P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
INDEX 905software for,V1:239–240
supply chain management and,V3: 395
types of,V1:373–374
unauthorized access to,V2: 146
virtual teams and,V3: 604
Web,V1:373–383
XML and,V1:748–749
Database selector, in Web searching,
V3: 745
Data capture, OLAP,V2:688–689
Data-centric application,V1: 753
Data codes,V1:237, 398
Data collection:
in biometric authentication,V1: 74
for usability testing,V3: 520
Data communications
standards/protocols,V3:320 –328.See
alsoInternetworking models; Layering
protocols
bodies promoting,V3:321–322
e-commerce enabling protocols,
V3:326 –327
Internet protocols,V3:325–326
TCP/IP protocol suites,V3:324 –325
Data compression,V1:384 –399.
See alsoCompressed files
applications for,V1:397–398
downloading and,V1:561–563
lossless,V1:384, 385–389, 398, 458;
V3:308, 537, 558
lossy,V1:384, 389–396, 398, 458, 561;
V3:308, 537, 558
technologies for,V1: 299
Data content quality,V2: 164
Data Control Language (DCL), SQL,
V3:356, 360
Data Definition Language (DDL), SQL,
V3:356, 359
Data definition quality,V2: 164
Data distribution, OLAP,V2: 689
Data Encryption Standard (DES),
V1:687–688, 694
Data exchange,V2:142–143
Data flow, cross-border,V3: 99
Datagram networks,V1:181–182, 184
Datagrams,V1:183;V3: 807
Data inspection,V1: 832
Data integrity:
ensuring,V2: 146
extranet,V1: 799
Data Interchange Standards Association
(DISA),V1:622, 650
Data link layer,V1: 183
adding security at,V2:323–324
narrowband ISDN and,V2:184 –185
wireless ATM,V3:828–829
Data Manipulation Language (DML),
SQL,V3:356, 360 –361
Data marts,V1:413– 414;V2: 696
Data mining,V1:213–214, 400 – 411;
V2:527–533.See alsoInformation
mining
in e-commerce,V1:400 – 401;
V2:533–534
in market basket analysis,V1: 409
personalization and,V1:407– 408
tasks and techniques in,V1:401– 404;
V2:356 –358
of Web content,V1:404 – 406;
V2:527–529in Web marketing,V1:408– 409
of Web structure,V2:529–530
of Web usage,V2:530 –533
Data models, creating,V1: 416
Data organization,V2:694 –696
Data processing:
defined,V1: 235
systems,V1:232–234
Data resources, mobile access to,
V3:805–807
Data services, mobile,V3:824 –825
Data sharing:
permissions,V1:499–500
quality principles for,V2:173–174
XML,V1:743–745
“Data smog,”V1:300 –301
Data Source Names (DSNs),V1:28,
382
connections via,V1: 379
types of,V1: 29
Data storage, for biometric
authentication,V1:75–76
Data transfer applications, BluetoothTM,
V1:86 –87
Data transmission, in biometric
authentication,V1:74 –75
Data types:
C/C++,V1:167–168, 171–172
Perl,V3:35–37
Data warehousing,V1:412– 423
business drivers of,V1:415– 416
clickstream,V1: 422
defined,V1: 413
end-user access and,V1:421– 422
hardware architecture for,V1:420 – 421
privacy in,V1: 422
Data warehousing environments:
architectures of,V1:414 – 415
creating,V1:416 – 422
Data webhouse,V2: 695
Day trading,V3: 277
DCOM communications protocol,V1: 752
Deadlock condition,V3:361–362
DealTime,V1:132, 133
Death penalty Web sites,V2: 448
Debian Project,V2: 824
Debit cards,V1: 636
Debugging:
ASP.NET,V1: 9
Visual Basic,V3:613–614
Visual C++,V3: 636
Decision Feedback Equalizers (DFE),
V1: 465
Decision making:
agent-based e-commerce,V2:197–200
in biometric authentication,V1: 75
women’s involvement in,V2: 16
DecisionNet project,V1: 37
Decision support,V2: 752
for adaptive strategic planning,
V1:214 –215
Decision Support Systems (DSSs),
V1:209, 215;V2:71, 153.See alsoDSS
entries
Decision theory, risk and,V3:229–230
Decision trees,V1:403, 410
Declarations, Java,V2: 418
Decoders,V1:387, 388, 398, 459
Decompression,V1: 398
Decryption,V1: 694DeCSS software,V2:269.See also
Cascading Style Sheets (CSS)
Dedicated Advertising Location (DAL),
V1: 703
Dedicated servers,V3: 699
Dedicated Web hosting servers,
V3:704 –705
Deep-linking,V2:270;V3: 453
Defamation,V1:340 –341, 350
Default files, Unix,V3: 503
Defense, GIS applications for,V2: 30
Defense Advanced Research Projects
Agency (DARPA),V2: 39
Defuzzification,V1:843–844
Delay guarantees,V3:715–717
Delegated path validation,V3:164 –165
Delivery:
in knowledge management systems,
V2:435, 436
strategic partners and,V3:343–344
Dell Computer,V3:532–533
supply chain management at,
V3:382–383
Delta CRLs,V3: 164
Demand:
complexity of,V3:398– 401
information concerning,V3: 380
management of,V3: 391
patterns of,V3: 409
planning,V3:390 –391
uncertainty in,V3: 399
Demand Chain Management (DCM),
V1: 127
Demand chains,V1: 215
Demilitarized Zone (DMZ),V1:834, 836,
839.See alsoScreened Subnet Firewall
Deming, Edwards,V1: 59
Democracy, direct,V3:92–93
Demodulation,V1:464 – 465, 466
Demographic categories,V2: 576
Demultiplexing,V3: 714
Denial-of-Service (DoS) attacks,V1:242,
329, 333–334, 368, 424 – 433;V2:318.
See alsoDistributed Denial-of-Service
(DDoS) attacks
defined,V1:424 – 427
losses associated with,V1:426 – 427
motivations behind,V1: 425
preventing,V1:430 – 432
protection from,V2: 332
success of,V1:425– 426
types of,V1:427– 429
Windows 2000,V3: 800
Denied Persons List (DPL),V2: 239
Dense Wavelength Division Multiplexing
(DWDM),V2: 672
Density-based algorithms, for clustering,
V1: 404
Department of Homeland Security,
V1:365, 494
Dependency analysis,V1: 402
Derivative systems,V3: 249
Descendant selectors,V1: 157
Design.See alsoSystem design
experiments,V1: 558
handheld wireless device,V3: 814
multimedia,V2: 643
online text,V2:791–795
patents,V3: 21
universal,V3:490 – 491