[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] SA (security association) SAE (stochastic arbitration event) safety fiber- optic cables SAM domains controllers 2nd 3rd models 2nd 3rd 4th 5th 6th 7th 8th replication between controllers 2nd 3rd 4th User Manager utility 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th SAM (security accounts manager) domains 2nd 3rd 4th Samba 2nd 3rd SAMBA 2nd Samba.org SAML command sampling intervals SAN (Storage Area Network) 2nd SANs Arbitrated Loops 2nd 3rd 4th 5th 6th 7th 8th 9th fabric switched topology 2nd 3rd 4th 5th Fibre Channel 2nd 3rd 4th IP 2nd 3rd mixed topologies 2nd 3rd 4th selecting 2nd 3rd 4th SANs (Storage Area Networks) SAP (Service Advertising Protocol) 2nd SAPs (Service Access Points) SAR (Segmentation and Reassembly) saving applications SOHO networks 2nd SC (Source Code) scalability Active Directory 2nd campus networks 2nd multi-tiered networks 2nd RIP (Routing Information Protocol) 2nd scams 2nd scatternets 2nd Bluetooth 2nd 3rd 4th 5th scavenging databases schedules backups 2nd rotation scheduling downtime schema Active Directory 2nd 3rd 4th 5th 6th 7th executing 2nd 3rd 4th 5th 6th master modifying 2nd 3rd 4th 5th 6th 7th 8th 9th X.500 schemes Manchester encoding SCO (Synchronous Connection-Oriented) 2nd 3rd scope addresses configuring 2nd 3rd 4th creating 2nd 3rd 4th 5th groups selecting 2nd 3rd screened host architecture SCSI 2nd NAS 2nd capacity 2nd 3rd 4th network appliances 2nd protocols 2nd SANs 2nd 3rd 4th applying NAS 2nd Arbitrated Loops 2nd 3rd 4th 5th 6th 7th 8th 9th fabric switched topology 2nd 3rd 4th 5th Fibre Channel 2nd 3rd 4th IP 2nd 3rd mixed topologies 2nd 3rd 4th SCSI (Small Computer Systems Interface) SD (Start Delimiter ) SD (start delimiter) SDP (Service Discovery Protocol) SDSL (Single-line Digital Subscriber Line) 2nd searching Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th databases 2nd information NIC printers 2nd user accounts 2nd 3rd secondary servers 2nd 3rd 4th 5th 6th 7th 8th 9th Secure Hash Algorithm (SHA) Secure Shell (SSH) utilities 2nd Secure Shell utilities. [See SSH utilities] security 802.11b networking 2nd 3rd 4th access control mechanisms auditing 2nd identifying users 2nd 3rd 4th 5th 6th 7th 8th 9th 10th resource protections Bindery 2nd comparing NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th Services 2nd 3rd 4th 5th Bluetooth 2nd CERT/CC CIAC delegating authority specialized servers 2nd user accounts 2nd disabling default options 2nd encryption digital certificates 2nd 3rd 4th 5th 6th 7th 8th PGP (Pretty Good Privacy) 2nd 3rd privacy 2nd 3rd public key encryption 2nd 3rd 4th RSA public key encryption 2nd single-key encryption 2nd 3rd 4th SSL handshakes 2nd types of 2nd equivalence NetWare 2nd 3rd Ethernets fiber-optic cables firewalls 2nd 3rd 4th 5th 6th 7th executing 2nd 3rd 4th filtering IP addresses 2nd FWTK hardware 2nd 3rd 4th hybrids 2nd 3rd 4th Intrusion Detection 2nd NAT (Network Address Translation) 2nd 3rd 4th 5th packet filters 2nd port number filtering 2nd 3rd 4th protocol filtering 2nd 3rd proxy applications 2nd 3rd 4th proxy servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th software 2nd 3rd SOHO 2nd troubleshooting 2nd FIRST FTP 2nd HomeRF technology IEEE 802.10 interdomain trust relationships 2nd 3rd 4th creating 2nd 3rd 4th 5th levels of 2nd Linux 2nd 3rd 4th 5th 6th 7th 8th 9th modes NAT (Netwaork Address Translation routers NetWare comparing NDS/file system rights Everyone group 2nd file system rights 2nd inheritance of rights 2nd 3rd 4th login 2nd 3rd object/property rights 2nd 3rd 4th permissions 2nd trustees networks 2nd Novell AUDITCON/SYSCON utilites 2nd 3rd 4th 5th 6th NTBugTraq 2nd OpenSSL passwords