The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 921

Legislation.See alsoLaw(s)
electronic signature,V2: 227
Internet privacy,V1: 488
Leisure activities, digital economy and,
V1:489– 490
Lempel–Ziv dictionary coding,V1: 397
Liability, disclaimers of,V1: 344
Liberty Alliance,V1:496, 497, 502, 504
Libraries.See alsoActiveX Template
Library (ATL); Berkeley Digital
Library SunSITE; Bulletin Board for
Libraries (BUBL); Digital libraries;
Digital Library eXtension Service
(DLXS) software suite; Dynamic Link
Library (DLL) modules; ebrary;
Internet Archive; Internet Library of
Early Journals; Internet Public
Library; Internet Public Library; Joint
Conference on Digital Libraries
(JCDL); Library management;
National Digital Library Program
(NDLP); NetLibrary; ODBC Cursor
Library (ODBCCR32.DLL); Oxford
University Bodleian Library; Project
Gutenberg; Standard Template Library
(STL); Template libraries; World Wide
Web Virtual Library
as Internet access points,V1: 469
exemption from circumvention
provisions,V1: 310
research and,V3:206 –207
virtual,V2:789–790
Library for Web Access in Perl (LWP),
V3:46–47
Library management,V2:477– 485
information professionals in,
V2:483– 484
Internet and,V2:477– 481
library function management,
V2:481– 483
planning of,V2:481– 482
Library materials:
acquisition of,V2: 479
circulation of,V2: 480
License-controlled model,V1: 42
Licensing,V1: 15
export,V2: 238
open source,V2:819, 826, 827, 829–830
Lie & Bos recommendations, for CSS
practices,V1:160 –161
Lifetime Customer Value (LCV),
V1:318–319, 324
Lightweight Directory Access Protocol
(LDAP), security with,V2:328–329
Limewire,V3: 30
Linear and Time-Invariant (LTI) system,
V1: 463
Linear programming models,V3:392–393
Line filters,V3:74 –75
Line of Sight (LOS) propagation,V3: 125
Link Access Protocol—D (LAPD) channel,
V2: 184
Linkage information, use by search
engines,V3:741–743
Linkers,V1:165–166, 174
Linking.See alsoIdentity linking
copyright infringement and,V1: 306
law of,V1:348–349
Linking agreements,V1: 348
Link layer,V1: 200

Link manager, BluetoothTM,V1: 89
Link Manager Protocol (LMP),V1: 89
Link pseudoclasses,V1: 157
Linux operating system,V2:486 – 498,
823–825
Beowulf and,V3: 27
development of,V2: 493
distributions of,V2:494 – 495
future of,V2:495– 496
hardware architectures and,V2: 494
history of,V2:491– 494
password issues related to,V3: 8
popularity of,V2: 493
usefulness of,V2:488– 491
vendor support for,V2:494 – 495
worms for,V1: 256
Lion worm,V1: 256
Liquid Crystal Displays (LCDs), for virtual
reality,V3: 591
Listservs,V2:69, 279, 302, 749–750;
V3:205–206
disputes concerning,V2: 747
Literacy, in developing nations,
V1:435– 436
Literature review, on nonprofit
organizations and Internet,
V2:675–676
Litigation,V2:459, 747.See alsoDispute
resolution; Law(s)
Live streaming webcasting,V3:679–680
LLC sublayer protocols,V1:177–178
Lloyd algorithm,V1: 390
Load balancing,V2:499–514
approaches to,V2: 509
client-side,V2:502–503, 512
described,V2:499–500
Internet services workload
characteristics and,V2:500 –502
network-side,V2:509–512
server-side,V2:503–509
state-blind versus state-aware,V2: 503
strategies for,V2:502–503
Load testing,V1: 150
Loans, online,V2: 727
Local Access and Transport Areas (LATAs),
V3: 168
Local application logic,V1: 195
Local Area Networks (LANs),V1:85, 142,
176, 183, 261, 271;V2:515–526, 603.
See alsoLAN entries; Wireless LANs
(WLANs)
administration of,V2:524 –525
hardware and media associated with,
V2:518–520
installing,V2:522–524
role and applications of,V2:520 –521
types of,V2:516 –518
Local Exchange Carriers (LECs),V3:776,
788
Locality-Aware Request Distribution
(LARD),V2: 508
Localization, of business systems,V1: 116
Locally constrained ASPs (Application
Service Providers),V1: 37
Local presentation,V1: 195
Location-based personalization,V3:56 –57
Location-based services,V1: 607
Locked cabinets,V3: 706
Lock types, recordset,V1:30, 34
“Log analysis” packages,V2: 694

Log-based user identification,V3: 55
Log-file analyzers,V1: 405
Log files,V1: 410
Logic, trivalue,V3: 355
Logical Link Control and Adaptation
Protocol (L2CAP), BluetoothTM,
V1:90 –91
Logical operations,V1: 23
Logic bombs,V1:252, 334
“Log-in” trojans,V1: 250
Logistics,V3: 392
in supply chain management,V3: 368
Long-arm statutes,V1:346, 351
LONGDESC attribute,V3:479– 480
Long-term fading,V3:130 –131
Loop generators/editors,V2:653–654
Looping statements (loops),V2: 408
C/C++,V1:169–170
Perl,V3: 38
Los Angeles Timessite,V2: 762
Losses, disaster-related,V1:537, 547
Lossless data compression,V1:384,
385–389, 398, 458;V3:308, 537, 558
Lossy data compression,V1:384, 389–396,
398, 458, 561;V3:308, 537, 558
Lotus Notes for Domino,V2: 68
LoveLetter,V1: 251
Loyalty programs,V1:321–322, 324
Lurking,V2: 280

Machine code,V1: 165
Machine language,V1: 236
Machine learning,V2:356 –358, 532
“Machine” politics,V3:84 –85
Machine Readable Cataloging (MARC),
V2: 485
Mach microkernel,V2: 492
Macroergonomics,V2:141–142
MacroList,V1: 254
Macromedia Flash,V2:649, 657, 658.See
alsoFlash entries
Macros,V1: 254
Macro viruses,V1:248, 254 –255, 259, 328
MAC sublayer protocols,V1:177.
See alsoMessage Authentication Codes
(MACs)
“Mafia Boy” cyberterrorist,V1: 353
Magazines, electronic,V2:756.See also
Journals
Mail Application Programing Interface
(MAPI),V1: 249
Mailing lists,V3:205–206
Mail Order/Telephone Order (MOTO)
transactions,V1:637, 638
Mail Transfer Agent (MTA),V1: 180
Mainframe/thin client network operating
system,V2:543–544
Maintenance, Repair, and Operations
(MRO) material,V1:110, 120
activities with,V1: 658
Malicious parties,V1: 55
Malware,V1:250, 259
Managed Beans (MBeans),
V2:397–398
Managed care,V2:99–100
Managed colocation services,V3:706 –709
Managed Service Providers (MSPs),
V3:699–700.See alsoWeb hosting
entries
facility neutrality of,V3: 708
Free download pdf