[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] sales 2nd Samba 2nd configuring 2nd 3rd SWAT (Samba Web Administration Tool) 2nd 3rd 4th 5th 6th 7th Web site Samba Web Administration Tool (SWAT) 2nd 3rd 4th 5th 6th 7th Sams Teach Yourself .NET XML Web Services in 24 Hours Sams Teach Yourself Microsoft Office 2003 in 24 Hours Sams Teach Yourself Microsoft Windows Server 2003 in 24 Hours 2nd 3rd Sams Teach Yourself Samba in 24 Hours Sams Teach Yourself Windows Server 2003 in 24 Hours SANS Web site SAP (Service Advertising Protocol) SAPs (service access points) scalable networks SCL (server connection license) SCSI (Small Computer System Interface) drives 2nd SDRAM (Synchronous Dynamic RAM) secondary zones sectors (hard drives) Secure Electronic Transaction (SET) Secure HTTP (SHTTP) Secure Socket Layer (SSL) security 2nd access permissions attacks denial-of-service attacks eavesdropping IP address spoofing man-in-the-middle attacks password attacks protecting against 2nd backups [See backups ] CHAP (Challenge Handshake Authentication Protocol) crackers cryptography firewalls 2nd 3rd 4th 5th 6th 7th application-gateway firewalls circuit-level firewalls manufacturers packet filter firewalls proxy server capabilities Shields Up Web site 2nd software-only firewalls 2nd ZoneAlarm groups 2nd importance of 2nd Internet IP networks local networks NTFS permissions assigning file permissions 2nd folder permissions 2nd guidelines 2nd online transaction security 2nd PAP (Password Authentication Protocol) passwords 2nd 3rd 4th assigning 2nd guidelines 2nd 3rd strong passwords peer-to-peer networks 2nd SET (Secure Electronic Transaction) share permissions 2nd 3rd 4th 5th 6th 7th share-level security SHTTP (Secure HTTP) SSL (Secure Socket Layer) Trojan horses 2nd user accounts access tokens concurrent connections creating 2nd disabling logon hours passwords 2nd 3rd 4th remote connections usernames 2nd user authentication viruses 2nd 3rd boot sector viruses Brain virus defined F-Secure Web site file viruses macro viruses 2nd multipartite viruses PE_LOVGATE.J virus protecting against 2nd 3rd SANS Web site Web servers Windows Server 2003 2nd 3rd 4th worms WORM_KWBOT.C worm Security Log segmenting packets Select a Zone Type dialog box Select Network Component Type dialog box 2nd 3rd 4th 5th selecting [See choosing] connection types 2nd 3rd ISPs 2nd 3rd Sequenced Packet Exchange (SPX) Serial Line Internet Protocol (SLIP) serial ports serial transmission server connection license (SCL) Server Health Log Server Message Block (SMB) server-based networks 2nd 3rd [See also LANs] Active Directory advantages 2nd 3rd cost 2nd disadvantages 2nd managing 2nd navigating requirements servers servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th AnalogX Proxy Server 2nd 3rd application servers client/server databases 2nd communication servers configuration 2nd 3rd 4th defined DHCP (Dynamic Host Configuration Protocol) configuring 2nd 3rd 4th 5th 6th DNS servers 2nd 3rd file servers FTP (File Transfer Protocol) 2nd 3rd hardware configuration 2nd Lotus Domino Server Microsoft Exchange Server 2nd administration 2nd Outlook client 2nd 3rd names friendly names naming peer-to-peer networks print servers proxy servers 2nd 3rd 4th firewalls RAS (Remote Access Services) servers 2nd 3rd server configuration 2nd 3rd tunneling remote access servers SharePoint Portal Server 2nd 3rd 4th SQL Server tape backup units tunnel servers 2nd Web servers 2nd 3rd 4th hardware managing NetWare Enterprise running security Windows Server 2003 Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th communications servers configuration 2nd domain controllers file servers 2nd folder shares 2nd 3rd 4th 5th Group Policy snap-in 2nd 3rd 4th installation 2nd 3rd 4th 5th 6th 7th 8th 9th Microsoft Networking model 2nd 3rd NTFS permissions 2nd 3rd 4th 5th 6th 7th print servers printer sharing 2nd 3rd 4th remote access servers security 2nd 3rd 4th shared Internet connections 2nd Web servers Web site WINS (Windows Internet Naming Service) 2nd Service (SRV) resource records service access points (SAPs) Service Advertising Protocol (SAP) services DNS (Domain Name System) 2nd forward lookup zones how it works 2nd namespaces 2nd 3rd resource records 