The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 935

Signal to Interference plus Noise (SINR)
ratio,V1: 464
Signal-to-Noise Ratio (SNR),V1:461, 466;
V3: 186
Signal variability/fading,V3:129–132
Signature-based searches, viral detection
via,V1: 257
Signatures:
typed and scanned,V1: 530
verification of,V1: 343
Sign language transmission,V2:341–343
Signpost sites,V1:515–516, 524
Simple API for XML (SAX),V1:740 –741,
754
Simple Certificate Enrollment Protocol
(SCEP),V3: 162
Simple Mail Transport Protocol (SMTP),
V1:176, 180, 182
Simple Network Management Protocol
(SNMP), security with,V2:327–328
Simple Object Access Protocol (SOAP),
V1:6, 113, 199, 495;V3:326.
See alsoXML/SOAP technology
Simple Web Indexing System for
Humans-Enhanced (SWISH-E),
V1: 519
Simulated annealing technique,V3: 394
Simulation.See also
Return-on-investment simulations
dynamic,V1: 214
Monte Carlo,V1: 149
“Single click” patent,V2: 230
Single-document interfaces,V3:638-
Single sign-on mechanisms,V3:760 –762
Single Sign-on System (SSO),V1:50 –51,
496, 502, 504
Sinks,V1: 457
Site management, online auction,V2:
709–719.See alsoWeb site entries
Site registration service,V2: 779
Situated learning,V1: 556
S/Key system,V1: 53
Skills inventories, for developing nations,
V1: 437
“Skimming,”V1: 332
Slave devices,V1: 93
Sliding window delta CRLs,V3: 164
Small and Medium-Sized Enterprises
(SMEs).See alsoSmall businesses
e-manufacturing and,V1: 724
value chain analysis of,V3:534 –535
Small businesses:
banking products/services for,
V2:725–726
online shopping and e-procurement for,
V2:729–730
Small Office, Home Office (SOHO),
V1: 302
firewalls for,V1: 839
Small office networks, LAN technologies
for,V2:539–540
Smart cards,V1: 644
payment systems based on,V1: 641
Smart downloads,V1:565, 567
Smart objects,V1: 558
Smart phones,V2:631–632;V3: 829
SMART project,V1: 37
“Smilies,”V2: 275
S/MIME standards,V1: 54
SMPTE standard,V3:540, 541

Sniffers,V3: 740
Snooping TCP,V3: 841
Social engineering,V1:330 –331
awareness of,V3: 79
password attacks and,V3:7–8
physical security and,V3: 69
Society,V2:464 – 476
cybersecurity for,V1:365–366
effects of cyberterrorism on,V1:363–364
effects of Internet on,V2:105, 106
public relations and,V2:781–782
Society of Motion Picture and Television
Engineers (SMPTE),V1: 700
Sociocultural factors, Internet diffusion
and,V2:46–47
Socket library,V3: 715
Socket programming,V2: 5
Sockets,V1: 174
WinSock support of,V3: 638
Socks proxy server,V1:833, 834
Soft handoff,V3: 820
“Softlifting,”V3:297–298
“Softloading,”V3: 298
Software,V1:230, 368.See alsoFree
Software Movement; Free Software
Movement (FSM); Web site software
architectural complexity of,V3: 138
capacity-planning,V1: 149
classes of,V1:238–240
cloning,V3: 298
commercial,V1: 576
component,V1:198–199
as a cyberterrorist tool,V1:361–362
database,V1: 111
denial-of-service attacks and,V1: 426
downloading,V1:345, 828
e-commerce,V3:137–138
e-procurement,V1: 655
evolution and obsolescence of,
V3:137–138
IRC client,V2:313–314
LAN,V2: 520
leasing,V1: 46
life cycle of,V3:135–136
open source,V2:826 –827
resource requirements for,V1: 147
sabotage of,V1: 427
tax preparation,V3: 148
technology and,V1: 236
telecommuting,V3: 445
Software agents,V1:291, 293, 607
Software and Information Industry
Association (SIIA),V3:299, 303
Software architecture:
Java and,V2:398–399
for Web searching,V3:744 –746
Software copyright,V3:302–303
Software development,V3: 288
models for,V1:40–42
outsourcing of,V1: 486
prototyping in,V3:136 –137
Software Development Kit (SDK),
ActiveX,V1: 18
Software distribution applications,
V2: 295
Software extranets,V1: 797
Software licensing/distribution models,
V1: 42
Software patents,V1:484;V3: 303
international cyberlaw and,V2:229–230

Software Performance Engineering (SPE),
V1:146 –148, 151
assessment requirements for,
V1:147–148
for Web-based applications,V1: 148
Software piracy,V3:297–306.See also
Theft
enforcement efforts against,
V3:303–305
modes of,V3:297–298
motivations for,V3:298–299
organizations that combat,V3: 299
scope and impact of,V3:299–302
software protection mechanisms against,
V3:302–305
Software projects, risk management in,
V3:229–236
Software tools, third-party,V1: 432
Solicitations, online,V1: 279
Solutions, customized,V1: 714
Sonny Bono Copyright Term Extension
Act of 1998,V1:304, 313, 338, 518
Sony mobile devices,V2: 630
Sorenson Media,V3: 564
Sort operations,V1: 235
Sotheby’s,V1: 131
Sound.SeeAudio entries; Speech entries;
Voice entries
Sound design, terminology related to,
V2:659–660
Sound production hardware,V2:654, 659
Sound production tools,V2: 653
Sound textures,V2: 660
Sound-to-image generators,V2: 654
Source decoders,V1: 459
Source encoding,V1:458, 466
Source files,V1:164, 166, 174
Sources,V1:457.See alsoE-sourcing
Source-to-pay services,V1: 127
Sourcing-intensive supply chains,V3: 389
Sourcing software,V1: 677
Sourcing strategies, in supply chain
management,V3:367–368
South Korea, e-business in,V1: 810
Spam,V1:324, 344, 355, 365
as a free speech issue,V2:466 – 467
television,V1: 701
Sparsity, OLAP and,V2:690 –691
Spatial Decision Support System (SDSS),
V2: 28
Speaker identification,V1: 73
Speaking laptops,V1: 87
Special Designated Nationals and Blocked
Persons (SDNB),V2: 239
Specialized ASPs (Application Service
Providers),V1:37–38
Speech/audio compression,V1:397;
V3:307–319.See alsoSpeech coding
applications of,V3:317–318
audio coding,V3:314 –316
quality assessment and,V3:309–310
Speech browsing,V3:482– 484
Speech coding:
standards for,V3:313–314
techniques for,V3:310 –314
Speech recognition,V1: 662
Spell checkers,V1: 238
Spider programs,V1: 137
Spiders,V3: 740
Spike testing,V1: 150
Free download pdf