managing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th permissions cumulative effect of NTFS 2nd physical measures disposing of hardware and media 2nd locking the door 2nd UPS (Uninterruptable Power Supply) 2nd piracy policies 2nd acceptable use statements 2nd 3rd 4th 5th elements to include 2nd 3rd guidelines for usage 2nd Network Connection Policy 2nd policies and procedures elements to include procedures escalation procedures 2nd 3rd proxy servers 2nd routers 2nd services and system daemons 2nd share-level permissions 2nd Windows 95/98 2nd Windows NT SMB (Server Message Block) 2nd 3rd SSL Symantec Security Response TCP (Transmission Control Protocol) sessions 2nd Telnet 2nd Unix 2nd 3rd 4th 5th 6th 7th 8th 9th user-level permissions 2nd Windows NT/2000 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th viruses 2nd 3rd VPN (virtual private network) 2nd protocols 2nd protocols;AH 2nd 3rd protocols;ESP 2nd 3rd 4th protocols;IKE 2nd protocols;IPSec 2nd protocols;L2TP 2nd 3rd 4th 5th 6th protocols;PPTP 2nd 3rd RAS (Remote Access Service) 2nd 3rd WAN host computers 2nd network sniffers preventive measures 2nd 3rd routers 2nd spoofing 2nd training 2nd Tripwire 2nd 3rd updating 2nd virus-checking applications WANs (wide area networks) 2nd back doors 2nd forged e-mail 2nd passwords 2nd preventing attacks 2nd 3rd Trojan horses 2nd types of attacks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th viruses 2nd 3rd 4th 5th wireless WEP 2nd 3rd 4th 5th WPA 2nd wireless networking LAN 2nd 3rd security accounts manager (SAM) domains 2nd 3rd 4th security association (SA) Security Equivalance 2nd Security Parameters Index (SPI) security policies segmentation collison Domains 2nd Segmentation and Reassembly (SAR) segmenting cable segement length 2nd segments 2nd LAN 2nd 3rd reasons to segment network users 2nd remote locations 2nd routers 2nd 3rd 4th 5th switches 2nd 3rd networks routers 2nd 3rd 4th 5th switches 2nd 3rd Select Network Component Type dialog box Select Network Protocol dialog box Select Network Service dialog box selected attributes selecting access points wireless netowrking 2nd 3rd 4th cables directories 2nd drivers Windows NT 2nd groups scope 2nd 3rd Hardware bus types 2nd 3rd 4th 5th 6th 7th 8th 9th NAS or SANs 2nd 3rd 4th ports Windows NT 2nd routers 2nd Wi-Fi 2nd wireless networks 2nd wireless protocols 2nd selection protocols 2nd selectors creating SEND command Sender-SMTP sending messages ARCnet 2nd 3rd separating logical and physical topologies Sequenced Packet Exchange (SPX) Sequenced Packet Exchange. [See SPX] serial connections Fibre Channel 2nd 3rd 4th Serial Line Internet Protocol (SLIP) 2nd 3rd 4th 5th 6th 7th Serial Port profile serial port profile group Server 2003 DHCP authorizing 2nd 3rd installing 2nd MMC Action menu 2nd 3rd 4th 5th 6th 7th 8th Server Information Table (SIT) Server Message Block (SMB) 2nd 3rd 4th CIFS 2nd 3rd files 2nd 3rd 4th 5th 6th 7th 8th NET commands 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th protocol negotiation 2nd Samba 2nd 3rd security 2nd 3rd types 2nd 3rd Server Message Block protocol. [See CIFS] servers adding backups 2nd 3rd 4th 5th 6th 7th media 2nd 3rd 4th 5th BIND (Berkeley Internet Name Domain) Bindery. [See Bindery] binding 2nd BOOTP client exchanges (DHCP) 2nd 3rd 4th 5th 6th 7th 8th 9th customizing DHCP 2nd 3rd 4th 5th DHCP 2nd 3rd 4th 5th 6th 7th downloading operating systems 2nd options fields 2nd 3rd 4th 5th packet formats 2nd 3rd 4th 5th request/reply mechanisms 2nd 3rd 4th caching 2nd 3rd 4th 5th 6th 7th 8th 9th configuring connecting DFS 2nd 3rd 4th 5th 6th DHCP APIPA 2nd authorizing 2nd 3rd BOOTP support clustering 2nd configuring 2nd 3rd 4th daemons 2nd 3rd DNS 2nd 3rd 4th 5th 6th exclusions/ reservations 