The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 897

Asymmetric encryption,V1:693;V3: 266
Asynchronous communication,V1:669;
V2:302.See alsoAsynchronous
messaging; Asynchronous Transfer
Mode (ATM)
tools for,V1: 554
virtual teams and,V3: 604
Asynchronous groupware,V2:66, 68
Asynchronous Learning Networks (ALNs),
V1: 552
Asynchronous messaging,V1: 661
Asynchronous Transfer Mode (ATM),
V1:183;V2:181, 188–189, 245;
V3:172–173, 324, 426, 783–784.
See alsoATM Forum
modeling,V1:178–179
wireless networks with,V3:826 –829
ATM Forum,V3: 322
Atomic, Consistent, Isolation, Durable
(ACID) requirements,V1:375, 382
Attached Resource Computer Network
(ARCNet) protocols,V1:262, 266
Attacker in the middle,V1: 527
Attackers:
identifying,V2: 331
prosecuting,V1:244, 246, 331
sanctions against,V1: 245
Attacks.See alsoDenial-of-Service
(DoS) attacks; Distributed
Denial-of-Service (DDoS) attacks
ISP efforts to stop,V2:331–332
protection against,V1: 245
response to,V1:244 –245
types of,V1:427– 428
Attenuation,V3:125, 126
Attribute selectors,V1: 158
Auction business model,V1:124, 131
Auctions,V1:276, 288, 292.See alsoB2B
auctions; B2C auctions; Bid shielding;
Online auctions
bidding rules for,V2:710 –711
fraud in,V1:331–332
history of,V2:709–710
major,V2:700, 701
managers of,V2: 712
real estate,V3: 196
software for,V2: 710
supply chain management and,V3: 371
types of,V1: 678
Auction systems,V2:715–717
Audio.See alsoSpeech/audio
compression; Voice signals
books,V2: 791
coding standards for,V3: 316
collaborative virtual reality and,V3: 595
compression algorithms for,V3: 560
editors,V2: 653
files,V1:512–513, 820, 822–823
interactivity applications,V2: 656
in multimedia,V2:652–654
streaming,V2:502;V3: 318
Audio block, BluetoothTM,V1:89–90
Audio-video communications,V2: 71
Audiovisual services,V3: 88
Audit Data Analysis and Mining (ADAM),
V2: 358
Auditing, W2K,V3:798–799
Augmented reality,V1: 558
AU/SND audio files,V1: 822
Authenticated sessions,V1: 530

Authentication,V1:48–56;V2: 332
biometric,V1:
extranet,V1: 798
host,V1:52–55
Internet,V1: 49
Kerberos,V1: 54
key-based,V1: 526
message-by-message,V2:321–322
types of,V3:1–2
Web,V1:49–52
Authentication data,V1:531, 533
Authentication Header (AH),V3: 586
Authentication passwords, history of,
V3:2–3
Authentication services,V1: 500
custom,V1: 55
Authoring tools, accessibility and,V3: 489
Authoritative Web pages,V2:530;
V3:742–743
Authorization,V1: 55
Autobytel,V1: 133
Automated Clearing Houses (ACHs),
V1:624 –625
Automated RFQs,V1: 123
Automatic Fingerprint Identification
Systems (AFIS),V1: 79
Automobile manufacturers,
click-and-brick,V1:191–192
Automotive applications, BluetoothTM,
V1: 88
Autonomous System (AS),V2: 255
Auto-responders,V2: 280
Availability:
design principles for,V1: 149
measuring,V1:148–149
modeling,V1:148–149
specifying,V1: 148
Available Bit Rate (ABR),V3: 173
Avatars,V1:558;V3:593–595
AVG antiviral scanner,V1: 250
AVI files,V1: 823
Avocation communities, online,
V2: 738
Awareness training, physical security and,
V3:78–79

B2B auctions,V2: 699
B2B e-commerce,V1:716, 804.See also
Business-to-Business (B2B)
e-commerce
banking-related solutions in,V2:728–729
electronic fund transfers in,V1: 632
electronic hubs for,V1:603, 610
electronic marketplaces in,V1: 603
information quality in,V2:165–166
intelligent agents and,V2: 193
selling in,V1: 685
transactions in,V1:646, 657;V2: 604
B2C auctions,V2: 699
B2C companies,V1:96, 98, 104
B2C e-commerce.See also
Business-to-Consumer (B2C)
e-commerce
banking-related solutions in,V2: 728
information quality in,V2: 165
Internet business models for,
V1:129–137, 804
strategy for,V1:135–136
transactions in,V2: 604
Background checks,V2: 153

Background sounds,V2: 652
Back office applications,V2: 396
Back-propagation network,V2:357–358
Backup and recovery,V1:541–543.
See alsoBackups
for Web-based hosting services,V1: 545
Backups,V2:525;V3:77.See alsoBackup
and recovery
in disaster recovery planning,
V1:541–543
tapes for,V1: 245
types of,V1:542–543
Balanced scorecard,V1:213, 215
Bandpass,V1:460, 462, 466
Bandwidth,V1:183, 261, 271, 490
digital communication and,V1:460 – 461
e-businesses and,V1: 103
IEEE specifications for,V1: 265
limitation of,V1: 298
multiplexing and,V2:669, 673
video streaming and,V3:557–558
for virtual private networks,V3: 580
Web-based training and,V3:667–668
Bandwidth costs, colocation and,V3: 706
Bank account information, accessing,
V2:723–724
Banking,V2:720 –732.See alsoBanking
products/services; Banks
applications for,V2:294 –295
click-and-brick,V1: 192
cross-selling of banking products,
V2:727–728
e-commerce solutions and tools related
to,V2:728–729
future of,V2:730 –731
information sources concerning,
V2:721–723
mobile,V2: 617
online shopping/e-procurement and,
V2:729–730
origin of online,V2: 721
PC-based,V2: 721
Banking industry, changes in,V1: 107
Banking products/services:
analysis of,V1: 409
for corporations,V2:726 –727
for individuals,V2:723–725
selling,V1: 287
for small businesses,V2:725–726
Banking records, privacy of,V3: 98
Bank Internet Payments System (BIPS),
V1: 642
Bank-mediated payments,V1:641–642
Banks.See alsoBanking
click-and-brick,V1: 188
international,V2: 237
Banner ads,V1:815, 816;V2:565–566
Bar code labels,V1: 627
Bartering,V1:124, 128, 681
Baseband,V1:183, 261, 460, 462, 466
signal,V1: 266
Baseband controller, BluetoothTM,V1: 89
Base business case, in
return-on-investment analysis,
V3:217–218, 219
Base class library,V1: 7
Baseline systems,V3: 249
BASIC language,V1:230 –231;V3: 608
Basic Rate Service (BRI),V2:182–183,
183–184
Free download pdf