Index S


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

SA (security association)  
SAE (stochastic arbitration event)  
safety
       fiber- optic cables  
SAM
       domains
               controllers   2nd   3rd  
               models   2nd   3rd   4th   5th   6th   7th   8th  
               replication between controllers   2nd   3rd   4th  
        User Manager utility   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
SAM (security accounts manager)  
       domains   2nd   3rd   4th  
Samba   2nd   3rd  
SAMBA   2nd  
Samba.org  
SAML command  
sampling intervals  
SAN (Storage Area Network)   2nd  
SANs
       Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  
       fabric switched topology   2nd   3rd   4th   5th  
       Fibre Channel   2nd   3rd   4th  
       IP   2nd   3rd  
       mixed topologies   2nd   3rd   4th  
       selecting   2nd   3rd   4th  
SANs (Storage Area Networks)  
SAP (Service Advertising Protocol)   2nd  
SAPs (Service Access Points)  
SAR (Segmentation and Reassembly)  
saving
       applications  
       SOHO networks   2nd  
SC (Source Code)  
scalability
       Active Directory   2nd  
       campus networks   2nd  
       multi-tiered networks   2nd  
       RIP (Routing Information Protocol)   2nd  
scams   2nd  
scatternets   2nd  
       Bluetooth   2nd   3rd   4th   5th  
scavenging  
       databases  
schedules
        backups   2nd  
       rotation  
scheduling downtime  
schema
       Active Directory   2nd   3rd   4th   5th   6th   7th  
               executing   2nd   3rd   4th   5th   6th  
               master  
               modifying   2nd   3rd   4th   5th   6th   7th   8th   9th  
       X.500  
schemes
       Manchester encoding  
SCO (Synchronous Connection-Oriented)   2nd   3rd  
scope
       addresses
               configuring   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
       groups
               selecting   2nd   3rd  
screened host architecture  
SCSI   2nd  
       NAS   2nd  
               capacity   2nd   3rd   4th  
               network appliances   2nd  
               protocols   2nd  
       SANs   2nd   3rd   4th  
               applying NAS   2nd  
               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  
               fabric switched topology   2nd   3rd   4th   5th  
               Fibre Channel   2nd   3rd   4th  
               IP   2nd   3rd  
               mixed topologies   2nd   3rd   4th  
SCSI (Small Computer Systems Interface)  
SD (Start Delimiter )  
SD (start delimiter)  
SDP (Service Discovery Protocol)  
SDSL (Single-line Digital Subscriber Line)   2nd  
searching
       Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th  
       databases   2nd  
       information
               NIC  
       printers   2nd  
       user accounts   2nd   3rd  
secondary servers   2nd   3rd   4th   5th   6th   7th   8th   9th  
Secure Hash Algorithm (SHA)  
Secure Shell (SSH) utilities   2nd  
Secure Shell utilities.   [See SSH utilities]
security  
       802.11b networking   2nd   3rd   4th  
       access control mechanisms  
               auditing   2nd  
               identifying users   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               resource protections  
       Bindery   2nd  
               comparing NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               Services   2nd   3rd   4th   5th  
       Bluetooth   2nd  
       CERT/CC  
       CIAC  
       delegating authority  
               specialized servers   2nd  
               user accounts   2nd  
       disabling default options   2nd  
       encryption  
               digital certificates   2nd   3rd   4th   5th   6th   7th   8th  
               PGP (Pretty Good Privacy)   2nd   3rd  
               privacy   2nd   3rd  
               public key encryption   2nd   3rd   4th  
               RSA public key encryption   2nd  
               single-key encryption   2nd   3rd   4th  
               SSL handshakes   2nd  
               types of   2nd  
       equivalence
               NetWare   2nd   3rd  
       Ethernets  
       fiber-optic cables  
       firewalls   2nd   3rd   4th   5th   6th   7th  
