List of Tables

| Table of Contents | List of Figures | List of Tables |

Table 1. Contents of Each Chapter
Table 2-1. NIS Daemons by System Type
Table 2-2. Default Nicknames for Maps
Table 2-3. Local Files Consulted by NIS
Table 2-4. Local File Entries to Control Access
Table 3-1. Maps, ASCII Files, and Descriptions
Table 5-1. Sample User Groups
Table 5-2. Sample Host Groups