2nd installing 2nd 3rd large/routed environments leasing managing logging 2nd 3rd MMC Action menu 2nd 3rd 4th 5th 6th 7th 8th Red Hat Linux 2nd relay agents 2nd 3rd 4th troubleshooting DNS files Unix configuration 2nd dual-redundant network controllers 2nd file protocols 2nd 3rd FTP Windows 2003 Server 2nd 3rd 4th 5th FTp. [See also FTP] groups Windows 2000/2003 2nd 3rd hardware-based print 2nd 3rd 4th high-end Gigabit Ethernets 2nd installing job 2nd master/slave (NIS) member 2nd 3rd 4th 5th 6th multi- homed 2nd NBNS (NetBIOS Name Server) NCP (NetWare Core Protocol) signature options 2nd NDS Manager synchronzing servers 2nd network Printer NFS configuring daemons 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th NIS (Network Information Service) ypserve daemon primary 2nd 3rd 4th 5th 6th 7th 8th 9th printer server applications 2nd 3rd 4th proxy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th secondary 2nd 3rd 4th 5th 6th 7th 8th 9th signatures 2nd slaves (NIS) 2nd 3rd SMS (System Management Server) SMTP (Simple Mail Transfer Protocol) commands 2nd 3rd 4th 5th extensions models 2nd 3rd 4th response codes 2nd 3rd 4th 5th transactions 2nd statistics Telnet 2nd 3rd 4th telnet Unix telnet. [See telnet] tftp (trivial FTP server) Windows 2000 adding printers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st installing DNS Windows 2000 Server ActiveState ActivePerl 5.6 BOOTP 2nd FTP 2nd 3rd 4th Korn Shell command 2nd 3rd 4th 5th managing FTP 2nd 3rd 4th 5th NetWare file permissions 2nd 3rd 4th 5th 6th 7th 8th passwords 2nd 3rd 4th protocols/utilities 2nd 3rd TCP/IP 2nd Telnet 2nd 3rd 4th Telnetxxx 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th upgrading to 2nd 3rd user name mapping 2nd Windows 2000/2003 events 2nd Windows 2003 Active Directory 2nd FTP 2nd 3rd 4th installing Active Directory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th managing FTP 2nd 3rd 4th 5th protocols/utilities 2nd 3rd TCP/IP 2nd Telnetxxx 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th upgrading to 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th Windows 2003 Server ActiveState ActivePerl 5.6 BOOTP 2nd 3rd 4th 5th 6th 7th 8th installing Korn Shell command 2nd 3rd 4th 5th managing Telnet 2nd managing WINS netsh commands (WINS) 2nd 3rd NetWare file permissions 2nd 3rd 4th 5th 6th 7th 8th passwords 2nd 3rd 4th Telnet 2nd 3rd 4th user name mapping 2nd Windows NT adding users to groups 2nd assigning group memberships 2nd built-in user groups 2nd 3rd creating user groups 2nd 3rd groups 2nd managing user accounts 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Windows Print adding printers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th printers/printing devices 2nd 3rd 4th serves DHCP 2nd 3rd 4th 5th 6th Service Access Points (SAPs) Service Advertising Protocol (SAP) 2nd service categories ATM 2nd 3rd 4th Service Discovery Application profile 2nd Service Discovery Protocol (SDP) Service Level Agreement (SLA) service record (SRV) Service Resource Records (SRV RRs) services Active Directory 2nd Bindery 2nd 3rd 4th 5th configuring 2nd connection-oriented NetWare 2nd connectionless NetWare 2nd directory 2nd NDS (Novell Directory Service) X.500 2nd 3rd 4th 5th 6th 7th 8th 9th identifying planning logical network design 2nd IP addresses Knowledge Consistency Checker NetWare 6 2nd NIS (Network Information Service) 2nd 3rd 4th clients domainname command 2nd maps 2nd 3rd 4th 5th master/slave servers modifying maps 2nd slaves 2nd 3rd starting 2nd 3rd yp commands 2nd ypserve daemon RPC security TCP/IP 2nd 3rd services (background processes) network security 2nd Services for NetWare Version 5.0. [See SFN]2nd [See SFN] Services for Unix (SFU) Services for Unix 3.0 (SFU) 2nd 