Microsoft Windows Server 2003 Deployment Kit—Deploying Microsoft Internet Information Services (IIS) 6.0 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Microsoft Windows Server 2003 Deployment Kit—Deploying Microsoft Internet Information Services (IIS) 6.0 [Electronic resources] - نسخه متنی

Microsoft Corporation

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید













M


Mail or Messaging Application Programming Interface (MAPI)

An open and comprehensive messaging interface that is used by developers to create messaging and workgroup applications, such as e-mail, scheduling, calendars, and document management. In a distributed client/server environment, MAPI provides enterprise messaging services within Windows Open Services Architecture (WOSA).




malicious user

A person who has legitimate access to a system and poses a security threat to it, such as someone who tries to elevate their user rights to gain access to unauthorized data.

See also security.

See also user rights.




Management Information Base (MIB)

Information about aspects of a network that can be managed by using the Simple Network Management Protocol (SNMP). This information is formatted in MIB files that are provided for each service that can be monitored. Most third-party monitors (clients) use SNMP and MIB files to monitor Web, File Transfer Protocol (FTP), and other Windows services. Using SNMP, developers or system administrators can write their own custom monitoring applications.




MAPI

See Mail or Messaging Application Programming Interface (MAPI).




master properties

In Internet Information Services (IIS), properties that are set at the computer level that become default settings for all Web or File Transfer Protocol (FTP) sites on that computer.

See also inheritance.




MD5

An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication. A hashing scheme is a method for transforming data (for example, a password) in such a way that the result is unique and cannot be changed back to its original form. The Challenge Handshake Authentication Protocol (CHAP) uses challenge-response with one-way MD5 hashing on the response. In this way, you can prove to the server that you know your password without actually sending the password over the network.

See also hash algorithm.

See also MD5.




MDAC

See Microsoft Data Access Components (MDAC).




Message Queuing

A message queuing and routing system for Windows that enables distributed applications running at different times to communicate across heterogeneous networks and with computers that may be offline. Message Queuing provides guaranteed message delivery, efficient routing, security, and priority-based messaging. Formerly known as MSMQ.




metabase

A hierarchical store of configuration information and schema that is used to configure Internet Information Services (IIS). The metabase performs some of the same functions as the system registry, but it uses less disk space. In physical terms, the metabase is a combination of the MetaBase.xml and MBSchema.xml files and the in-memory metabase.




metabase configuration file

A file that stores Internet Information Services (IIS) configuration settings to disk. This file is named MetaBase.xml by default. When IIS is started or restarted, the configuration settings are read from MetaBase.xml into the IIS cache in memory, which is called the in-memory metabase.




metabase schema

The master configuration file (MBSchema.xml) supplied with Internet Information Services (IIS) that contains all of the predefined properties from which metabase entries are derived.




metadata

Data that is used to describe other data. For example, Indexing Service must maintain data that describes the data in the content index.




method

A procedure (function) that acts on an object.




MIB

See Management Information Base (MIB).




Microsoft Data Access Components (MDAC)

Consists of ActiveX Data Objects (ADO), the Remote Data Service (RDS), Microsoft OLE DB Provider for ODBC, Open Database Connectivity (ODBC), ODBC drivers for Microsoft SQL Server, Microsoft Access and other desktop databases, as well as Oracle databases.




middle tier

The logical layer between a user interface or Web client and the database. This is typically where the Web server resides and where business objects are instantiated. Also known as application server tier.

See also client tier.

See also data source tier.




modem(modulator/demodulator)

A device that enables computer information to be transmitted and received over a telephone line. The transmitting modem translates digital computer data into analog signals that can be carried over a telephone line. The receiving modem translates the analog signals back to digital form.




MSMQ

See Message Queuing.




MTA

See multithreaded apartment (MTA).




multiple identities

Multiple Web sites that are hosted on one computer. Also called virtual servers.




Multipurpose Internet Mail Extensions mapping (MIME mapping)

A method of configuring browsers to view files that are in multiple formats. An extension of the Internet mail protocol that enables the sending of 8-bit-based e-mail messages, which are used to support extended character sets, voice mail, facsimile images, and so on.




multithreaded apartment (MTA)

A form of multithreading that is supported by Component Object Model (COM). In a multithreaded apartment model, all of the threads in the process that have been initialized as free-threaded reside in a single apartment.




multithreading

Running several processes in rapid sequence within a single program, regardless of which logical method of multitasking is being used by the operating system. Because the user's sense of time is much slower than the processing speed of a computer, multitasking appears to be simultaneous, even though only one task at a time can use a computer processing cycle.




/ 174