               executing   2nd   3rd   4th  
               filtering IP addresses   2nd  
               FWTK  
               hardware   2nd   3rd   4th  
               hybrids   2nd   3rd   4th  
               Intrusion Detection   2nd  
               NAT (Network Address Translation)   2nd   3rd   4th   5th  
               packet filters   2nd  
               port number filtering   2nd   3rd   4th  
               protocol filtering   2nd   3rd  
               proxy applications   2nd   3rd   4th  
               proxy servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               software   2nd   3rd  
               SOHO   2nd  
               troubleshooting   2nd  
       FIRST  
       FTP   2nd  
       HomeRF technology  
       IEEE 802.10  
       interdomain trust relationships   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
       levels of   2nd  
       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  
       modes  
       NAT (Netwaork Address Translation
               routers  
       NetWare  
               comparing NDS/file system rights  
               Everyone group   2nd  
               file system rights   2nd  
               inheritance of rights   2nd   3rd   4th  
               login   2nd   3rd  
               object/property rights   2nd   3rd   4th  
               permissions   2nd  
               trustees  
       networks   2nd  
       Novell
               AUDITCON/SYSCON utilites   2nd   3rd   4th   5th   6th  
       NTBugTraq   2nd  
       OpenSSL  
       passwords
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
       permissions
               cumulative effect of  
               NTFS   2nd  
       physical measures  
               disposing of hardware and media   2nd  
               locking the door   2nd  
               UPS (Uninterruptable Power Supply)   2nd  
       piracy  
       policies   2nd  
               acceptable use statements   2nd   3rd   4th   5th  
               elements to include   2nd   3rd  
               guidelines for usage   2nd  
               Network Connection Policy   2nd  
       policies and procedures
               elements to include  
       procedures
               escalation procedures   2nd   3rd  
       proxy servers   2nd  
       routers   2nd  
       services and system daemons   2nd  
       share-level permissions   2nd  
                Windows 95/98   2nd  
               Windows NT  
       SMB (Server Message Block)   2nd   3rd  
       SSL  
       Symantec Security Response  
       TCP (Transmission Control Protocol)
               sessions   2nd  
       Telnet   2nd  
       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  
       user-level permissions   2nd  
               Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       viruses   2nd   3rd  
       VPN (virtual private network)   2nd  
               protocols   2nd  
               protocols;AH   2nd   3rd  
               protocols;ESP   2nd   3rd   4th  
               protocols;IKE   2nd  
               protocols;IPSec   2nd  
               protocols;L2TP   2nd   3rd   4th   5th   6th  
               protocols;PPTP   2nd   3rd  
               RAS (Remote Access Service)   2nd   3rd  
       WAN
               host computers   2nd  
               network sniffers  
               preventive measures   2nd   3rd  
               routers   2nd  
               spoofing   2nd  
               training   2nd  
               Tripwire   2nd   3rd  
               updating   2nd  
               virus-checking applications  
       WANs (wide area networks)   2nd  
               back doors   2nd  
               forged e-mail   2nd  
               passwords   2nd  
               preventing attacks   2nd   3rd  
               Trojan horses   2nd  
               types of attacks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
               viruses   2nd   3rd   4th   5th  
       wireless
               WEP   2nd   3rd   4th   5th  
               WPA   2nd  
       wireless networking
               LAN   2nd   3rd  
security accounts manager (SAM)  
       domains   2nd   3rd   4th  
security association (SA)  