3rd installing 2nd 3rd 4th 5th Session layer sessions one-way synchronization MSDSS 2nd 3rd 4th 5th SMB 2nd TCP (Transmission Control Protocol) 2nd configuring 2nd 3rd ending 2nd managing 2nd 3rd 4th 5th 6th 7th 8th 9th security 2nd Telnet 2nd authentication 2nd 3rd commands 2nd 3rd 4th 5th 6th 7th 8th NVT (Network Virtual Terminal) 2nd two-way synchronization MSDSS 2nd sessions. [See also connections] set commands Set Group ID (SGID) 2nd 3rd 4th 5th Set User ID (SUID) 2nd 3rd 4th 5th setting goals SFF (small form factor) 2nd 3rd SFN (Services for NetWare Version 5.0) 2nd FMU feature 2nd installation migration steps 2nd 3rd 4th 5th FPNW 4.0 feature mapping NetWare trustee rights to Windows NT permissions 2nd FPNW 5.0 feature installation 2nd 3rd 4th MSDSS feature 2nd installation 2nd one-time migration 2nd one-way synchronization sessions 2nd 3rd 4th 5th prerequisites two-way synchronization sessions 2nd SFU ActiveState ActivePerl 5.6 Korn Shell commands 2nd 3rd 4th 5th 6th 7th password synchronization 2nd 3rd 4th Telnet telnet Telnet 2nd 3rd user name mapping 2nd SFU (Services for Unix 3.0) 2nd 3rd installing 2nd 3rd 4th 5th SFU (Services for Unix) SGID (Set Group ID) 2nd 3rd 4th 5th SHA (Secure Hash Algorithm) shadow password files (Unix) 2nd share-level permissions 2nd Windows 95/98 2nd Windows NT share-level security. SMB [See also security] shared network media shared topologies 2nd 3rd shareware SOHO 2nd shareware. [See also applications] sharing file systems 2nd 3rd files Linux/NetWare 2nd printers 2nd Linux/NetWare 2nd shielded twisted-pair) shields 2nd short frames 2nd shutdown events Windows 2003 servers 2nd SID (Source Node Identification) SIG (special interest group) Bluetooth signatures digital options NCP (NetWare Core Protocol) 2nd 3rd 4th 5th 6th packets NCP (NetWare Core Protocol) 2nd troubleshooting 2nd Simple Mail Transfer Protocol (SMTP) 2nd Simple Mail Transfer Protocol )SMTP commands 2nd 3rd 4th 5th extensions models 2nd 3rd 4th response codes 2nd 3rd 4th 5th transactions 2nd Simple Mail Transfer Protocol )SMTP) 2nd 3rd 4th Simple Network Management Protocol (SNMP) Simple Network Management Protocol. [See SNMP] Simple Network Monitoring Protocol (SNMP) simple repeaters single domain models Windows NT single hops single-key encryption 2nd 3rd 4th SIT (Server Information Table) site-to-site VPN sites Active Directory managing large enterprises size fiber-optic cables SIZE command sizes giant frame errors 2nd 3rd 4th 5th windows SLA (Service Level Agreement) slave servers slave servers (NIS) slaves NIS (Network Information Service) 2nd 3rd sliding windows 2nd SLIP (Serial Line Internet Protocol) 2nd 3rd 4th 5th 6th 7th slow starts small businesses SOHO networks backups 2nd requirements 2nd 3rd 4th 5th topologies 2nd 3rd 4th vertical-market applications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Small Computer Systems Interface. [See SCSI] small form factor (SFF) 2nd 3rd small office/home office (SOHO) small office/home office. [See SOHO] small offices and home offices (SoHO) smart cards 2nd SMB (Server Message Block) 2nd 3rd 4th CIFS 2nd 3rd files 2nd 3rd 4th 5th 6th 7th 8th NET commands 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th protocol negotiation 2nd Samba 2nd 3rd security 2nd 3rd types 2nd 3rd SMSC (Standard Microsystems Corporation) SMTP (Simple Mail Transfer Protocol) 2nd 3rd 4th 5th 6th commands 2nd 3rd 4th 5th extensions models 2nd 3rd 4th response codes 2nd 3rd 4th 5th transactions 2nd SNA (Systems Network Architecture) snap features, 802.3 2nd snap-ins Active Directory Computers and Users 2nd 3rd Active Directory schema adding 2nd executing 2nd 3rd 4th 5th 6th SNIA (Storage Networking Industry Association) sniff mode sniffers 2nd