The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 939

TLS 1.0,V3:270 –271
TLS protocol,V3:268–270, 271
Token ring:
cabling,V1: 269
protocol,V1: 262
Tokens,V1:530, 533
Toll fraud,V3: 659
Tomcat servlet engine,V2:415– 416
ToolBook Instructor and Assistant,
V2: 208
Topic Detection and Tracking (TDT),
V1:406, 410
Top-Level Domains (TLDs),V3: 454
Topology,V1: 271
Torvalds, Linus,V2:493– 494
Toshiba mobile device,V2: 631
Total Cost of Ownership (TCO),V1:713,
716
Total Information Quality Management
(TIQMTM),V2: 170
Total Quality Management (TQM),V1:57,
58
Tourism.SeeTravel and tourism
“Tourism consumer,”V3: 471
Tourism products,V3:465– 466, 471
Trade.See alsoGlobal electronic
commerce
agreements,V2: 235
barriers to growth of,V2: 241
international,V1:489;V2:233, 726
Trademark Act of 1946,V3: 449
Trademark law,V1:338–340, 484;V2:467;
V3:448– 458.See alsoTrademarks
claims concerning,V3:451– 452
domain names and,V3:453– 456
federal,V3:449– 450
state statutes and common law related
to,V3:450 – 451
Trademarks,V1:351.See alsoTrademark
law
dilution of,V1: 351
Internet policing of,V3:452– 453
misappropriation of,V3: 452
parody and fair use of,V3: 452
passing off,V3: 452
registration of,V3:449– 450
Trademark symbol (TM), defined,V3: 450
Trade practices, deceptive,V3: 104
Trade Related Aspects of Intellectual
Property (TRIPS),V2:58, 228
Trade secret law,V1: 484
TradeWeb,V1:676 –677
Trading Information Exchange (TIE),
V1: 127
Trading malls,V1:122–123, 124, 128
Trading model,V1: 121
Trading networks,V1: 681
Trading Process Network (TPN),V1:122,
123
Traffic:
management of,V2:260 –261
network,V3: 174
Web site,V3:701–702
Traffic support, real-time,V3:835–836
Training.See alsoWeb-Based Training
(WBT)
corporate,V1: 551
for e-government,V1:597–598
media,V3:669–671
telecommuting and,V3: 445

Transactional middleware,V1:197;
V2:610 –611
Transaction control, SQL,V3: 361
Transaction costs,V1: 611
e-commerce,V1: 609
Transaction databases,V1:375, 382
Transaction Processing (TP) monitoring
server,V1:196 –197;V2: 610
Transactions,V1:118, 382.See also
Secure Electronic Transactions (SETs)
biometric,V1: 81
digital,V1: 115
religious,V2: 805
Transaction security, on the Internet,
V1:100 –101
Transaction system,V1: 423
Transborder Data Flows (TBDFs),V2: 59
Transform coding,V1:394 –395
Transmission Control Protocol (TCP),
V1:176, 200, 433;V2:249–250;
V3:429– 431, 818, 836.See alsoTCP
entries
security with,V2: 327
for wireless networks,V3:840 –841
Transmission Control Protocol/Internet
Protocol (TCP/IP),V1:118, 179, 368;
V3:263–265, 424 – 435.See alsoTCP/IP
entries
Address Resolution Protocol and,
V3:431– 432
application protocols based on,
V3:433– 434
Internet Control Message Protocol and,
V3: 431
IP and,V3:426 – 429
layering in,V3:424 – 426
security and,V3:432– 433
TCP and,V3:429– 431
User Datagram Protocol and,V3: 431
Transmission links,V3:650 –651
Transmission loss,V3:125–129
Transmission systems, imperfections in,
V3:651–652
Transmission technologies,V1: 298
Transmission VoIP,V3: 653
Transportation:
GIS applications for,V2: 31
in supply chain management,V3: 368
Transport documentation,V2: 238
Transport layer,V1:183, 200 –201
Transport Layer Security (TLS),V2:325;
V3:262.See alsoTLS entries
alternatives to,V3:271–272
cryptographic concepts used in,
V3: 266
Transport mode,V2: 325
Transport protocols,V2:250.See alsoFile
Transfer Protocol (FTP)
Travel agencies,V3: 462
Travel and tourism,V3:459– 475.
See alsoTourism entries
applications for,V2: 293
future trends in,V3:469– 471, 472
industry structure of,V3: 464
Internet and,V3:464 – 468
virtual,V3:465– 466
Travel behavior, Internet technology and,
V3: 468
Travel Decision Support Systems (TDSSs),
V3: 466

Travelocity,V1: 136
Treasury management,V2: 726
Tree-based APIs,V1: 740
Triangulation schemes,V1: 331
Tribe Flood Network (TFN),V1: 433
Triggers,V3: 362
Trivalue logic,V3: 355
Trivial File Transfer Protocol (TFTP),
V1:427, 433
security with,V2: 330
Trojan horses,V1:250 –251, 260, 328, 329,
335, 574
Trojanizing,V1: 247
Truman Presidential Library and
Museum,V1: 518
Trust, of Internet firms,V1: 189
Trust domain,V1:496, 504
TRUSTe,V1:101;V2:58;V3: 105
Trusted gateway,V1:834, 839
Trusted third-party authentication,V1:53,
56.See alsoWeb of trust
Trust infrastructures,V1:629–630
Trustmarks,V3: 105
Trust relationships, managing,V1: 114
Trust services,V1:500, 504
Try-catch blocks,V1: 9
TSpaces,V3: 755
Tucows,V1: 97
Tunneling,V2: 323
Tunnel mode,V2:324 –325
24-hours-a-day news model,V2: 765
Twisted-pair cable,V1:267–269;
V2: 518
Twisted-pair media, IEEE Ethernet
standards for,V1: 268
2-tier systems,V1:195, 202;V2: 604
Two-way cable modem,V2: 300
Two-way Interactive Television (IATV),
V2: 110
Tymnet,V1: 118
Type selectors,V1: 157
Typographical pseudoelements,
V1: 157

UDA technology.See alsoUniversal Data
Access (UDA)
second-generation,V1: 27
third-generation,V1:27–28
U.N.SeeUnited Nations entries
Unauthorized connections,V3: 71
Uncertainty,V3: 221
in fuzzy sets,V1: 841
reasoning with,V3: 241
UN/EDIFACT standard,V1: 626
Unicast control protocols,V3: 325
Unified Modeling Language (UML),
V1:145, 151;V3: 135
Uniform Domain-Name
Dispute-Resolution Policy (UDRP),
V1:339;V3: 456
Uniform Electronic Transactions Act of
1999 (UETA),V1: 532
Uniform Resource Identifiers (URIs),
V1: 497
Uniform resource locator.SeeUniversal
Resource Locaters (URLs)
Uninterruptable Power Supplies (UPSs),
V1:431, 433;V3:75–76
Union catalog,V2: 485
Unions, C/C++,V1: 171
Free download pdf