Security Equivalance   2nd  
Security Parameters Index (SPI)  
security policies  
segmentation
       collison Domains   2nd  
Segmentation and Reassembly (SAR)  
segmenting
       cable segement length   2nd  
segments   2nd  
       LAN   2nd   3rd  
               reasons to segment network users   2nd  
               remote locations   2nd  
               routers   2nd   3rd   4th   5th  
               switches   2nd   3rd  
       networks
               routers   2nd   3rd   4th   5th  
               switches   2nd   3rd  
Select Network Component Type dialog box  
Select Network Protocol dialog box  
Select Network Service dialog box  
selected attributes  
selecting
       access points
               wireless netowrking   2nd   3rd   4th  
       cables  
       directories   2nd  
       drivers
               Windows NT   2nd  
       groups
               scope   2nd   3rd  
       Hardware bus types   2nd   3rd   4th   5th   6th   7th   8th   9th  
       NAS or SANs   2nd   3rd   4th  
       ports
               Windows NT   2nd  
       routers   2nd  
       Wi-Fi   2nd  
       wireless networks   2nd  
       wireless protocols   2nd  
selection
       protocols   2nd  
selectors
       creating  
SEND command  
Sender-SMTP  
sending
       messages
               ARCnet   2nd   3rd  
separating logical and physical topologies  
Sequenced Packet Exchange (SPX)  
Sequenced Packet Exchange.   [See SPX]
serial connections
       Fibre Channel   2nd   3rd   4th  
Serial Line Internet Protocol (SLIP)   2nd   3rd   4th   5th   6th   7th  
Serial Port profile  
serial port profile group  
Server 2003
       DHCP
               authorizing   2nd   3rd  
               installing   2nd  
               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  
Server Information Table (SIT)  
Server Message Block (SMB)   2nd   3rd   4th  
       CIFS   2nd   3rd  
       files   2nd   3rd   4th   5th   6th   7th   8th  
       NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       protocol negotiation   2nd  
       Samba   2nd   3rd  
       security   2nd   3rd  
       types   2nd   3rd  
Server Message Block protocol.   [See CIFS]
servers
       adding  
       backups   2nd   3rd   4th   5th   6th   7th  
               media   2nd   3rd   4th   5th  
       BIND (Berkeley Internet Name Domain)  
       Bindery.   [See Bindery]
       binding   2nd  
       BOOTP
               client exchanges (DHCP)   2nd   3rd   4th   5th   6th   7th   8th   9th  
               customizing DHCP   2nd   3rd   4th   5th  
               DHCP   2nd   3rd   4th   5th   6th   7th  
               downloading operating systems   2nd  
               options fields   2nd   3rd   4th   5th  
               packet formats   2nd   3rd   4th   5th  
               request/reply mechanisms   2nd   3rd   4th  
       caching   2nd   3rd   4th   5th   6th   7th   8th   9th  
       configuring  
       connecting  
       DFS   2nd   3rd   4th   5th   6th  
       DHCP
               APIPA   2nd  
               authorizing   2nd   3rd  
               BOOTP support  
               clustering   2nd  
               configuring   2nd   3rd   4th  
               daemons   2nd   3rd  
               DNS   2nd   3rd   4th   5th   6th  
               exclusions/ reservations   2nd  
               installing   2nd   3rd  
               large/routed environments  
               leasing  
               managing logging   2nd   3rd  
               MMC Action menu   2nd   3rd   4th   5th   6th   7th   8th  
               Red Hat Linux   2nd  
               relay agents   2nd   3rd   4th  
               troubleshooting  
       DNS
               files  
               Unix configuration   2nd  
       dual-redundant network controllers   2nd  
       file
               protocols   2nd   3rd  
       FTP
               Windows 2003 Server   2nd   3rd   4th   5th  
       FTp.   [See also FTP]
       groups
               Windows 2000/2003   2nd   3rd  
       hardware-based print   2nd   3rd   4th  
       high-end
               Gigabit Ethernets   2nd  
       installing  
       job   2nd  
       master/slave (NIS)  
