A



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

AAL (ATM Adaption Layer)
AC (alternating current)
AC/DC converters
Academic Source Release (ASR)
Accelerated Graphics Port (AGP)
acceptable use statements
access
     Anonymous Access
     Arbitrated Loops
     CSMA/CD
     databases
     dial-in
     LDAP
     Linux
     methods
     NBMA
    networks, controlling
         auditing
         identifying users
         resource protections
     NTFS 2nd
     R-utilities
     share-level permissions
     shared network media
     SMB
     Unix
    users
         limiting time
         permissions
     VPN
     Web-based printers folders
    Windows NT
         adding users to groups
         assigning group memberships
         built-in user groups
         creating user groups
         groups
         managing user accounts
     workstations
Access Code field
Access Control Lists (ACLs) 2nd
access control mechanisms (network security)
     auditing
     resource protections
     users, identifying
access points [See APs (Access Points), adding to wired networks.]
Account Information dialog box
Account Policy dialog box
accounts
     Account Information dialog box
     computers, managing
     generic
     interdomain trust relationships
     lockouts
     time, limiting
     tracking
    users
         complete trust models
         managing 2nd
         searching
         Unix
     Windows NT
     workstations
ACK (acknowledgement) packets
ACL (Asynchronous Connection-Less)
ACLs (Access Control Lists) 2nd
ACPI (Advanced Configuration and Power Interface) 2nd
ACR (attenuation to cross talk ratio)
acronyms
ACT (Access Control Commands)
Action menu
     Event Viewer
     MMC 2nd 3rd
     WINS
Active Directory 2nd
     ADSI
         directory-aware application programming
         member servers
     application
     attributes
     directory services
     DNS
     domain models
     global catalog
     groups
     managing
    migration
         BDCs, upgrading
         implementing
         joining trees
         master domain model
         PDCs, upgrading
     objects 2nd
         searching
         standard
     partitioning
     replicating
     schema 2nd
     services
     sites
     standards
     trees
     Windows 2003 Server
Active Directory Computers and Users snap-in
Active Directory Migration Tool (ADMT)
Active Directory Service Interface (ADSI) 2nd
Active Directory Users and Computers command (Start menu)
active mode
active monitor
active open connections
ActiveState ActivePerl 5.8
ad hoc networks 2nd
ad hoc wireless networks 2nd
ad-hoc mode (wireless network adapters)
adapters
     cards
     installing
     networks, troubleshooting
     PCMCIA
Add Button dialog box
Add Printer dialog box
Add Printer Wizard 2nd
Add Server dialog box
Add Standalone Snap-in dialog box
Add Trusted Domains dialog box
Add Users and Groups dialog box 2nd
Add/Remove Snap-in dialog box
adding
     Active Directory schema
     computers
     labels
     links, DFS roots
     objects, databases
    printers
         Windows 2000
         Windows NT 4.0
     servers
     stacks
     users
Address field
Address Resolution Protocol (ARP) 2nd
addresses
     APIPA
     base I/O ports
     broadcast
     destination 2nd
     IP
         ARP
         cable modems
         Class A
         Class B
         Class C
         Class D
         Class E
         datagram headers
         filtering
         proxy ARP
         RARP
         spoofing
         subnetting
         supernetting
     MAC 2nd 3rd
     mulitcast
     Option classes
     protocols
     reserving
     reusing
     routers
    scope
         configuring
         creating
     spaces
     unicast
-adduser command (Unix)
administration
     Active Directory 2nd
     centralized management
     complete trust models
     decentralized management
     directories
    domains
         controllers
         interdomain trust relationships
         models
         replication between controllers
         trust relationships, creating
         Windows NT
     groups
         adding users
         assigning group memberships
         built-in user groups
         creating user groups
     IEEE 802.1
     installation
    printers
         Windows 2000
         Windows NT 2nd
     rights, delegating
    routers
         delegating LAN responsibilities
         LAN sizes
     switches
     tools, installing
    users
         accounts
         Unix 2nd
     Web-based printers folders
     WINS
         Action menu
         netsh commands
         Windows 2000
         Windows 2003 Server
     wiring
ADMT (Active Directory Migration Tool)
Adobe Reader
ADSI (Active Directory Service Interfaces) 2nd
ADSL (Asynchronous Digital Subscriber Line)
Advanced Audio/Video Remote Control Profile (AVRCP)
Advanced Configuration and Power Interface (ACPI) 2nd
Advanced Power Management (APM)
aero domain
AES (Advanced Encryption Standard) 2nd
agents
     proxy
     relay 2nd
AGP (Accelerated Graphics Port)
AH (Authentication Header)
AirSnort
alarms 2nd
alerts (Unix)
algorithms
     backoff
     congestion avoidance
     Dijkstra
