Index S

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

sales   2nd  
Samba   2nd  
       configuring   2nd   3rd  
       SWAT (Samba Web Administration Tool)   2nd   3rd   4th   5th   6th   7th  
       Web site  
Samba Web Administration Tool (SWAT)   2nd   3rd   4th   5th   6th   7th  
Sams Teach Yourself .NET XML Web Services in 24 Hours  
Sams Teach Yourself Microsoft Office 2003 in 24 Hours  
Sams Teach Yourself Microsoft Windows Server 2003 in 24 Hours   2nd   3rd  
Sams Teach Yourself Samba in 24 Hours  
Sams Teach Yourself Windows Server 2003 in 24 Hours  
SANS Web site  
SAP (Service Advertising Protocol)  
SAPs (service access points)  
scalable networks  
SCL (server connection license)  
SCSI (Small Computer System Interface) drives   2nd  
SDRAM (Synchronous Dynamic RAM)  
secondary zones  
sectors (hard drives)  
Secure Electronic Transaction (SET)  
Secure HTTP (SHTTP)  
Secure Socket Layer (SSL)  
security   2nd  
       access permissions  
       attacks  
               denial-of-service attacks  
               eavesdropping  
               IP address spoofing  
               man-in-the-middle attacks  
               password attacks  
               protecting against   2nd  
       backups   [See backups ]
       CHAP (Challenge Handshake Authentication Protocol)  
       crackers  
       cryptography  
       firewalls   2nd   3rd   4th   5th   6th   7th  
               application-gateway firewalls  
                circuit-level firewalls  
               manufacturers  
               packet filter firewalls  
               proxy server capabilities  
               Shields Up Web site   2nd  
                software-only firewalls   2nd  
               ZoneAlarm  
       groups   2nd  
       importance of   2nd  
       Internet  
       IP networks  
       local  
       networks  
       NTFS permissions
               assigning  
               file permissions   2nd  
               folder permissions   2nd  
               guidelines   2nd  
       online transaction security   2nd  
       PAP (Password Authentication Protocol)  
       passwords   2nd   3rd   4th  
               assigning   2nd  
               guidelines   2nd   3rd  
               strong passwords  
       peer-to-peer networks   2nd  
       SET (Secure Electronic Transaction)  
       share permissions   2nd   3rd   4th   5th   6th   7th  
       share-level security  
       SHTTP (Secure HTTP)  
       SSL (Secure Socket Layer)  
       Trojan horses   2nd  
        user accounts  
               access tokens  
               concurrent connections  
               creating   2nd  
               disabling  
               logon hours  
               passwords   2nd   3rd   4th  
               remote connections  
               usernames   2nd  
       user authentication  
       viruses   2nd   3rd  
               boot sector viruses  
               Brain virus  
               defined  
               F-Secure Web site  
               file viruses  
               macro viruses   2nd  
               multipartite viruses  
               PE_LOVGATE.J virus  
               protecting against   2nd   3rd  
               SANS Web site  
       Web servers  
       Windows Server 2003   2nd   3rd   4th  
       worms  
               WORM_KWBOT.C worm  
Security Log  
segmenting
       packets  
Select a Zone Type dialog box  
Select Network Component Type dialog box   2nd   3rd   4th   5th  
selecting   [See choosing]
       connection types   2nd   3rd  
       ISPs   2nd   3rd  
Sequenced Packet Exchange (SPX)  
Serial Line Internet Protocol (SLIP)  
serial ports  
serial transmission  
server connection license (SCL)  
Server Health Log  
Server Message Block (SMB)  
server-based networks   2nd   3rd   [See also LANs]
       Active Directory  
       advantages   2nd   3rd  
       cost   2nd  
       disadvantages   2nd  
       managing   2nd  
       navigating  
       requirements  
       servers  
servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       AnalogX Proxy Server   2nd   3rd  
       application servers  
       client/server databases   2nd  
       communication servers  
       configuration   2nd   3rd   4th  
