Index U


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

UAWG (Universal ADSL Working Group )  
UDP
       ports   2nd   3rd   4th  
UDP ( User Datagram Protocol)   2nd  
       headers  
       ICMP interaction  
       TCP/IP   2nd  
UIDs (Unique Identifiers)  
unacknowledged protocols
       IP (Internet Protocol)  
UNI (User-Network Interface)   2nd  
unicast addresses  
UNICODE  
Uniform Resource Identifier (URI)  
Uniform Resource Locator (URL)  
Uninterruptable Power Supply.   [See UPS]2nd   [See UPS]
uninterruptible power supply.   [See UPS]
Unique Identifiers (UIDs)  
universal ADSL  
Universal ADSL Working Group (UAWG)  
universal commands  
universal groups  
Universal Network Boot  
universal serial bus (USB)  
Unix
       auditing   2nd   3rd   4th  
               syslog   2nd   3rd   4th   5th   6th   7th  
               system log files   2nd   3rd  
       commands  
       DNS servers
               configuration   2nd  
       eDirectory  
       ifconfig command   2nd   3rd   4th   5th  
       login
               troubleshooting   2nd   3rd  
       monitoring   2nd   3rd   4th  
               syslog   2nd   3rd   4th   5th   6th   7th  
               system log files   2nd   3rd  
       netstat command   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th  
       NFS   2nd  
       NFS (Network File System)   2nd  
               configuring  
               daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  
               procedures   2nd   3rd   4th  
               RPC   2nd   3rd  
               server-side daemons   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
               troubleshooting   2nd   3rd   4th  
               XDR   2nd  
       NIS (Network Information Service)   2nd  
       NIS (Network Information System)   2nd  
       permissions
               viewing   2nd  
       printers
               configuring   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th  
               SVR4   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
UNIX
       protocols   2nd   3rd   4th   5th  
               BOOTP   2nd   3rd   4th   5th   6th  
               DHCP   2nd   3rd   4th   5th   6th  
               TCP/IP   2nd   3rd  
               telnet   2nd   3rd   4th   5th   6th  
               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
Unix
       r-commands  
       SAMBA   2nd  
       SFU (Services for Unix 3.0)   2nd   3rd  
               ActiveState ActivePerl 5.6  
               installing   2nd   3rd   4th   5th  
               Korn Shell commands   2nd   3rd   4th   5th  
               password synchronization   2nd   3rd   4th  
               Telnet   2nd   3rd   4th  
               user name mapping   2nd  
       SFU (Services for Unix)
               Korn Shell commands   2nd  
               telnet  
       SOHO   2nd   3rd  
       TCP/IP   2nd  
       users   2nd   3rd   4th   5th   6th   7th   8th   9th  
               /etc/groups file   2nd  
               /etc/passwd file   2nd   3rd   4th   5th  
               administration   2nd  
               modifying accounts   2nd   3rd   4th  
               shadow password file   2nd  
UNIX
       utilities   2nd   3rd   4th   5th  
               BOOTP   2nd   3rd   4th   5th   6th  
               DHCP   2nd   3rd   4th   5th   6th  
               FTP   2nd   3rd   4th  
               TCP/IP   2nd   3rd  
               telnet   2nd  
               TelnetXXX   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
unreliable protocols
       IP (Internet Protocol)  
update sequence numbers (USNs)  
UPDATE state  
updates
       routers   2nd   3rd   4th  
updating
       DHCP
               configuring dynamic updates   2nd   3rd   4th  
       security   2nd  
upgrading
       10Base-2 networks
               10Base-T networks   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th  
       applications   2nd   3rd   4th   5th  
       ARCnet
               Eternet   2nd  
               Ethernet   2nd   3rd   4th  
               Token-Ring   2nd   3rd   4th  
       BDCs (Backup Domain Controllers)   2nd  
       bridges to routers and switches   2nd   3rd   4th   5th   6th   7th   8th  
               addressing issues   2nd  
               management issues  
               network protocol issues   2nd  
       Ethernets   2nd   3rd   4th  
                phasing into Token-Ring networks   2nd   3rd   4th   5th   6th   7th  
               replacing Token-Ring equipment  
               routing   2nd  
       fiber- optic cables  
       networks
               avoiding sidetracks   2nd  
               closing  
               deploying   2nd   3rd  
               determining needs for   2nd   3rd   4th   5th   6th   7th  
               documenting planning   2nd  
               executing pilot programs   2nd  
               maintaining support   2nd  
               mapping   2nd   3rd  
               measuring success   2nd  
                notifying users   2nd  
               optimizing   2nd   3rd  
               planning   2nd   3rd   4th   5th  
               restoring   2nd  
               scheduling downtime  
                surveying users   2nd   3rd  
               testing   2nd   3rd   4th  
               tracking  
               training   2nd  
               verifying corporate standards   2nd  
