nd DC (domain controller) 2nd directory-aware application programming 2nd member servers 2nd application of attributes 2nd DDNS (Dynamic DNS) 2nd directory services 2nd DNS (Domain Name System) domain models 2nd global catalog summarizing data 2nd groups 2nd 3rd 4th managing migration implementing 2nd 3rd 4th joining trees master domain model 2nd 3rd 4th 5th upgrading BDCs 2nd upgrading PDCs 2nd 3rd 4th 5th objects 2nd 3rd 4th naming 2nd 3rd searching 2nd 3rd 4th 5th 6th 7th 8th 9th standard 2nd 3rd 4th 5th partitioning 2nd replicating 2nd 3rd schema 2nd 3rd 4th 5th 6th 7th modifying 2nd 3rd 4th 5th 6th 7th 8th 9th sites managing large enterprises standards 2nd 3rd 4th 5th trees 2nd 3rd 4th Windows 2003 Server 2nd installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Active Directory Computers and Users snap-in 2nd 3rd Active Directory Migration Tool (ADMT) Active Directory Service Interface (ADSI) 2nd DC (domain controller) 2nd directory-aware application programming 2nd member servers 2nd Active Directory Service Interface. [See ADSI] Active Directory Service Interfaces (ADSI) Active Directory Users and Computers command (Start menu) Active Dorectory objects 2nd services 2nd active hubs 2nd 3rd 4th 5th 6th ARCnet active mode active monitor active open connections ActiveState ActivePerl 5.6 ad hoc wireless networks ad-hoc networks wireless networking 2nd 3rd 4th adapter cards 10Base-2 networks 2nd 3rd 4th 5th 6th ARCnet 2nd adapters networks troubleshooting PCMCIA 2nd wireless network installing 2nd 3rd 4th 5th 6th 7th 8th Add Button dialog box Add Printer dialog box Add Printer Wizard 2nd Add Server dialog box Add Standalone Snap-in dialog box Add Trusted Domains dialog box Add Users and Groups dialog box 2nd 3rd add-ons Korn Shell commands SFU (Services for Unix 3.0);NFS 2nd 3rd 4th 5th SFU (Services for Unix);NFS 2nd SFU (Services for Unix 3.0) 2nd 3rd installing 2nd 3rd 4th 5th Add/Remove Snap-in dialog box adding Active Directory schema 2nd computers domains 2nd labels 2nd 3rd links DFS roots 2nd 3rd objects databases printers Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st Windows NT 4.0 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th server partners servers stacks 2nd users groups 2nd wireless networking LAN 2nd 3rd 4th 5th 6th 7th Address field Address Recognized bit Address Resolution Protocol (ARP) 2nd 3rd IP addresses proxy ARP 2nd resolving 2nd 3rd 4th 5th 6th 7th 8th 9th address space configuring routers 2nd addresses 2nd 3rd 4th 5th APIPA DHCP 2nd base I/O ports 2nd 3rd destination 2nd IP filtering 2nd spoofing 2nd to cable modems 2nd 3rd 4th MAC VLAN (virtual LAN) 2nd MAC (Media Access Control) protocols name resolution 2nd reserving reusing routers hierarchical network organizations 2nd scope configuring 2nd 3rd 4th creating 2nd 3rd 4th 5th addressing ARCnet 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th broadcast IP (Internet Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th ARP (Address Resolution Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th Class A 2nd 3rd 4th Class B 2nd 3rd 4th Class C 2nd Class D 2nd 3rd 4th 5th 6th 7th 8th Class E 2nd 3rd 4th 5th 6th 7th 8th datagram headers 2nd 3rd 4th 5th 6th 7th proxy ARP (Address Resolution Protocol) 2nd RARP (Reverse Address Resolution Protocol) subnetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th supernetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th MAC (Media Access Control) mulitcast unicast adduser -d command Unix adduser command Unix administration Active Directory large enterprises with sites centralized management 2nd 3rd complete trust models 2nd decentralized management 2nd 3rd directories modeling 2nd 3rd domains controllers 2nd 3rd creating trust relationships 2nd 3rd 4th 5th interdomain trust relationships 2nd 3rd 4th models 2nd 3rd 4th 5th 6th 7th 8th replication between controllers 2nd 3rd 4th Windows NT 2nd 3rd 4th groups 2nd adding users 2nd assigning group memberships 2nd built-in user groups 2nd 3rd creating user groups 2nd 3rd IEEE 802.1 2nd installation 2nd NDS Manager creating replicas 2nd 3rd partitioning 2nd synchronizing servers 2nd Netware 2nd 3rd NetWare NWADMN32 