P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
INDEX 929resource misappropriation and,
V3:69–70
threats to resources,V3:64 –69
Physicians, Internet and,V2:586 –591.See
alsoElectronic medical records;
Medical entries
Piconets,V1:93, 95
Pilgrimages, religious,V2: 806
PillBid auction site,V1: 131
PillBot database,V1: 131
“Ping flooding” denial-of-service attack,
V1: 363
“Pinging” method,V1: 67
Piracy.SeeSoftware piracy
Pivoting,V2:691, 692
Place-based communities, online,
V2:738–739
Plagiarism,V2:469– 470
Plain Old Telephone Service (POTS),
V2:540 –541;V3:667.See also
Telephone entries
Plaintext,V1:686, 694
Plan-Do-Check-Act (PDCA) cycle,V2:169,
175
Planning, c-commerce,V1:210 –212.See
alsoBusiness plans; Capacity
planning; Disaster recovery planning;
E-commerce project marketing plans;
Enterprise Resource Planning (ERP);
Financial planning software;
Functional planning; Human resource
planning; Resource planning; Security
planning
Platform for Internet Content Selection
(PICS),V2: 132
Platform independence,V1: 6
Platform services,V1: 208
Platform standardization,V1: 542
PLATO “Talk,”V1: 665
Plug-in applications,V1: 829
Plug-in components, Java,V2: 411
PlusShorts,V2: 209
PNG image files,V1:821–822
Pocket Internet Explorer,V2: 637
Pocket Outlook,V2: 637
PocketPass,V1: 641
PocketPC,V2:628–629
Pointcast network,V3: 678
Pointers, C/C++,V1:167–168
Pointer sites,V1:515–516, 524
Point-of-Sale (POS) systems,V1:230.See
alsoPOS servers
Point-to-point information transfer,
V1: 111
Point-to-point network,V1: 184
Point-to-point wiring,V1: 267
Point-to-Point Protocol (PPP),V1:200;
V2:323;V3: 426
Point-to-Point Tunneling Protocol (PPTP),
V2:323;V3:426, 799
Policies:
denial-of-service-attack,V1: 430
in developing nations,V1:435– 437, 438
library system,V2: 482
network,V2: 546
Political activism, DoS attacks and,
V1: 425
Political applications,V2: 296
Political campaigns,V3:90 –91
Political learning tools,V3:87–88Political participation, modes of,V3: 93
Political parties, on the Web,V3:91–92
Political sites,V2:773–774
Politics,V3:84 –95
choice and participation in,V3:85–87
institutional model of,V3: 87
“machine,”V3:84 –85
mass public and,V3:87–90
political institutions,V3:90 –93
Polymorphic viruses,V1:254, 259
Polymorphism,V3: 610
POP3 e-mail accounts,V1: 664
Pornography,V2:221–222.See alsoChild
pornography
access to,V2: 106
as a free speech issue,V2:465– 466
online,V2: 222
Pornography industry,V1: 300
PORSEL system,V3: 243
Portability, Java,V2:380 –381
Portable Document Format (PDF),
V1:772.See alsoPDF format books
files in,V1: 820
Portable Network Graphics (PNG) format,
V1:821–822
Port addresses,V1:183, 184
Portal Web site,V3: 772
Portals,V1:134, 136 –137, 486;
V2:305–309
architecture of,V2:305–307
collaborative,V2:68–69
financial,V3:277–279
intranets as,V2:346 –347
multimedia,V2:207–208
religious,V2: 804
types of,V2: 307
Port filtering,V1:832, 839
Portfolio selection, online,V3: 243
Portney, Ken,V2: 343
Ports,V2:250, 304;V3: 429
“Positive identification systems,”V1:72,
73
POS servers,V3: 253
POST method,V1:173–174
Post Office Protocol (POP),V1:664, 670.
See alsoPOP3 e-mail accounts
PostScript,V1:772, 820
Power:
calculation of received,V3:127–128
maintenance and conditioning of,
V3:74 –76
Power anomalies,V3:66 –67
Powerline LANs,V2: 539
Power loss, modeling,V3:126 –127
Power Point accessibility plug-in,V3: 490
Power supplies, uninterruptable,V1:431,
433
Power units,V3: 133
Practical Extraction and Report Language
(Perl),V1:172, 225;V2:206, 412– 413;
V3:34 –50
CGI scripts in,V1: 219
history of,V3:34 –35
network programming in,
V3:45– 49
overview of,V3:35– 43
sample programs in,V3:43– 45
Prayers, online,V2: 806
Precedence Diagramming Method (PDM),
V3: 117Precision Agriculture Systems (PAS),
V2: 27
Predictive coding,V1:392–394
Preference-based queries,V3: 58
Preference modeling,V3:57–58
Prefetching,V2: 531
Prefix codes,V1: 385
Prescription drugs,V2: 596
Presentation-Application-Data (P-A-D)
architecture,V1:194, 195, 202
Pretty-Good-Privacy (PGP) system,V1: 54
Price competition,V1: 485
Price discrimination,V1:610, 611
Priceline,V1:131–132, 287–288, 606
Pricing:
e-commerce,V1: 610
e-manufacturing,V1: 723
flexible,V1: 723
strategies for global,V1: 814
in wireless marketing,V3:856 –857
Pricing models:
advertising,V2: 566
Application-Service-Provider,V1:42– 43
Primary Key (PK),V1:375, 376, 377
Primary Rate Interface (PRI) service,
V2:182–183, 184
Primary storage,V1: 231
Primitive data types,V2: 408
Principal Register, of USPTO,V3:449, 450
Print publishing conventions,V2:791–793
Prioritization, in Web services,V3:715,
719
Privacy.See alsoConfidentiality; Private
entries
application service providers and,
V1:44–45
biometric authentication and,V1:78–79
CPA firm,V3: 153
customer database,V2: 568
customer relationship management and,
V1:322–323
cyberlaw and,V1: 341
cyberterrorism and,V1: 367
in data warehousing,V1: 422
defined,V3:96 –97
digital economy and,V1:487– 488
digital identity and,V1:493– 494
e-mail,V2:276 –277
extranet,V1: 798
in global electronic commerce,V2:58–59
human resources management and,
V2:158–159
of information,V2:470 – 473
international cyberlaw and,V2:221–226
Internet censorship and,V2:270 –271
law enforcement and,V3:99–100
library management and,V2: 484
marketing and,V2: 571
monitoring and regulating,V1: 115
online consumer,V1: 279
of personal health data,V2: 92
personalization and,V3:61–62
in securities trading,V3: 276
views of,V2:222–223
Web site design and,V1: 280
in wireless marketing,V3:855–856
Privacy law,V3:96 –107.See alsoPrivacy
policy
business and,V3:100 –101
consumer Internet privacy,V3:101–104