       member   2nd   3rd   4th   5th   6th  
       multi- homed   2nd  
       NBNS (NetBIOS Name Server)  
       NCP (NetWare Core Protocol)
               signature options   2nd  
       NDS Manager
               synchronzing servers   2nd  
       network Printer  
       NFS
               configuring  
               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  
       NIS (Network Information Service)
               ypserve daemon  
       primary   2nd   3rd   4th   5th   6th   7th   8th   9th  
       printer server applications   2nd   3rd   4th  
       proxy   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  
       secondary   2nd   3rd   4th   5th   6th   7th   8th   9th  
       signatures   2nd  
       slaves (NIS)   2nd   3rd  
       SMS (System Management Server)  
       SMTP (Simple Mail Transfer Protocol)
               commands   2nd   3rd   4th   5th  
               extensions  
               models   2nd   3rd   4th  
               response codes   2nd   3rd   4th   5th  
               transactions   2nd  
       statistics  
       Telnet   2nd   3rd   4th  
       telnet
               Unix  
       telnet.   [See telnet]
       tftp (trivial FTP server)  
       Windows 2000
               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  
               installing DNS  
       Windows 2000 Server
               ActiveState ActivePerl 5.6  
               BOOTP   2nd  
               FTP   2nd   3rd   4th  
               Korn Shell command   2nd   3rd   4th   5th  
               managing FTP   2nd   3rd   4th   5th  
               NetWare file permissions   2nd   3rd   4th   5th   6th   7th   8th  
               passwords   2nd   3rd   4th  
               protocols/utilities   2nd   3rd  
               TCP/IP   2nd  
               Telnet   2nd   3rd   4th  
               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
               upgrading to   2nd   3rd  
               user name mapping   2nd  
       Windows 2000/2003
               events   2nd  
       Windows 2003
               Active Directory   2nd  
               FTP   2nd   3rd   4th  
               installing Active Directory   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               managing FTP   2nd   3rd   4th   5th  
               protocols/utilities   2nd   3rd  
               TCP/IP   2nd  
               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
               upgrading to   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
       Windows 2003 Server
               ActiveState ActivePerl 5.6  
               BOOTP   2nd   3rd   4th   5th   6th   7th   8th  
               installing  
               Korn Shell command   2nd   3rd   4th   5th  
               managing Telnet   2nd  
               managing WINS  
               netsh commands (WINS)   2nd   3rd  
               NetWare file permissions   2nd   3rd   4th   5th   6th   7th   8th  
               passwords   2nd   3rd   4th  
               Telnet   2nd   3rd   4th  
               user name mapping   2nd  
       Windows NT
               adding users to groups   2nd  
               assigning group memberships   2nd  
               built-in user groups   2nd   3rd  
               creating user groups   2nd   3rd  
               groups   2nd  
               managing user accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       Windows Print
               adding printers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
               printers/printing devices   2nd   3rd   4th  
serves
       DHCP   2nd   3rd   4th   5th   6th  
Service Access Points (SAPs)  
Service Advertising Protocol (SAP)   2nd  
service categories
       ATM   2nd   3rd   4th  
Service Discovery Application profile   2nd  
Service Discovery Protocol (SDP)  
Service Level Agreement (SLA)  
service record (SRV)  
Service Resource Records (SRV RRs)  
services
       Active Directory   2nd  
       Bindery   2nd   3rd   4th   5th  
               configuring   2nd  
       connection-oriented
               NetWare   2nd  
       connectionless
               NetWare   2nd  
       directory   2nd  
               NDS (Novell Directory Service)  