2nd 3rd printers Windows 2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th Windows NT 2nd 3rd routers delegating LAN responsibilties 2nd 3rd LAN sizes 2nd 3rd 4th 5th switches user accounts Windows NT 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th users modifying Unix accounts 2nd 3rd 4th Unix 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th WINS netsh commands 2nd 3rd Windows 2000 2nd 3rd 4th 5th 6th Windows 2003 Server wiring drawings records 2nd reports work orders 2nd Administration Tools installing 2nd administrative rights delegating 2nd 3rd adminstration WINS Action menu 2nd 3rd 4th 5th 6th ADMT (Active Directory Migration Tool) ADSI (Active Directory Service Interfaces) ADSL 2nd 3rd ADSL (Asynchronous Digital Subscriber Line) Advanced Audio/Video Remote Control Profile (AVRCP) Advanced Configuration and Power Interface (ACPI) 2nd 3rd 4th Advanced Configuration and Power Management Interface (ACPI) Advanced Encryption Standard (AES) 2nd Advanced Power Management (APM) aero domain AES (Advanced Encryption Standard) 2nd agents proxy 2nd relay 2nd 3rd DHCP AGP (Accelerated Graphics Port) AH VPN (virtual private network) 2nd 3rd AH (Authentication Header) alarms 2nd alerts Unix algorithms backoff 2nd congestion avoidance Dijkstra OSPF (Open Shortest Path First) 2nd LSDB (Link State Database) 2nd 3rd 4th 5th route calculations SHA (Secure Hash Algorithm) Truncated Binary Exponential Backoff Algorithm allocation DHCP allowing dial-in access ALOHA project ALOHAnet alternate migration plans alternation current (AC) AMA (Open Mobile Alliance) amdinistration Web-based printers folders 2nd 3rd 4th 5th American National Standards Institute (ANSI) 2nd American Power Conversion Corp (APC) American Standard Code for Information Interchange (ASCII) analog modems analysis logical network design 2nd 3rd 4th 5th 6th 7th components 2nd 3rd 4th 5th 6th 7th 8th 9th mainatining physical networks analyzers 2nd 3rd baselines establishing 2nd 3rd statistical data 2nd protocols decoding filtering 2nd hardware 2nd 3rd software 2nd 3rd 4th 5th 6th software LAN 2nd 3rd analyzers, networks 2nd analyzing printing statistics 2nd Anixter Anonymous Access ANSI (American National Standards Institute) 2nd Antheil, George anti-virus applications APC (American Power Conversion Corp) API (application programming interface) APIPA DHCP 2nd APIPA (Automatic Private IP Addressing) APM (Advanced Power Management) appliances NAS 2nd Application Compatibility Toolkit Windows 2003 Server 2nd application gateways. [See proxy servers] Application layer application programming interface (API) application-specific integrated chips (ASICS) application-specific integrated circuits (ASICs) applications 2nd 3rd 10Base-2 networks upgrading 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Active Directory ADSI (Active Directory Service Interface) 2nd DC (domain controller) 2nd directory-aware application programming 2nd member servers 2nd Anixter assessing 2nd Cisco competing products evaluating 2nd copying corporate standards verifying 2nd deleting drivers NDIS (Network Driver Interface Specification) 2nd ODI (Open Data-Link Interface) 2nd Packet Drivers 2nd firewalls 2nd 3rd FTP (File Transfer Protocol) 2nd 3rd commands 2nd 3rd 4th 5th data transfers 2nd 3rd 4th ports/processes 2nd Red Hat Linux 2nd 3rd 4th 5th 6th replies 2nd 3rd 4th 5th TFTP (Trivial File Transfer Protocol) 2nd 3rd 4th 5th Windows command-line clients 2nd 3rd 4th 5th 6th 7th 8th 9th gateways HP IBM IP addresses Juniper Networks, Inc. legacy maintaining support 2nd LinkSys Linux/NetWare 2nd 3rd 4th Micorosft NETGEAR network sniffers 2nd print servers 2nd 3rd 4th proxy 2nd 3rd 4th RedHat Samba.org security TCP/IP 2nd 3rd Telnet 2nd commands 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th NVT (Network Virtual Terminal) 2nd Tripwire 2nd 3rd Trojan horses 2nd upgrading 2nd 3rd 4th 5th vertical-market 2nd 3rd 4th 5th 6th 7th 8th 9th 10th virus-checking viruses 2nd 3rd 4th 5th WEP applying 802.11b networking 2nd 3rd distance limitations firewalls 2nd NAS and SANs 2nd NDS Manager creating replicas 2nd 3rd partitioning 2nd synchronizing servers 2nd routers 2nd 