Microsoft Windows Server 2003 Deployment Kit—Deploying Microsoft Internet Information Services (IIS) 6.0 [Electronic resources]

Microsoft Corporation

نسخه متنی -صفحه : 174/ 133
نمايش فراداده

E

early binding

Occurs when an object is assigned to a variable that is declared to be of a specific object type. Early bound objects allow the compiler to allocate memory and perform other optimizations before an application executes.

encapsulation

The method used to pass data from one protocol over a network within a different protocol. Data from one protocol is wrapped with the header of a different protocol. Encapsulation is described in RFC 1483.

See also protocol.

encryption

The process of disguising a message or data in such a way as to hide its substance.

See also public key encryption.

See also symmetric encryption.

encryption key

A bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data.

See also private key.

See also public key.

Ethernet

The IEEE 802.3 standard that uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the medium access control. Ethernet supports different mediums, such as coaxial cable, fiber-optic cable, and twisted-pair wiring, and different data rates, such as 10 megabits per second (Mbps).

event

Any significant occurrence in the system or an application that requires users to be notified or an entry to be added to a log.

Event Log service

A service that records events in the system, security, and application logs. The Event Log service is located in Event Viewer.

See also event.

See also event logging.

See also Event Viewer.

event logging

The process of recording an audit entry in the audit trail whenever certain events occur, such as services starting and stopping or users logging on and off and accessing resources.

See also auditing.

See also event.

See also Event Viewer.

Event Viewer

A component you can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. Event Viewer maintains logs about program, security, and system events.

See also event.

See also event logging.

extended partition

A type of partition that you can create only on basic master boot record (MBR) disks. Extended partitions are useful if you want to create more than four volumes on a basic MBR disk. Unlike primary partitions, you do not format an extended partition with a file system and then assign a drive letter to it. Instead, you create one or more logical drives within the extended partition. After you create a logical drive, you format it and assign it a drive letter. An MBR disk can have up to four primary partitions or three primary partitions, one extended partition, and multiple logical drives.

See also logical drive.

See also partition.

Extensible Markup Language (XML)

A meta-markup language that provides a format for describing structured data. This facilitates more precise declarations of content and more meaningful search results across multiple platforms. In addition, XML enables a new generation of Web-based data viewing and manipulation applications.

See also Hypertext Markup Language (HTML).

extranet

A limited subset of computers or users on a public network, typically the Internet, that can access an organization's internal network. For example, the computers or users might belong to a partner organization.