               X.500   2nd   3rd   4th   5th   6th   7th   8th   9th  
       identifying
               planning logical network design   2nd  
       IP addresses  
       Knowledge Consistency Checker  
       NetWare 6   2nd  
       NIS (Network Information Service)   2nd   3rd   4th  
                clients  
               domainname command   2nd  
               maps   2nd   3rd   4th   5th  
               master/slave servers  
               modifying maps   2nd  
               slaves   2nd   3rd  
               starting   2nd   3rd  
               yp commands   2nd  
               ypserve daemon  
       RPC  
       security  
       TCP/IP   2nd   3rd  
services (background processes)
       network security   2nd  
Services for NetWare Version 5.0.   [See SFN]2nd   [See SFN]
Services for Unix (SFU)  
Services for Unix 3.0 (SFU)   2nd   3rd  
       installing   2nd   3rd   4th   5th  
Session layer  
sessions
       one-way synchronization
               MSDSS   2nd   3rd   4th   5th  
       SMB   2nd  
       TCP (Transmission Control Protocol)   2nd  
               configuring   2nd   3rd  
               ending   2nd  
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  
               security   2nd  
       Telnet   2nd  
               authentication   2nd   3rd  
               commands   2nd   3rd   4th   5th   6th   7th   8th  
               NVT (Network Virtual Terminal)   2nd  
       two-way synchronization
               MSDSS   2nd  
sessions.   [See also connections]
set commands  
Set Group ID (SGID)   2nd   3rd   4th   5th  
Set User ID (SUID)   2nd   3rd   4th   5th  
setting
       goals  
SFF (small form factor)   2nd   3rd  
SFN
       (Services for NetWare Version 5.0)   2nd  
       FMU feature   2nd  
               installation  
               migration steps   2nd   3rd   4th   5th  
       FPNW 4.0 feature
               mapping NetWare trustee rights to Windows NT permissions   2nd  
       FPNW 5.0 feature
               installation   2nd   3rd   4th  
       MSDSS feature   2nd  
               installation   2nd  
               one-time migration   2nd  
               one-way synchronization sessions   2nd   3rd   4th   5th  
               prerequisites  
               two-way synchronization sessions   2nd  
SFU
       ActiveState ActivePerl 5.6  
       Korn Shell commands   2nd   3rd   4th   5th   6th   7th  
       password synchronization   2nd   3rd   4th  
       Telnet  
       telnet  
       Telnet   2nd   3rd  
       user name mapping   2nd  
SFU (Services for Unix 3.0)   2nd   3rd  
       installing   2nd   3rd   4th   5th  
SFU (Services for Unix)  
SGID (Set Group ID)   2nd   3rd   4th   5th  
SHA (Secure Hash Algorithm)  
shadow password files (Unix)   2nd  
share-level permissions   2nd  
       Windows 95/98   2nd  
       Windows NT  
share-level security.
       SMB   [See also security]
shared network media  
shared topologies   2nd   3rd  
shareware
       SOHO   2nd  
shareware.   [See also applications]
sharing
       file systems   2nd   3rd  
       files
               Linux/NetWare   2nd  
       printers   2nd  
               Linux/NetWare   2nd  
shielded twisted-pair)  
shields   2nd  
short frames   2nd  
shutdown events
       Windows 2003 servers   2nd  
SID (Source Node Identification)  
SIG (special interest group)
       Bluetooth  
signatures
       digital  
       options
               NCP (NetWare Core Protocol)   2nd   3rd   4th   5th   6th  
       packets
               NCP (NetWare Core Protocol)   2nd  
               troubleshooting   2nd  
Simple Mail Transfer Protocol (SMTP)   2nd  
Simple Mail Transfer Protocol )SMTP
       commands   2nd   3rd   4th   5th  
       extensions  
       models   2nd   3rd   4th  
       response codes   2nd   3rd   4th   5th  
       transactions   2nd  
Simple Mail Transfer Protocol )SMTP)   2nd   3rd   4th  
Simple Network Management Protocol (SNMP)  
Simple Network Management Protocol.   [See SNMP]
Simple Network Monitoring Protocol (SNMP)  
simple repeaters  
single domain models
       Windows NT  
single hops  
single-key encryption   2nd   3rd   4th  