3rd Start/Search method 2nd switches Windows 2000/2003 Event Viewer 2nd 3rd 4th 5th 6th 7th 8th Windows NT 4.0 Event Viewer 2nd 3rd WINS 2nd APs (access points) 2nd 3rd 4th 5th Arbitrated Loops SANs 2nd 3rd 4th 5th 6th 7th 8th 9th architecture ATN (Asynchronous Transfer Mode) 2nd 3rd 4th 5th 6th IEEE 802 2nd 3rd 4th 5th IEEE 802.1 2nd IEEE 802.10 IEEE 802.11 2nd IEEE 802.2 2nd IEEE 802.3 2nd IEEE 802.4 2nd IEEE 802.5 2nd IEEE 802.7 2nd SCSI ARCnet 2nd 3rd bus topologies 2nd configuring 2nd ethernets connecting 2nd frame types frames formats 2nd 3rd 4th 5th 6th 7th 8th hubs 2nd laying out 2nd 3rd 4th 5th network adapter cards 2nd selecting 2nd star topologies 2nd symbols 2nd 3rd 4th 5th 6th 7th 8th Token-Ring laying out 2nd 3rd 4th 5th troubleshooting 2nd 3rd upgrading 2nd 3rd 4th troubleshooting 2nd 3rd 4th 5th 6th upgrading 2nd 3rd 4th wiring 2nd ARCnet (Attached Resource Computer Network) 2nd addressing 2nd 3rd ARCnet Trade Association (ATA) ARP (Address Resolution Protocol) 2nd 3rd IP addresses proxy ARP 2nd resolving 2nd 3rd 4th 5th 6th 7th 8th 9th arp command 2nd 3rd ARPANET 2nd arranging domains 2nd ASCII Telnet NVT transfers ASCII (American Standard Code for Information Interchange) ASICS (application-specific integrated chips) ASICs (application-specific integrated circuits) ASR *Academic Source Release) assessing applications 2nd reliability 2nd assessing client work patterns 2nd Asset Management component assigning group memberships 2nd assignment users assignments IPX packets 2nd 3rd association MAC Layer 2nd asymmetric encryption digital certificates 2nd 3rd 4th SSL handshakes 2nd Asynchronous Connection-Less (ACL) 2nd Asynchronous Digital Subscriber Line (ADSL) Asynchronous Transfer Mode (ATM) 2nd 3rd 4th architecture 2nd 3rd 4th 5th 6th connections 2nd frames 2nd 3rd Lan emulation 2nd service categories 2nd 3rd 4th ATA (ARCnet Trade Association) ATM Frame Relay 2nd IP over ATM (Asynchronous Transfer Mode) 2nd 3rd 4th architecture 2nd 3rd 4th 5th 6th connections 2nd frames 2nd 3rd LAN emulation 2nd service categories 2nd 3rd 4th ATM Adaption Layer (AAL) ATRN command Attached Resource Computer Network. [See ARCnet] attacks denial of service digital certificates 2nd 3rd distributed denial-of-service forged e-mail 2nd types of denial-of-service 2nd distributed denial-of-service 2nd 3rd 4th ICMP redirects 2nd 3rd Ping of Death 2nd WANs (wide area networks) back doors 2nd forged e-mail 2nd passwords 2nd preventing 2nd 3rd Trojan horses 2nd types of attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th viruses 2nd 3rd 4th 5th attenuation 2nd 3rd fiber- optic cables testing attenuation to cross talk ratio (ACR) attributes Active Directory 2nd property set selected User Account object Audio/Video Remote Control Profile Audit Policy dialog box auditing 2nd enabling 2nd 3rd 4th 5th 6th 7th 8th 9th Linix 2nd 3rd 4th syslog 2nd 3rd 4th 5th 6th 7th system log files 2nd 3rd NetWare 6 2nd networks 2nd reports 2nd Unix 2nd 3rd 4th syslog 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Windows 2000/2003 configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th Windows NT 4.0 configuring 2nd 3rd 4th 5th 6th 7th Windows XP Professional 2nd 3rd 4th Auditing Entry dialog box AUTH command authenitcation users Linux/NetWare authenticated commands 2nd authentication basic authentication digest domain controllers 2nd 3rd replication 2nd 3rd 4th encrypted integrated Windows LDAP 2nd pass-through Telent 2nd 3rd Authentication Header (AH) authority delegating for network security specialized servers 2nd user accounts 2nd authorization R-utilities 2nd 3rd share-level permissions 2nd Windows 95/98 2nd Windows NT user-level permissions 2nd Windows NT/2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th AUTHORIZATION state 2nd authorizing DHCP servers 2nd 3rd Automatic Private IP Addressing (APIPA) automation file systems 2nd automount command 2nd 3rd autonmous systems RIP (Routing Information Protocol) 2nd 3rd 4th 5th 6th router updates 2nd 3rd 4th scalability 2nd version 2 2nd 3rd autonomous systems autosensing 2nd AVCP (Audio/Video Remote Control Profile) AVRCP (Advanced Audio/Video Remote Control Profile)
|