               verifying;setting goals  
       operating systems   2nd   3rd   4th   5th  
       PDCs (Primary Domain Controllers)   2nd   3rd   4th   5th  
       Windows 2000 Server   2nd   3rd  
       Windows 2003 Server   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th  
uplink ports  
UPS   2nd  
UPS (Uninterruptable Power Supply)
       as physical network security measure   2nd  
UPS (uninterruptible power supply)   2nd   3rd   4th   5th  
       ACPI (Advanced Configuration and Power Interface)   2nd   3rd   4th  
       network devices  
URI   2nd   3rd   4th   5th  
URI (Uniform Resource Identifier)  
URL   2nd   3rd   4th   5th  
URL (Uniform Resource Locator)  
URN   2nd   3rd   4th   5th  
USB (universal serial bus)  
user accounts   2nd   3rd  
       delegating authority for network security   2nd  
       tracking  
User Datagram Protocol (UDP)   2nd   3rd  
       headers  
       ICMP interaction  
       TCP/IP   2nd  
User Environment Profile dialog box  
user identification
       network security measures   2nd   3rd  
               passwords   2nd   3rd   4th   5th   6th   7th  
User Manager   2nd   3rd  
User Manager utility   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
User object  
user-level permissions   2nd  
       Windows NT/2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
User-Network Interface (UNI)   2nd  
useradd command
       Unix  
usernames
       interdomain trust relaitonships   2nd   3rd   4th  
               creating   2nd   3rd   4th   5th  
       tracking   2nd  
users
       accounts
               Account Information dialog box   2nd   3rd   4th   5th  
               complete trusts models   2nd  
               creating trust relationships   2nd   3rd   4th   5th  
               interdomain trust relationships   2nd   3rd   4th  
               managing   2nd   3rd   4th   5th  
               moving between Linux/NetWare   2nd   3rd  
               searching   2nd   3rd  
               Windows NT   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       assigning  
       authentication
               Linux/NetWare  
       complaints
               determining needs for network upgrades  
       Domain Admins groups  
       domaind
               creating   2nd   3rd  
       global catalog   2nd  
       grouping
               modeling directories   2nd   3rd  
       groups
               creating   2nd  
               Windows 2000   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       Linux   2nd   3rd   4th   5th   6th   7th   8th   9th  
       Linux GUI utility
               managing   2nd   3rd   4th   5th   6th   7th   8th   9th  
        names
               mapping   2nd  
       pass-through authentication  
       profiles   2nd  
       surveying   2nd   3rd  
       time
               limiting   2nd  
       training   2nd  
       Unix   2nd   3rd   4th   5th   6th   7th   8th   9th  
               /etc/groups file   2nd  
               /etc/passwd/ file   2nd   3rd   4th   5th  
               administration   2nd  
               modifying accounts   2nd   3rd   4th  
               shadow password file   2nd  
       upgrades
               notifying   2nd  
       Windows NT
               adding to groups   2nd  
               assigning group memberships   2nd  
               built-in user groups   2nd   3rd  
               creating groups   2nd   3rd  
               groups   2nd  
               managing accounts   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       workstations
               limiting   2nd  
using vertical-market software  
USNs (update sequence numbers)  
utilites
       AUDITCON   2nd   3rd   4th   5th   6th  
       syslog
               linux/Unix   2nd   3rd   4th   5th   6th   7th  
utilities
       Administration Tools
               installing   2nd  
       ADMT  
       Event Viewer   2nd  
       File Migration  
       finger   2nd   3rd   4th   5th  
       iPrint (NetWare)   2nd  
       Linux GUI
               managing users   2nd   3rd   4th   5th   6th   7th   8th   9th  
       MMC (Microsoft Management Console)  
               Action menu   2nd  
               computer management   2nd   3rd   4th   5th   6th  
               properties   2nd   3rd   4th   5th  
               User Manager   2nd   3rd  
       nslookup   2nd  
       NWADMN32   2nd   3rd  
       PCONSOLE Bindery  
       R-utilities  
               authorization   2nd   3rd  
               rcp   2nd   3rd  
               rlogin   2nd   3rd   4th   5th   6th   7th   8th  
               rsh   2nd   3rd   4th  
                ruptime command   2nd  
               rwho command   2nd  
       Secure Shell (SSH)   2nd  
       SYSCON   2nd   3rd   4th   5th   6th  
       syslog  
       Tripwire   2nd   3rd  
       UNIX   2nd   3rd   4th   5th  
               BOOTP   2nd   3rd   4th   5th   6th  
               DHCP   2nd   3rd   4th   5th   6th  
               FTP   2nd   3rd   4th  
               TCP/IP   2nd   3rd  
               telnet   2nd  
               Telnetxxx   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  
       User Manager   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  
       Windows 2003 Server
               Application Compatibility Toolkit   2nd  



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net