     OSPF
     SHA
     Truncated Binary Exponential Backoff Algorithm
allowing dial-in access
ALOHA project
ALOHAnet
alternate migration plans
alternation current (AC)
ALWIL software
AMA (Open Mobile Alliance)
American National Standards Institute (ANSI) 2nd
American Power Conversion Corp (APC)
American Standard Code for Information Interchange [See ASCII (American Standard Code for Information Interchange).]
analog modems
analyzers
     baselines
     networks
     printing statistics
    protocols
         decoding
         filtering
         hardware
         software
Anixter
Anonymous Access
ANSI (American National Standards Institute) 2nd
Antheil, George
anti-virus
     applications
     tips
Anycasts
APC (American Power Conversion Corp)
API (application programming interface)
APIPA (Automatic Private IP Addressing) 2nd
APM (Advanced Power Management)
Application Compatibility Toolkit
application gateways 2nd 3rd 4th
Application layer
application programming interface (API)
application-specific integrated chips (ASICS) 2nd
applications [See also utilities, R-utilities.]
     10BASE-2 networks
     Active Directory
     ADSI
     assessing
     backing up
     Cisco
     competing products
     corporate standards
     deleting
     drivers
     firewalls
     FTP
         commands
         data transfers
         ports/processes
         Red Hat Linux
         replies
         TFTP
         Windows command-line clients
     gateways
     HP
     IBM
     IP addresses
     Juniper Networks, Inc.
     legacy
     manufacturers
     Microsoft
     NetWare and Unix/Linux integration 2nd
     network sniffers
    office
         CrossOver Office
         Microsoft Office Student and Teacher Edition 2003
         OpenOffice.org 2nd
         selecting
         StarOffice
         StarOffice 8 Suite
         WordPerfect Office X3
     print servers
     proxy
     Red Hat
     Samba.org
     security
     TCP/IP
     Telnet
         commands
         NVT
     Tripwire
     Trojan horses
     upgrading
     vertical-market
     virus-checking
     viruses
applying
     NAS
     routers 2nd
     SANs
     Start/Search method
     switches
     Windows
         2000/2003 Event Viewer
         NT 4.0 Event Viewer
     WINS
APs (Access Points)
     10/100 Ethernet switches
     802.11b networks
     ad-hoc networks, compared
     adding to wired networks
     alternatives
     bandwidth in the real world
     bottlenecks, diminishing
     CDs, configuring
     DHCP servers
     dual-mode Access Points
     firewalls
     limitations
     locations, choosing
     Network Address Translation
     rogue Access Points
     small wireless networks, creating
     types
     virtual private networks
     wireless routers, compared
    Wireless-G broadband router installation [See Wireless-G broadband router installation, PCs, configuring.]
Arbitrated Loops 2nd
architecture
     ATN
     IEEE 802
     IEEE 802.1
     IEEE 802.10
     IEEE 802.11
     IEEE 802.2
     IEEE 802.3
     IEEE 802.4
     IEEE 802.5
     IEEE 802.7
     SCSI
ARCnet
ARP (Address Resolution Protocol) 2nd
arp command
ARPANET
arranging domains
Artisoft LANtastic
ASCII (American Standard Code for Information Interchange)
     Telnet NVT
     transfers
ASICS (application-specific integrated chips) 2nd
ASR (Academic Source Release)
Asset Management component
assigning
     group memberships
     users
asymmetric encryption
Asynchronous Connection-Less (ACL)
Asynchronous Digital Subscriber Line (ADSL)
Atheros Super G
ATM (Asynchronous Transfer Mode) 2nd
     architecture
     connections
     Frame Relay
     frames
     IP over
     LAN emulation
     service categories
ATM Adaption Layer (AAL)
ATRN command
attacks
     denial of service 2nd 3rd
     digital certificates
     forged email
     ICMP redirects
     Ping of Death
    WANs
         back doors
         forged email
         passwords
         preventing
         Trojan horses
         types of attacks
         viruses
attenuation 2nd
     fiber-optic cables
     testing
attenuation to cross talk ratio (ACR)
attributes
     Active Directory
     property set
     selected
     User Account object
Audio/Video Remote Control Profile
Audit Policy dialog box
auditing
     enabling
     Linux
     NetWare 6
     networks
     reports
     Unix
    Windows
         2000/2003
         NT 4.0
         XP Professional
Auditing Entry dialog box
AUTH command
authenticated commands
authentication
     basic authentication
     digest
     domain controllers 2nd
     encrypted
     integrated Windows
     LDAP
     pass-through
     Telnet
     Unix/Linux compared to NetWare
Authentication Header (AH)
authorization
     delegating for network security
     DHCP
     R-utilities
     share-level permissions
     user-level permissions
AUTHORIZATION state
Automatic Private IP Addressing (APIPA)
automount command
autonomous systems (RIP)
     router updates
     scalability
     version 2
autosensing
AVCP (Audio/Video Remote Control Profile)
AVRCP (Advanced Audio/Video Remote Control Profile)




Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net