SNMP 2nd eDirectory SNMP (Simple Network Management Protocol) 2nd 3rd MIB (Management Information Base) 2nd 3rd 4th 5th primitives 2nd proxy agents 2nd RMON (Remote Monitoring) 2nd 3rd 4th 5th SNMPv2/SMNPv3 2nd 3rd SNMP (Simple Network Monitoring Protocol) SOA (Start of Authority) 2nd social engin sockets software drivers NDIS (Network Driver Interface Specification) 2nd ODI (Open Data-Link Interface) 2nd Packet Drivers 2nd firewalls 2nd executing software-based analyzers 2nd 3rd 4th 5th 6th software-based LAN analyzers 2nd 3rd SOH (Start of Header) SOHO clients Windows 2003 Server 2nd 3rd firewalls 2nd SOHO (Small Office and Home Office) troubleshooting cables 2nd components 2nd configuring computers 2nd 3rd 4th 5th 6th 7th 8th firewalls 2nd networks power 2nd 3rd tech support 2nd wireless networks 2nd SOHO (small office/home office) 2nd 3rd backups 2nd requirements 2nd 3rd 4th 5th topologies 2nd 3rd 4th vertical-market applications 2nd 3rd 4th 5th 6th 7th 8th 9th 10th SOHO (small offices and home offices) Solaris AIX Unix eDirectory SOML command Sonicwall source IP addresses 2nd 3rd Source Node Identification (SID) Source Service Access Point (SSAP) source-routing bridges (SRB) Spanning Tree Protocol special interest group (SIG) Bluetooth special permissions Windows NT specialized servers delegating authority for network security 2nd specifications general horizontal cabling subsystem work area structured wiring speed networks selecting NICs 2nd SPI (Security Parameters Index) splicing fiber optic 2nd 3rd fiber optic cables 2nd 3rd splitters spoofing 2nd spool directories creating spooling modifying spread-spectrum technology 2nd 3rd 4th spreadsheets documentation 2nd 3rd 4th SPX (Sequenced Packet Exchange) 2nd 3rd communications 2nd packets 2nd SPXII 2nd SPXII (Sequenced Packet Exchange II) 2nd SQL (Structured Query Language) SRB (source-routing bridges) SRV (service record) SRV RRs (Service Resource Records) SSAP (Source Service Access Point) SSH (Secure Shell) utilities 2nd SSH utilities (Secure Shell utilities) SSL eDirectory handshakes 2nd OpenSource transactions stackable switches stacks adding 2nd HBA protocol. [See also protocols] protocols standalone UPS systems. [See also UPS]2nd [See also UPS]3rd [See also UPS]4th [See also UPS] standard input Standard Microsystems Corporation (SMSC) standard objects Active Directory 2nd 3rd 4th 5th standard Select User Computer or Group dialog box standards 2nd 3rd 802.2 LLC 2nd 3rd 4th 5th 802.3 Active Directory 2nd 3rd 4th 5th corporate vertifying 2nd IEEE 2nd VLAN switches 2nd 3rd IEEE 802 LAN/MAN Standards Committee 2nd IEEE 802.11b increased bandwidth 2nd 3rd interference 2nd public use 2nd security 2nd IEEE 802.11g 2nd increasing bandwidth 2nd ISO 2nd LMSC 2nd IEEE 802 architecture 2nd 3rd 4th 5th IEEE 802.1 architecture 2nd IEEE 802.10 architecture IEEE 802.11 architecture 2nd IEEE 802.2 architecture 2nd IEEE 802.3 architecture 2nd IEEE 802.4 architecture 2nd IEEE 802.5 architecture 2nd IEEE 802.7 architecture 2nd OSI (International Organization for Standardization) RFCs 2nd SNIA W3C X.500 standards. [See also conventions] standby mode star topologies 2nd 3rd 4th 5th 6th 7th ARCnet 2nd LAN 2nd star-wireless topologies 2nd StarOffice Start Delimiter (SD) start delimiter (SD) Start menu commands Active Directory Users and Computers Computer Management Internet Services Manager Start of Authority (SOA) 2nd Start of Header (SOH) Start/Search method 2nd starting Arbitrated Loops 2nd 3rd 4th 5th networks upgrading 2nd 3rd NIS (Network Information Service) starting 2nd 3rd startup events Windows 2003 servers 2nd STAT command stateful protocols stateless protocols states IMAP4 POP3 (Post Office Protocol) 2nd AUTHORIZATION 2nd TRANSACTION 