W



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

W3C (World Wide Web Consortium) 2nd
Wake on LAN (WOL)
WANs (wide area networks) 2nd
     back doors
     forged email
    LAN
         comparing
         connections
     passwords
     PHY
     preventing attacks
     protocols
     routers
    security
         host computers
         network sniffers
         preventive measures
         spoofing
         training
         Tripwire
         updating
         virus-checking applications
     Trojan horses
     types of attacks
     viruses
WAP
wardriving
WatchGuard SOHO
Web
     archives
     browsers
     pages, saving
Web sites
     ACPI
     Bluetooth
Web-based printers folder
WECA (Wireless Ethernet Compatibility Alliance) 2nd
WEP (Wired Equivalent Privacy) 2nd
WEPCrack
WfM (Wired for Management) 2nd
Wi-Fi [See 802.11b networks, decline of.]
wide area networks [See WANs (wide area networks), LAN, comparing .]
Wildpackets
WILL command
Windows
    2000
         Administration Tools
         auditing policies
         DHCP servers
         directories
         Event Viewer
         groups
        migrating from Novell Netware [See NetWare, decline Windows 2000 migration.]
        MMC [See MMC (Microsoft Management Console), DHCP.]
         name resolution
         printers, adding
         Professional
         Professional Client
         servers
         support
         Telnet
         user groups
         user-level permissions
         WINS
    2000 Server
         ActiveState ActivePerl 5.6
         DFS
         DNS
         Korn Shell command
         NetWare
         passwords
         Telnet
        Unix [See Unix, DNS servers.]
         upgrading
         user name mapping
         Windows 2003 Server upgrade
    2003
         Active Directory
         ActiveState ActivePerl 5.6
         auditing policies
         BOOTP
         DFS
         DNS
         Event Viewer
         groups
         installing
         Korn Shell command
         NetWare
         operating systems
         passwords
         servers
         Telnet 2nd
        Unix [See Unix, NIS.]
         upgrading to
         user name mapping
         WINS
     95
     98
     Components Wizard 2nd
     firewalls
     FTP command-line clients
     integrated Windows authentication
    Internet Naming Service [See WINS (Windows Internet Naming Service), NetBIOS.]
     ipconfig command
     Mobile devices
     netstat command
     NFS
    NT [See NT (Windows), domains, controllers .]
    NT 4.0
         configuring
         Event Viewer
         migrating from Novell Netware
         printers
     permissions
     ping command
    print servers
         adding printers
         printers/printing devices
    Server 2003
         DHCP
         DOS-mode, booting in
         Itanium servers
         upgrading to
         Windows 2000
     SFU
     SOHO
     Vista
    XP
         64-bit support
         DOS-mode, booting in
         network connection repair
         Windows 2000 and
    XP Professional
         auditing
         printing
         VPN connections
         Windows 2003 Server
windows
     backup
     congestion
     offered
     sizes
     sliding
WinDump command
winipcfg command
WINS (Windows Internet Naming Service) 2nd
     configuring
     NetBIOS
    Windows
         2000
         2003 Server
wire-mapping
Wired Equivalent Privacy (WEP) 2nd
Wired for Management (WfM) 2nd
Wired Protected Access [See WPA (Wired Protected Access), Personal certification.]
wireless
    devices
         2.4GHz devices
         PDAs
     Ethernets
     IEEE 802.11
    routers
         APs, comparing
         features of
         integrated Ethernet switches
     topologies
Wireless Equivalent Privacy (WEP) 2nd
Wireless Ethernet Compatibility Alliance (WECA) 2nd
wireless networks
    802.11-based [See 802.11-based networks.]
     ad-hoc networks 2nd
     adapters, installing
     advantages 2nd
     AMA
     APs
     definition
     IEEE 2nd
     interference
     LANs, connecting to
     manual client configuration
     needs, determining
     PANs
     public places/spaces 2nd
     radio wave transmission
    security
         features/standards crossreference
         knowing your users
         neighbors
         overview 2nd
         SSIDs
         WEP
         wired networks, comparing
         WPA [See also WPA (Wired Protected Access), WPA2.]
         WPA2 2nd
     Service Pack 2 wireless network setup wizard
     setup wizard
    SOHO [See SOHO (small offices and home offices), routers.]
     spread-spectrum technologies 2nd
     topologies of
Wireless-B [See also 802.11b networks, decline of.]
Wireless-G broadband router installation
     LAN connections
     PCs, configuring 2nd
     properties sheet tabs
     saving configurations
     wireless access ports, configuring
wiring
     drawings
     records
     reports
     structured
         backbone cabling system
         horizontal cabling system
         work area specification
     terminologies
         ACR
         attenuation 2nd
         bandwidth 2nd
         characteristic impedance
         cross-talk
         dialectic
         electromagnetic field
         EMI
         FEXT 2nd
         frequency 2nd
         full-duplex communication
         half-duplex communication
         impedance
         leakage
         minimal velocity of propagation
         NEXT 2nd
         Power SUM
         radio frequencies
         shields
         TDR 2nd
     twisted-pair 2nd
     work orders
wizards
     Add Printer 2nd
     Administration Tools Setup
     Installation
     Windows Components 2nd
WMM certification
WOL (Wake on LAN)
WON'T command
word processors
WordPerfect Office X3
work area specifications
work patterns, assessing
workgroups (Windows NT)
     domains
         controllers
         models
     replication between domain controllers
     trust relationships
workstations
     backbones
     backups
     BOOTP
         client/server exchanges (DHCP)
         DHCP
         downloading operating systems
         options fields
         packet formats
         request/reply mechanisms
     Gigabit Ethernets
     limiting
     NIC
World Wide Web Consortium (W3C) 2nd
WPA (Wired Protected Access)
     Enterprise certification
     overview
     Personal
     Personal certification
     Pre-Shared Key with TKIP
     RADIUS
     vulnerabilities, overcoming
     WEP
     WPA2 2nd
WPA2
     Enterprise certification
     Personal
     Personal certification
WRITE command




Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net