       defined  
       DHCP (Dynamic Host Configuration Protocol)
               configuring   2nd   3rd   4th   5th   6th  
       DNS servers   2nd   3rd  
       file servers  
       FTP (File Transfer Protocol)   2nd   3rd  
       hardware configuration   2nd  
       Lotus Domino Server  
       Microsoft Exchange Server   2nd  
               administration   2nd  
               Outlook client   2nd   3rd  
        names
               friendly names  
       naming  
       peer-to-peer networks  
       print servers  
       proxy servers   2nd   3rd   4th  
               firewalls  
       RAS (Remote Access Services) servers   2nd   3rd  
               server configuration   2nd   3rd  
               tunneling  
       remote access servers  
       SharePoint Portal Server   2nd   3rd   4th  
       SQL Server  
       tape backup units  
       tunnel servers   2nd  
       Web servers   2nd   3rd   4th  
               hardware  
               managing  
               NetWare Enterprise  
               running  
               security  
       Windows Server 2003
               Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               communications servers  
               configuration   2nd  
               domain controllers  
               file servers   2nd  
               folder shares   2nd   3rd   4th   5th  
                Group Policy snap-in   2nd   3rd   4th  
               installation   2nd   3rd   4th   5th   6th   7th   8th   9th  
               Microsoft Networking model   2nd   3rd  
               NTFS permissions   2nd   3rd   4th   5th   6th   7th  
               print servers  
               printer sharing   2nd   3rd   4th  
               remote access servers  
               security   2nd   3rd   4th  
               shared Internet connections   2nd  
               Web servers  
               Web site  
       WINS (Windows Internet Naming Service)   2nd  
Service (SRV) resource records  
service access points (SAPs)  
Service Advertising Protocol (SAP)  
services  
       DNS (Domain Name System)   2nd  
               forward lookup zones  
               how it works   2nd  
               namespaces   2nd   3rd  
               resource records   2nd  
               reverse lookup zones  
               root domains  
               server configuration   2nd   3rd   4th  
               top-level domains   2nd  
       eDirectory   2nd  
               defined   2nd   3rd  
       NDS (Novell Directory Services)  
       RAS (Remote Access Services)   2nd   3rd  
               client configuration   2nd   3rd  
               server configuration   2nd   3rd  
               tunneling  
       Red Hat Linux network services   2nd   3rd   4th   5th  
       Web hosting services   2nd   3rd  
       WINS (Windows Internet Naming Service)   2nd  
Session layer (OSI model)   2nd   3rd  
SET (Secure Electronic Transaction)  
Shadow Copy  
share level security  
share permissions   2nd   3rd   4th  
shared resources   2nd  
       browsing   2nd   3rd   4th  
       printers   2nd   3rd  
SharePoint Portal Server   2nd   3rd   4th  
shares   2nd  
       creating   2nd  
       permissions   2nd   3rd   4th   5th   6th   7th  
sharing
       applications  
       applications with SharePoint Portal Server   2nd   3rd   4th  
       databases   2nd  
       directories   2nd  
       files  
               peer-to-peer networks   2nd   3rd   4th   5th   6th   7th  
       folders   2nd   3rd   4th   5th   6th   7th  
       hardware  
       Internet connections   2nd  
               IP addressing   2nd   3rd  
               NAT (Network Address Translation)   2nd   3rd   4th  
               proxy servers   2nd   3rd  
               required hardware  
               Windows Server 2003   2nd  
       printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
               peer-to-peer networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
       workspaces   2nd   3rd   4th  
Sharing tab (Properties dialog box)   2nd  
Shields Up Web site   2nd  
SHTTP (Secure HTTP)  
signals
       baseband signals  
       broadband signals  
SIMMs (Single Inline Memory Modules)  