2nd UPDATE tombstone static entries static mappings WINS statistical data 2nd statistics printing 2nd servers status system flags 2nd status command stochastic arbitration event (SAE) storage backups 2nd 3rd NAS 2nd capacity 2nd 3rd 4th network appliances 2nd protocols 2nd SANs 2nd 3rd 4th applying NAS 2nd Arbitrated Loops 2nd 3rd 4th 5th 6th 7th 8th 9th fabric switched topology 2nd 3rd 4th 5th Fibre Channel 2nd 3rd 4th IP 2nd 3rd mixed topologies 2nd 3rd 4th selecting 2nd 3rd 4th Storage Area Network (SAN) 2nd Storage Area Networks. [See SANs] Storage Networking Industry Association (SNIA) store-and-forward switches 2nd STP (shielded twisted-pair) stream ciphers 2nd stream mode strict source routing Structured Query Language (SQL) structured wiring 2nd backbone cabling system 2nd 3rd 4th horizontal cabling system 2nd 3rd work area specification structures directories modeling 2nd 3rd IPX packets 2nd 3rd Netware directories 2nd Bindery 2nd Bindery Services 2nd 3rd 4th 5th comparing Bindery/NDS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th configuring NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th NDS (NetWare Directory Service) 2nd 3rd 4th 5th 6th 7th 8th 9th su command 2nd 3rd subheaders LLC 2nd 3rd sublayers Media Access Control 2nd subnets multi-homed systems 2nd subnetting IP addresses 2nd 3rd 4th 5th 6th 7th 8th subordinate reference replicas 2nd subsets . [See also global catalog] success, measuring upgrades 2nd SUID (Set User ID) 2nd 3rd 4th 5th suites protocols NetWare 2nd protocols. [See also protocols]2nd [See also protocols] summarization global catalog 2nd Sun StarOffice supernetting IP addresses 2nd 3rd 4th 5th 6th superscopes . [See also scope] support BOOTP costs evaluating 2nd UNIX protocols/utilities 2nd 3rd 4th 5th 6th Windows NT UNIX protocols/utilities 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th surveying users 2nd 3rd SVC (switched virtual circuit) 2nd SVC (switched virtual connection) SVR4 (System V, Release 4) 2nd administration commands 2nd 3rd 4th 5th 6th commands 2nd 3rd 4th 5th 6th swapping out. [See upgrading] switched virtual circuit (SVC) 2nd switched virtual connection (SVC) switches 2nd 3rd 4th 5th 6th 7th 8th 10Base-2 networks 2nd 3rd 4th applying collapsed backbones 2nd 3rd 4th 5th collision domains segmenting 2nd collisions 2nd 3rd fabric switched topology 2nd 3rd 4th 5th full-duplex ethernet 2nd 3rd 4th hardware types 2nd 3rd 4th chassis cut-through switches 2nd 3rd home offices 2nd Layer 3 switches 2nd stackable store-and-forward switches 2nd managing mixed topologies 2nd 3rd 4th network segments 2nd 3rd results troubleshooting upgrade from bridges 2nd 3rd 4th 5th 6th switching layer-3 MPLS multi-protocol label 2nd 3rd routing combining 2nd VLAN (virtual LAN) 2nd 3rd 4th 5th purchasing 2nd 3rd Sygate Personal Firewall Pro Symantec Security Response symbols ARCnet 2nd 3rd 4th 5th 6th 7th 8th symmetric encryption 2nd 3rd 4th 5th digital certificates 2nd 3rd 4th SSL handshakes 2nd SYN (synchronization) flooding 2nd synchronization full/partial 2nd NetWare 2nd 3rd one-way sessions MSDSS 2nd 3rd 4th 5th servers NDS Manager 2nd troubleshooting 2nd two-way sessions MSDSS 2nd synchronization (SYN) flooding 2nd Synchronization profile synchronizing passwords 2nd 3rd 4th Synchronous Connection-Oriented (SCO) 2nd 3rd syslog Linux/Unix 2nd 3rd 4th 5th 6th 7th syslog daemon syslog utility SYSPRINT.SEP System Code (SC) system flags 2nd System Information MMC utility system log files Linux/Unix 2nd 3rd System Management Server (SMS) System Management Server. [See SMS] System V, Release 4 (SVR4) 2nd administration commands 2nd 3rd 4th 5th 6th commands 2nd 3rd 4th 5th 6th systems multi-homed 2nd Systems Network Architecture (SNA) |