How the Internet Works (8th Edition) - page 212



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

object tag (HTML)
object-oriented languages
objectionable material, blocking access to
objects, DOM (Document Object Model)
ocx filename extension
off hook (modems)
on-demand computing
online services 2nd
online shopping
     eBay
     encryption
     online shopping carts 2nd
     overview
     price-comparison services, Froogle
     transactions
open method (JavaScript)
Open Profiling Standard (OPS) 2nd
OPS (Open Profiling Standard) 2nd
org (.org) domain name
organizations
     IAB (Internet Architecture Board)
     IETF (Internet Engineering Task Force)
     Internet Society
     InterNIC
     organizations of networks
     registrars
     W3C (World Wide Web Consortium)
organizing web pages



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

P3P (Platform for Privacy Preferences) 2nd
packet-switched networks
packets 2nd
     checksums
     DHCPDISCOVER packets
     DHCPOFFER packets
     DHCPREQUEST packets
     envelopes
     filtering, firewalls
    routing
         exterior routing protocols
         input queues
         interior routing protocols
         routing tables
     sniffers, workplace surveillance
pages (Web) [See web pages, home pages.]
Palmtop computers, connecting to Internet
parental controls
parsing documents
passports 2nd
pattern matching
peer-to-peer networks
peer-to-peer software 2nd
personal firewalls 2nd
PGP (Pretty Good Privacy)
phishing 2nd
phone calls
     Skype 2nd
     VoIP
phones (cell), hacks
physical layer (network communications)
piconet
PICS (Platform for Internet Content Selection)
ping (Pocket Internet Groper)
PKZIP software
Platform for Internet Content Selection (PICS)
Platform for Privacy Preferences (P3P) 2nd
plug-ins
Pocket Internet Groper (ping)
podcasting 2nd
Point-to-Point Protocol (PPP) 2nd
port probes
portable MP3 players
ports 2nd
PPP (Point-to-Point Protocol) 2nd
presentation layer (networks)
Pretty Good Privacy (PGP)
price-comparison services (online shopping), Froogle
privacy
     Carnivore spy system (FBI)
     cookies
    cryptography
         algorithms
         decryption
         digital certificates 2nd
         overview
         public-key cryptography
     Echelon spy system (NSA)
     Internet passports 2nd
     spyware
     web bugs 2nd
     web tracking
     workplace surveillance 2nd
private keys
probe request frames
profiles (Bluetooth)
programming languages
    HTML (Hypertext Markup Language)
         body tag
         object tag
     Java
     JavaScript 2nd
protecting against viruses
protecting websites, parental controls
protocols
     CGI (Common Gateway Interface) 2nd
     CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)
     DHCP (Dynamic Host Configuration Protocol)
     DNS (Domain Name System)
    FTP (File Transfer Protocol)
         anonymous FTP
         clients
         command links
         daemons
         data connections
         downloading files with
         file compression
         overview
         sessions
     HTTP (Hypertext Transfer Protocol)
     HTTP (Hypertext Transfer Protocol) servers
     ICE (Internet Content and Exchange) 2nd
     ICMP (Internet Control Message Protocol)
     IP (Internet Protocol)
    IP (Internet Protocol) addresses
         dynamic IP addresses 2nd
         overview
         static IP addresses 2nd
     LDAP (Lightweight Directory Access Protocol) 2nd
     NAT (network address translation) 2nd
     OPS (Open Profiling Standard) 2nd
     P3P (Platform for Privacy Preferences) 2nd
     PGP (Pretty Good Privacy)
     PPP (Point-to-Point Protocol)
     SLIP (Serial Line Internet Protocol)
     SOAP (Simple Object Access Protocol)
     TCP (Transmission Control Protocol)
     TCP/IP (Transmission Control Protocol/Internet Protocol)
     UDDI (Universal Description, Discovery and Integration)
proxy servers 2nd
public keys
public wireless hot spots
public-key cryptography