SIT (Server Information Table)  
site-to-site VPN  
sites
       Active Directory
               managing large enterprises  
size
       fiber-optic cables  
SIZE command  
sizes
       giant frame errors   2nd   3rd   4th   5th  
       windows  
SLA (Service Level Agreement)  
slave servers  
slave servers (NIS)  
slaves
       NIS (Network Information Service)   2nd   3rd  
sliding windows   2nd  
SLIP (Serial Line Internet Protocol)   2nd   3rd   4th   5th   6th   7th  
slow starts  
small businesses
       SOHO networks
               backups   2nd  
               requirements   2nd   3rd   4th   5th  
               topologies   2nd   3rd   4th  
               vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
Small Computer Systems Interface.   [See SCSI]
small form factor (SFF)   2nd   3rd  
small office/home office (SOHO)  
small office/home office.   [See SOHO]
small offices and home offices (SoHO)  
smart cards   2nd  
SMB (Server Message Block)   2nd   3rd   4th  
       CIFS   2nd   3rd  
       files   2nd   3rd   4th   5th   6th   7th   8th  
       NET commands   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
       protocol negotiation   2nd  
       Samba   2nd   3rd  
       security   2nd   3rd  
       types   2nd   3rd  
SMSC (Standard Microsystems Corporation)  
SMTP (Simple Mail Transfer Protocol)   2nd   3rd   4th   5th   6th  
       commands   2nd   3rd   4th   5th  
       extensions  
       models   2nd   3rd   4th  
       response codes   2nd   3rd   4th   5th  
       transactions   2nd  
SNA (Systems Network Architecture)  
snap features, 802.3   2nd  
snap-ins
       Active Directory Computers and Users   2nd   3rd  
       Active Directory schema
               adding   2nd  
               executing   2nd   3rd   4th   5th   6th  
SNIA (Storage Networking Industry Association)  
sniff mode  
sniffers   2nd  
SNMP   2nd  
       eDirectory  
SNMP (Simple Network Management Protocol)   2nd   3rd  
       MIB (Management Information Base)   2nd   3rd   4th   5th  
       primitives   2nd  
       proxy agents   2nd  
       RMON (Remote Monitoring)   2nd   3rd   4th   5th  
       SNMPv2/SMNPv3   2nd   3rd  
SNMP (Simple Network Monitoring Protocol)  
SOA (Start of Authority)   2nd  
social engin  
sockets  
software
       drivers  
               NDIS (Network Driver Interface Specification)   2nd  
               ODI (Open Data-Link Interface)   2nd  
               Packet Drivers   2nd  
       firewalls   2nd  
               executing  
software-based analyzers   2nd   3rd   4th   5th   6th  
software-based LAN analyzers   2nd   3rd  
SOH (Start of Header)  
SOHO
       clients
               Windows 2003 Server   2nd   3rd  
       firewalls   2nd  
SOHO (Small Office and Home Office)
       troubleshooting  
               cables   2nd  
                components   2nd  
               configuring computers   2nd   3rd   4th   5th   6th   7th   8th  
               firewalls   2nd  
               networks  
               power   2nd   3rd  
               tech support   2nd  
               wireless networks   2nd  
SOHO (small office/home office)   2nd   3rd  
       backups   2nd  
       requirements   2nd   3rd   4th   5th  
       topologies   2nd   3rd   4th  
       vertical-market applications   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
SOHO (small offices and home offices)  
Solaris AIX Unix
       eDirectory  
SOML command  
Sonicwall  
source IP addresses   2nd   3rd  
Source Node Identification (SID)  
Source Service Access Point (SSAP)  
source-routing bridges (SRB)  
Spanning Tree Protocol  
special interest group (SIG)
       Bluetooth  
special permissions
       Windows NT  
specialized servers
       delegating authority for network security   2nd  
specifications
       general horizontal cabling subsystem  
       work area
               structured wiring  
speed
       networks
               selecting NICs   2nd  
SPI (Security Parameters Index)  
splicing
       fiber optic   2nd   3rd  
       fiber optic cables   2nd   3rd  
splitters  
spoofing   2nd  
spool directories
       creating  
spooling
       modifying  
spread-spectrum technology   2nd   3rd   4th  