2nd reverse lookup zones root domains server configuration 2nd 3rd 4th top-level domains 2nd eDirectory 2nd defined 2nd 3rd NDS (Novell Directory Services) RAS (Remote Access Services) 2nd 3rd client configuration 2nd 3rd server configuration 2nd 3rd tunneling Red Hat Linux network services 2nd 3rd 4th 5th Web hosting services 2nd 3rd WINS (Windows Internet Naming Service) 2nd Session layer (OSI model) 2nd 3rd SET (Secure Electronic Transaction) Shadow Copy share level security share permissions 2nd 3rd 4th shared resources 2nd browsing 2nd 3rd 4th printers 2nd 3rd SharePoint Portal Server 2nd 3rd 4th shares 2nd creating 2nd permissions 2nd 3rd 4th 5th 6th 7th sharing applications applications with SharePoint Portal Server 2nd 3rd 4th databases 2nd directories 2nd files peer-to-peer networks 2nd 3rd 4th 5th 6th 7th folders 2nd 3rd 4th 5th 6th 7th hardware Internet connections 2nd IP addressing 2nd 3rd NAT (Network Address Translation) 2nd 3rd 4th proxy servers 2nd 3rd required hardware Windows Server 2003 2nd printers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th peer-to-peer networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th workspaces 2nd 3rd 4th Sharing tab (Properties dialog box) 2nd Shields Up Web site 2nd SHTTP (Secure HTTP) signals baseband signals broadband signals SIMMs (Single Inline Memory Modules) Simple Mail Transport Protocol (SMTP) 2nd 3rd simplex communication Single Inline Memory Modules (SIMMs) sites [See Web sites] Sites and Services snap-in (Active Directory) size peer-to-peer networks 2nd 3rd slash (/) SLIP (Serial Line Internet Protocol) 2nd Small Computer System Interface (SCSI) drives 2nd SMB (Server Message Block) smb.conf file SMTP (Simple Mail Transport Protocol) 2nd 3rd snap-ins Active Directory Domains and Trusts Active Directory Sites and Services Active Directory Users and Computers Group Policy snap-in 2nd 3rd 4th Licensing snap-in SnapServer sneakernet Sniffer Technologies sniffers 2nd sniffing snooping SOA (Start of Authority) resource records software [See applications] network client software 2nd NOS (network operating system) client configuration 2nd defined 2nd installing 2nd 3rd 4th licensing 2nd 3rd 4th network client software 2nd network printing 2nd 3rd network shares 2nd protocols 2nd 3rd redirectors 2nd server configuration 2nd 3rd 4th peer-to-peer networks redirectors 2nd software piracy software-only firewalls 2nd Trojan horses 2nd viruses 2nd 3rd boot sector viruses Brain virus defined F-Secure Web site file viruses macro viruses 2nd multipartite viruses PE_LOVGATE.J virus protecting against 2nd 3rd SANS Web site worms WORM_KWBOT.C worm Software & Information Industry Association software piracy software-only firewalls 2nd SONET (Synchronous Optical Network/Synchronous Digital Hierarchy) SpartaCom, Inc Artisoft Special Edition Using HTML and XHTML Special Edition Using TCP/IP specifications IEEE Ethernet 2nd speed data transmission speed disk speed modems Token-Ring SPX (Sequenced Packet Exchange) SQL (Structured Query Language) SQL Server SRV (Service) resource records SSL (Secure Socket Layer) star topology 2nd 3rd Start of Authority (SOA) resource records static addresses static IP addresses statistics (Network Monitor) 2nd 3rd storage hard drives [See hard drives] NAS (network attached storage) storage pools creating 2nd 3rd 4th defined strategy backups 2nd 3rd 4th 5th striping disks 2nd 3rd 4th strong passwords Structured Query Language (SQL) subnet masks IP addresses 2nd 3rd subnets 2nd subnetting borrowing bits 2nd Class B networks 2nd 3rd 4th host addresses 2nd host ranges 2nd suite applications SuperStack 3 firewall surge protection SWAT (Samba Web Administration Tool) 2nd 3rd 4th 5th 6th 7th switched networks 2nd 3rd circuit switching 2nd defined DSL (Digital Subscriber Line) 2nd 3rd 4th 5th ISDN 2nd 3rd defined packet switching 2nd ATM (Asynchronous Transfer Mode) 2nd 3rd Frame Relay 2nd history and development switches 2nd 3rd IMPs (Interface Message Processors) synchronizing applications PDAs (Personal Digital Assistants) with PCs 2nd Synchronous Dynamic RAM (SDRAM) synchronous modems 2nd Synchronous Optical Network/Synchronous Digital Hierarchy (SONET) SYS$LOG.ERR file System Log system logs System Monitor |