P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
920 INDEXJava Server Pages (JSP),V1:226, 227, 381;
V2:415– 430.See alsoJava Database
Connectivity (JDBC); Java servlets;
JSP entries
with custom tags,V2:424 – 425
examples of,V2:419– 421
making,V2:417– 421
Web archive files and,V2: 423
Java servlets,V1:226;V2:415– 416
deploying,V2:416 – 417
Java Virtual Machine (JVM),V1:15, 23,
226, 446;V2:380, 381, 382, 392, 638,
639
Java Web Start,V2:382–383
J. B. Hunt trucking, Internet-based EDI
and,V1: 620
Jennings, Dennis,V2: 119
Jerusalem virus,V1: 254
Jini technology,V3:574, 755
Jiro technology,V3: 337
Job applicants.See alsoEmployee entries
attracting,V2: 151
Internet tracking of,V2: 152
Jobs, “virtual” previews of,V2: 151
Job specialization,V1: 723
Joins, in SQL,V3: 358
Joint Conference on Digital Libraries
(JCDL),V1: 523
Joke programs,V1: 253
Journalism.SeeNewspapers; News
services; Online news
Journal of Digital Information,V1: 523
Journals,V2:477– 478.See alsoMagazines
academic,V2: 787
benchmarking,V1: 57
online directories to,V1: 514
JPG/JPEG files,V1:398, 206, 821, 829;
V2: 788
JScript language,V1:226, 448, 763.
See alsoJavaScript entries
JSP actions,V2:418– 419
JSP directives,V2: 418
JSP tag libraries,V2:423– 425
JSTOR project,V2: 478
Junk e-mail,V1: 344
Jurisdiction,V1: 351
effects-based,V2:219–220
electronic commerce and,V2:217–221
enforcement,V2:220 –221
under European law,V2:218–219
geographic,V1: 488
in the United States,V2: 219
virtual personal,V1: 347
“Just-in-time” inventory policies,V1: 794Kazaa,V3:27, 28–29
Kerberos system,V1:53–54;
V3:797–798
Kerney, A. T.,V1: 114
Kernighan, Brian,V1: 164
Key-based authentication,V1: 526
Key Distribution Centers (KDCs),
V1:53–54;V3: 798
Key employees,V1:99–100
Key exchange, Diffie–Hellman,
V1:690 –691
Key generator programs,V1: 575
Key pair,V1: 694
Key Performance Indicators (KPIs),
V1:213, 214, 215Keys,V1: 382
database,V1:375–376
Keyset cursor,V1: 29
Key sharing,V3: 266
King, Cynthia,V2:341–343
Kiosks,V1:193, 321
public relations,V2:774 –775
Kleinrock, Leonard,V2: 244
Knowledge:
as a cyberterrorist tool,V1: 361
data versus,V2: 432
defined,V2: 432
information versus,V2: 432
Knowledge economy,V1:478, 491
Knowledge Engineering (KE),V3: 241
Knowledge management,V1:213–214;
V2:431– 441.See alsoKnowledge
Management Systems (KMSs)
defined,V2: 433
e-commerce and,V2:438– 440
example of,V2: 431
intranets and,V2: 348
Knowledge Management Systems (KMSs),
V2:433– 438
goals and strategies of,V2: 434
infrastructure of,V2:436 – 438
measuring success of,V2:438, 440
processes in,V2:434 – 436
Knowledge Representation (KR),V2: 195LAN architecture,V2:517–518.See also
Local Area Networks (LANs)
LAN connectivity,V2:538–540
LAN interconnections,V2: 540
LAN site design,V2: 523
LAN software,V2: 520
LAN standards, wireless,V3: 827
LAN topology,V2:516 –517
Lands’ End,V1:130, 136
Language independence,V1: 6
Language pseudoclass,V1: 158
Languages.SeeC/C++ languages;
Compiled languages; Dynamic
Hypertext Markup Language
(DHTML); Extensible Markup
Language (XML); Hypertext Markup
Language (HTML); Interface
Definition Language (IDL); Java
entries; JavaScript; JScript language;
Microsoft Intermediate Language
(MSIL); Object-based languages;
Object-oriented programming
languages; Practical Extraction and
Report Language (Perl); Programming
languages; Query languages;
Rule-based languages; Scripting
languages; Structured; Unified
Modeling Language (UML); Web
Services Description Language
(WSDL); Wireless Markup Language
(WML)
Lanham Act of 1946,V3: 449
Last-mile access technologies,V1: 457
“Last-mile” fulfillment,V1: 485
Latin America:
e-business in,V1: 811
Internet diffusion in,V2:43– 44
Law(s).See alsoCopyright law(s);
Cyberlaw; E-government; Government
entries; International cyberlaw;Internet law; Legal entries; Legislation;
Patent law; Regulation; Trademark law
antitrust,V1:488– 489
export,V2:237–238
global Internet,V1: 807
intellectual property,V1: 484
online stalking and,V2:816 –817
software protection,V3: 302
trademark,V3:448– 458
Web accessibility,V3:491– 492
Law enforcement,V2:443– 456
communication activities related to,
V2:448– 450
e-commerce and,V2: 450
international,V1:367–368
privacy and,V3:99–100
professional association/memorials Web
sites,V2:447– 448
training/education Web sites,V2: 447
Web sites related to,V2:444 – 448
Law enforcement agencies, exemption
from circumvention provisions,
V1: 310
Law firms,V2:457– 463
client services for,V2:460 – 461
electronic commerce and,V2: 460
in-house counsel and,V2: 461
online resources for,V2:461– 463
Law News Network,V2: 462
Lawsuits, attack-related,V1: 246
Lawyers, client services for,
V2:460 – 461
Layer 2 (L2) label-switching protocols,
V3:581–582
Layer 2 Tunneling Protocol (L2TP),
V2: 324
Layering,V1:176.See alsoLayers
models,V1:177–179
protocols,V3:322–324
technique,V2: 649
Layers,V1:183.See alsoLayering
computer networking,V3:424 – 426
Layout, in Web site design,V3: 774
LDAP password service,V1: 50
Leadership skills:
in developing nations,V1: 437
in nonprofit organizations,V2: 680
Lean manufacturing,V2: 555
Learning:
computer-based,V1:551–552
instance based,V2: 357
Learning Management Systems (LMSs),
V2: 157
Leased-line access,V3: 779
Leasing-based software licensing,V1: 42
Legal ethics,V2: 460
Legal Information Institute,V2: 462
Legal issues,V2:464 – 476.See alsoLaw(s)
ASP (Application Service
Provider)-related,V1:43– 44
censorship,V2:266 –268
free speech,V2:464 – 467
in global electronic commerce,V2:57–58
intellectual property protection,
V2:467– 470
Internet-related,V2: 452
IRC-related,V2:316 –318
for public accounting firms,
V3:152–154
Legal research,V2:457– 460, 462