Simple Mail Transport Protocol (SMTP)   2nd   3rd  
simplex communication  
Single Inline Memory Modules (SIMMs)  
sites   [See Web sites]
Sites and Services snap-in (Active Directory)  
size
       peer-to-peer networks   2nd   3rd  
slash (/)  
SLIP (Serial Line Internet Protocol)   2nd  
Small Computer System Interface (SCSI) drives   2nd  
SMB (Server Message Block)  
smb.conf file  
SMTP (Simple Mail Transport Protocol)   2nd   3rd  
snap-ins
       Active Directory Domains and Trusts  
       Active Directory Sites and Services  
       Active Directory Users and Computers  
       Group Policy snap-in   2nd   3rd   4th  
       Licensing snap-in  
SnapServer  
sneakernet  
Sniffer Technologies  
sniffers   2nd  
sniffing  
snooping  
SOA (Start of Authority) resource records  
software   [See applications]
       network client software   2nd  
       NOS (network operating system)
               client configuration   2nd  
               defined   2nd  
               installing   2nd   3rd   4th  
               licensing   2nd   3rd   4th  
               network client software   2nd  
               network printing   2nd   3rd  
               network shares   2nd  
               protocols   2nd   3rd  
               redirectors   2nd  
               server configuration   2nd   3rd   4th  
       peer-to-peer networks  
       redirectors   2nd  
       software piracy  
       software-only firewalls   2nd  
       Trojan horses   2nd  
       viruses   2nd   3rd  
               boot sector viruses  
               Brain virus  
               defined  
               F-Secure Web site  
               file viruses  
               macro viruses   2nd  
               multipartite viruses  
               PE_LOVGATE.J virus  
               protecting against   2nd   3rd  
               SANS Web site  
       worms  
               WORM_KWBOT.C worm  
Software & Information Industry Association  
software piracy  
software-only firewalls   2nd  
SONET (Synchronous Optical Network/Synchronous Digital Hierarchy)  
SpartaCom, Inc
       Artisoft  
Special Edition Using HTML and XHTML  
Special Edition Using TCP/IP  
specifications
       IEEE
               Ethernet   2nd  
speed
       data transmission speed  
       disk speed  
       modems  
       Token-Ring  
SPX (Sequenced Packet Exchange)  
SQL (Structured Query Language)  
SQL Server  
SRV (Service) resource records  
SSL (Secure Socket Layer)  
star topology   2nd   3rd  
Start of Authority (SOA) resource records  
static addresses  
static IP addresses  
statistics (Network Monitor)   2nd   3rd  
storage
       hard drives   [See hard drives]
       NAS (network attached storage)  
storage pools
       creating   2nd   3rd   4th  
       defined  
strategy
       backups   2nd   3rd   4th   5th  
striping disks   2nd   3rd   4th  
strong passwords  
Structured Query Language (SQL)  
subnet masks
       IP addresses   2nd   3rd  
subnets   2nd  
subnetting  
        borrowing bits   2nd  
       Class B networks   2nd   3rd   4th  
       host addresses   2nd  
       host ranges   2nd  
suite applications  
SuperStack 3 firewall  
surge protection  
SWAT (Samba Web Administration Tool)   2nd   3rd   4th   5th   6th   7th  
switched networks   2nd   3rd  
       circuit switching   2nd  
               defined  
               DSL (Digital Subscriber Line)   2nd   3rd   4th   5th  
               ISDN   2nd   3rd  
       defined  
       packet switching   2nd  
               ATM (Asynchronous Transfer Mode)   2nd   3rd  
               Frame Relay   2nd  
               history and development  
switches   2nd   3rd  
       IMPs (Interface Message Processors)  
synchronizing
       applications  
       PDAs (Personal Digital Assistants) with PCs   2nd  
Synchronous Dynamic RAM (SDRAM)  
synchronous modems   2nd  
Synchronous Optical Network/Synchronous Digital Hierarchy (SONET)  
SYS$LOG.ERR file  
System Log  
system logs  
System Monitor  



Absolute Beginner's Guide to Networking
Absolute Beginners Guide to Networking (4th Edition)
ISBN: 0789729113
EAN: 2147483647
Year: 2002
Pages: 188
Authors: Joe Habraken

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net