spreadsheets
       documentation   2nd   3rd   4th  
SPX (Sequenced Packet Exchange)   2nd   3rd  
       communications   2nd  
       packets   2nd  
       SPXII   2nd  
SPXII (Sequenced Packet Exchange II)   2nd  
SQL (Structured Query Language)  
SRB (source-routing bridges)  
SRV (service record)  
SRV RRs (Service Resource Records)  
SSAP (Source Service Access Point)  
SSH (Secure Shell) utilities   2nd  
SSH utilities
       (Secure Shell utilities)  
SSL
       eDirectory  
       handshakes   2nd  
       OpenSource  
       transactions  
stackable switches  
stacks
       adding   2nd  
       HBA  
       protocol.   [See also protocols]
       protocols  
standalone UPS systems.   [See also UPS]2nd   [See also UPS]3rd   [See also UPS]4th   [See also UPS]
standard input  
Standard Microsystems Corporation (SMSC)  
standard objects
       Active Directory   2nd   3rd   4th   5th  
standard Select User Computer or Group dialog box  
standards   2nd   3rd  
       802.2 LLC   2nd   3rd   4th   5th  
       802.3  
       Active Directory   2nd   3rd   4th   5th  
       corporate
               vertifying   2nd  
       IEEE   2nd  
               VLAN switches   2nd   3rd  
       IEEE 802 LAN/MAN Standards Committee   2nd  
       IEEE 802.11b  
               increased bandwidth   2nd   3rd  
               interference   2nd  
               public use   2nd  
               security   2nd  
       IEEE 802.11g   2nd  
               increasing bandwidth   2nd  
       ISO   2nd  
       LMSC   2nd  
               IEEE 802 architecture   2nd   3rd   4th   5th  
               IEEE 802.1 architecture   2nd  
               IEEE 802.10 architecture  
               IEEE 802.11 architecture   2nd  
               IEEE 802.2 architecture   2nd  
               IEEE 802.3 architecture   2nd  
               IEEE 802.4 architecture   2nd  
               IEEE 802.5 architecture   2nd  
               IEEE 802.7 architecture   2nd  
       OSI (International Organization for Standardization)  
       RFCs   2nd  
       SNIA  
       W3C  
       X.500  
standards.   [See also conventions]
standby mode  
star topologies   2nd   3rd   4th   5th   6th   7th  
       ARCnet   2nd  
       LAN   2nd  
star-wireless topologies   2nd  
StarOffice  
Start Delimiter (SD)  
start delimiter (SD)  
Start menu commands
       Active Directory Users and Computers  
       Computer Management  
       Internet Services Manager  
Start of Authority (SOA)   2nd  
Start of Header (SOH)  
Start/Search method   2nd  
starting
       Arbitrated Loops   2nd   3rd   4th   5th  
       networks
               upgrading   2nd   3rd  
       NIS (Network Information Service)
               starting   2nd   3rd  
startup events
       Windows 2003 servers   2nd  
STAT command  
stateful protocols  
stateless protocols  
states
       IMAP4  
       POP3 (Post Office Protocol)   2nd  
               AUTHORIZATION   2nd  
               TRANSACTION   2nd  
               UPDATE  
       tombstone  
static entries  
static mappings
       WINS  
statistical data   2nd  
statistics  
       printing   2nd  
       servers  
status
       system flags   2nd  
status command  
stochastic arbitration event (SAE)  
storage
       backups   2nd   3rd  
       NAS   2nd  
               capacity   2nd   3rd   4th  
               network appliances   2nd  
               protocols   2nd  
       SANs   2nd   3rd   4th  
               applying NAS   2nd  
               Arbitrated Loops   2nd   3rd   4th   5th   6th   7th   8th   9th  
               fabric switched topology   2nd   3rd   4th   5th  
               Fibre Channel   2nd   3rd   4th  
               IP   2nd   3rd  
               mixed topologies   2nd   3rd   4th  
       selecting   2nd   3rd   4th  
Storage Area Network (SAN)   2nd  
Storage Area Networks.   [See SANs]
Storage Networking Industry Association (SNIA)  
store-and-forward switches   2nd  
STP (shielded twisted-pair)  
stream ciphers   2nd  
stream mode  
strict source routing  
Structured Query Language (SQL)  
structured wiring   2nd  
       backbone cabling system   2nd   3rd   4th  
       horizontal cabling system   2nd   3rd  
