Microsoft Windows Server 2003 Deployment Kit—Deploying Microsoft Internet Information Services (IIS) 6.0 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Microsoft Windows Server 2003 Deployment Kit—Deploying Microsoft Internet Information Services (IIS) 6.0 [Electronic resources] - نسخه متنی

Microsoft Corporation

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید













S


scalability

A measure of how well a computer, service, or application can grow to meet increasing performance demands. For server clusters, the ability to incrementally add one or more systems to an existing cluster when the overall load of the cluster exceeds its capabilities.

See also server cluster.




schema

A representation of the structure of something. Classes in Visual Basic and C++ can be said to be schemas of objects, and objects are instances of classes. In Internet Information Services (IIS), the metabase schema represents the structure of the metabase configuration file.




scope

In programming, the extent to which an identifier, such as a constant, data type, variable, or routine, can be referenced within a program. Scope can be global or local. Scope can also be affected by the redefinition of identifiers, for example, by giving the same name to both a global variable and a local variable.




script

A kind of program that consists of a set of instructions for an application or utility program. A script can be embedded in a Web page.

See also ActiveX.

See also common gateway interface (CGI).




scripting engine

A program that interprets and executes a script.

See also script.




search expression

See Other Definition




search interface

See Other Definition




search string

See Other Definition




Secure Hash Algorithm (SHA-1)

An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places.

See also hash algorithm.




Secure Hypertext Transfer Protocol

A protocol that provides a secure Hypertext Transfer Protocol (HTTP) connection.

See also Hypertext Transfer Protocol (HTTP).

See also protocol.




Secure Sockets Layer (SSL)

A protocol that supplies secure data communication through data encryption and decryption. SSL uses RSA public-key encryption for specific TCP/IP ports. It is intended for handling commerce payments. An alternative method is Secure-HTTP (S-HTTP), which is used to encrypt specific Web documents, rather than the entire session. SSL is a general-purpose encryption standard. SSL can also be used for Web applications that require a secure link, such as e-commerce applications, or for controlling access to Web-based subscription services.




security

On a network, protection of a computer system and its data from harm or loss, implemented especially so that only authorized users can gain access to shared files.

See also authorization.




security context

The security attributes or rules that are currently in effect. For example, the rules that govern what a user can do to a protected object are determined by security information in the user's access token and in the object's security descriptor. Together, the access token and the security descriptor form a security context for the user's actions on the object.

See also object.




Selectable Cryptographic Service Provider

See cryptographic service provider (CSP).




server

In general, a computer that provides shared resources to network users.

See also client.

See also shared resource.




server certificate

A unique digital identification that forms the basis of a Web server's Secure Sockets Layer (SSL) security features. Server certificates are obtained from a mutually trusted, third-party organization, and they provide a way for users to authenticate the identity of a Web site.




server cluster

A group of computers, known as nodes, working together as a single system to ensure that mission-critical applications and resources remain available to clients. A server cluster presents the appearance of a single server to a client.

See also cluster.

See also node.




server node

An individual computer in a server cluster.




server process

A process that hosts Component Object Model (COM) components. A COM component can be loaded into a surrogate server process, either on the client computer (local) or on another computer (remote). It can also be loaded into a client application process (in-process).




server-side include (SSI)

A mechanism for including dynamic text in World Wide Web documents. Server-side includes are special command codes that are recognized and interpreted by the server; their output is placed in the document body before the document is sent to the browser. Server-side includes can be used, for example, to include the Date and Time stamp in the text of the file.




session key

A digital key that is created by a client, encrypted, and then sent to a server. This key is used to encrypt data that is sent by the client.




shared resource

Any device, data, or program that is used by more than one program or one other device. For Windows, shared resource refers to any resource that is made available to network users, such as folders, files, printers, and named pipes. Shared resource can also refer to a resource on a server that is available to network users.

See also server.




Simple Mail Transfer Protocol (SMTP)

A TCP/IP protocol for sending messages from one computer to another on a network. This protocol is used on the Internet to route e-mail.




Simple Network Management Protocol (SNMP)

The network management protocol of TCP/IP. In SNMP, agents or clients monitor the activity of various devices on the network and report to the network console workstation. The agents or clients can be hardware as well as software. Control information about each device or service is maintained in a structure known as a management information block. One way to access this information is with Performance Counters.

See also Management Information Base (MIB).




single-threaded apartment (STA)

A form of threading that is supported by Component Object Model (COM). In a single-threaded apartment model, all objects are executed on a single thread and each thread resides within its own apartment.




SMTP

See Simple Mail Transfer Protocol (SMTP).




snap-in

A type of tool that you can add to a console supported by Microsoft Management Console (MMC). A stand-alone snap-in can be added by itself; an extension snap-in can be added only to extend the function of another snap-in.




sniffer

An application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet.

See also packet.




SNMP

See Simple Network Management Protocol (SNMP).




socket

An identifier for a particular service on a particular node on a network. The socket consists of a node address and a port number, which identifies the service. For example, port 80 on an Internet node indicates a Web server. There are two kinds of sockets: streams (bidirectional) and datagrams.

See also datagram.

See also node.




SSI

See server-side include (SSI).




SSL

See Secure Sockets Layer (SSL).




STA

See single-threaded apartment (STA).




stateful object

An object that holds private state accumulated from the execution of one or more client calls.




stateless object

An object that does not hold private state accumulated from the execution of one or more client calls.




static page

A Hypertext Markup Language (HTML) page that is prepared in advance of a request for it and that is sent to the client upon request. This page takes no special action when it is requested.

See also dynamic page.




structured query language (SQL)

A widely accepted standard database sublanguage used in querying, updating, and managing relational databases.




subkey

An element of the registry that contains entries or other subkeys. A tier of the registry that is immediately below a key or a subtree (if the subtree has no keys).

See also key.

See also registry.




subnet mask

A 32-bit value that enables the recipient of Internet Protocol version 4 (IPv4) packets to distinguish the network ID and host ID portions of the IPv4 address. Typically, subnet masks use the format 255.x.x.x. IPv6 uses network prefix notations rather than subnet masks.

See also IP address.




symmetric encryption

An encryption algorithm that requires the same secret key to be used for both encryption and decryption. Because of its speed, symmetric encryption is typically used when a message sender needs to encrypt large amounts of data. Also called secret key encryption.

See also public key encryption.




System Data Source Name (DSN)

A name that can be used by any process on the computer. Internet Information Services (IIS) uses system DSNs to access Open Database Connectivity (ODBC) data sources.




systemroot

The path and folder name where the Windows system files are located. Typically, this is C:\Windows, although you can designate a different drive or folder when you install Windows. You can use the value %systemroot% to replace the actual location of the folder that contains the Windows system files. To identify your systemroot folder, click Start, click Run, type %systemroot%, and then click OK.




Systems Network Architecture (SNA)

A communications framework developed by IBM to define network functions and establish standards for enabling computers to share and process data.




/ 174