       work area specification  
structures
       directories
               modeling   2nd   3rd  
       IPX packets   2nd   3rd  
       Netware directories   2nd  
               Bindery   2nd  
               Bindery Services   2nd   3rd   4th   5th  
               comparing Bindery/NDS   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  
               configuring NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  
               NDS (NetWare Directory Service)   2nd   3rd   4th   5th   6th   7th   8th   9th  
su command   2nd   3rd  
subheaders
       LLC   2nd   3rd  
sublayers
       Media Access Control   2nd  
subnets
        multi-homed systems   2nd  
subnetting
       IP addresses   2nd   3rd   4th   5th   6th   7th   8th  
subordinate reference replicas   2nd  
subsets .   [See also global catalog]
success, measuring upgrades   2nd  
SUID (Set User ID)   2nd   3rd   4th   5th  
suites
       protocols
               NetWare   2nd  
       protocols.   [See also protocols]2nd   [See also protocols]
summarization
       global catalog   2nd  
Sun
       StarOffice  
supernetting
       IP addresses   2nd   3rd   4th   5th   6th  
superscopes .   [See also scope]
support
       BOOTP  
       costs
               evaluating   2nd  
       UNIX
               protocols/utilities   2nd   3rd   4th   5th   6th  
       Windows NT
               UNIX protocols/utilities   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th  
surveying
       users   2nd   3rd  
SVC (switched virtual circuit)   2nd  
SVC (switched virtual connection)  
SVR4 (System V, Release 4)   2nd  
       administration commands   2nd   3rd   4th   5th   6th  
       commands   2nd   3rd   4th   5th   6th  
swapping out.   [See upgrading]
switched virtual circuit (SVC)   2nd  
switched virtual connection (SVC)  
switches   2nd   3rd   4th   5th   6th   7th   8th  
       10Base-2 networks   2nd   3rd   4th  
       applying  
        collapsed backbones   2nd   3rd   4th   5th  
       collision domains
               segmenting   2nd  
       collisions   2nd   3rd  
       fabric switched topology   2nd   3rd   4th   5th  
        full-duplex ethernet   2nd   3rd   4th  
       hardware types   2nd   3rd   4th  
               chassis  
               cut-through switches   2nd   3rd  
               home offices   2nd  
               Layer 3 switches   2nd  
               stackable  
               store-and-forward switches   2nd  
       managing  
       mixed topologies   2nd   3rd   4th  
       network segments   2nd   3rd  
       results  
       troubleshooting  
       upgrade from bridges   2nd   3rd   4th   5th   6th  
switching
       layer-3  
       MPLS  
       multi-protocol label   2nd   3rd  
       routing
               combining   2nd  
       VLAN (virtual LAN)   2nd   3rd   4th   5th  
               purchasing   2nd   3rd  
Sygate Personal Firewall Pro  
Symantec Security Response  
symbols
       ARCnet   2nd   3rd   4th   5th   6th   7th   8th  
symmetric encryption   2nd   3rd   4th   5th  
       digital certificates   2nd   3rd   4th  
       SSL handshakes   2nd  
SYN (synchronization) flooding   2nd  
synchronization
       full/partial   2nd  
       NetWare   2nd   3rd  
       one-way sessions
               MSDSS   2nd   3rd   4th   5th  
       servers
               NDS Manager   2nd  
       troubleshooting   2nd  
       two-way sessions
               MSDSS   2nd  
synchronization (SYN) flooding   2nd  
Synchronization profile  
synchronizing
       passwords   2nd   3rd   4th  
Synchronous Connection-Oriented (SCO)   2nd   3rd  
syslog
       Linux/Unix   2nd   3rd   4th   5th   6th   7th  
syslog daemon  
syslog utility  
SYSPRINT.SEP  
System Code (SC)  
system flags   2nd  
System Information MMC utility  
system log files
       Linux/Unix   2nd   3rd  
System Management Server (SMS)  
System Management Server.   [See SMS]
System V, Release 4 (SVR4)   2nd  
       administration commands   2nd   3rd   4th   5th   6th  
       commands   2nd   3rd   4th   5th   6th  
systems
       multi-homed   2nd  
Systems Network Architecture (SNA)  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net