The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


INDEX 919

Intranets,V1:183, 201, 202, 216;
V2:290 –292, 346 –354;V3: 167
employee relations and,V2: 773
extranets and,V1: 793
failure of,V2: 353
features of,V2:346 –350
IS department intranet challenges,
V2:350 –353
JavaScript in,V2: 406
pilot testing of,V2:351–352
virtual teams and,V3: 604
Intra-Web service modeling,V3: 757
Intrinsic object models,V3: 627
Intrinsic privacy,V1: 78
Introduction service,V1: 500
Introspection, JavaBean,V2:393–394
Intrusion detection,V1:431– 432, 832
abstraction-based,V2:362–363
in distributed systems,V2:363–365
Intrusion Detection Systems (IDSs),
V1:244, 247;V2:355, 365
Intrusion detection techniques,
V2:355–367
anomaly detection,V2:356 –360
computer immunological approach,
V2:358–359
information-theoretic,V2:359–360
misuse detection,V2:360 –363
specification-based methods,V2: 359
Intrusion tort,V3: 97
Inventions,V3:15–16.See alsoPatent
entries
Inventory:
centralized,V1: 723
in the supply chain,V2:553–554
Inventory fulfillment, virtual,V2: 375
Inventory management,V2:368–378
classical,V2: 369
e-commerce and,V2:373–375
for multiple items and echelons,
V2:372–373
inventory replenishment methodologies,
V2:369–372
replenishment rules in,V2:371–372
technologies enabling,V2:375–376
virtual,V2:374 –375
Inverse Fast Fourier Transform (IFFT),
V1: 463
Inverse telecine process,V3: 541
Investigative resources Web sites,V2: 447
Investing firms, changing interests of,
V1:97–98
Investment fraud,V1: 333
Investment opportunities,V1:577–578
Investments, corporate strategy and,
V3:224 –226.See alsoE-business;
Securities trading
Investor relations sites,V2: 772
Investors,V1: 102
Invisible Web,V3: 205
iOffer,V1: 132
IP addresses,V1:183, 200;V2:247;
V3:426 – 427.See alsoInternet
Protocol (IP)
browser data and,V3: 102
spoofing of,V3: 432
terrorist access to,V1: 361
I-Pay with SET,V3: 255
IP-based virtual private networks,
V3:579–590

customer-edge-based,V3:584 –586
design of,V3:588–589
drivers for,V3:579–581
provider-edge-based,V3:586 –587
technologies associated with,
V3:581–583
types of,V3:583–584
IP convergence, with cellular systems,
V3:845–847
IP datagrams,V2: 247
IP fragment attacks,V3: 432
IP fragments,V3: 428
IP headers,V3: 427
IP layer,V2:252–260
management in,V2:259–260
IP multicast,V3: 681
IP networks,V2:246 –247, 253
IP routers,V2:252–253
IPsec.SeeInternet Protocol Security
(IPsec)
IP service, implementing,V2:247–249
IP spoofing,V3: 659
IP storage technologies,V3: 335
IP technology, use in the cellular network,
V3: 832
IP television systems,V1: 699
IP version 4 (IPv4),V3:785–786
address shortage with,V2: 260
IP version 6 (IPv6),V3: 786
addresses with,V2: 260
protocol for,V3: 325
IRC client software,V2:312, 313–314
IRCops,V2: 314
IrDA infrared data transfer,V1: 86
IrDA technology, BluetoothTMand,
V1: 94
ISO 8601 format,V1: 772
ISP liability, for copyright infringement,
V2:228–229
Issues management, in public relations,
V2:778–779
IT infrastructure,V3:394 –395.See also
Information Technology (IT)
failures of,V1:536 –537
IT investments,V3:212–214
IT objectives,V3:225, 226
IT organizations,V1: 114
IT portfolio management,V3: 226
IT projects, expensing,V3: 220
iTransact,V1:639–640
IT resources, identifying,V1: 539
IT security,V1: 247
IT security staff,V1: 243
ITU standards,V2:180, 182, 185
webcasting and,V3:681–682
ITU-T standards,V3:314, 780

Japan:
benchmarking in,V1: 58
e-business in,V1: 810
Java,V1:112–113, 226;V2:379–387
architecture-based software development
and,V2:398–399
business uses of,V2:379–380
expected trends related to,V2: 380
features of,V2:380 –383
history of,V2: 379
sample programs in,V2:383–386
versus JavaScript,V2:402– 403
Web services and,V3:758–759

Java 2 Enterprise Edition (J2EE),V1:113;
V3: 759
operating system for,V2:381–382, 638
platform for,V3: 290
Java 2 Micro Edition (J2ME) operating
system,V2:638–639
Java 2 Mobile Edition (J2ME),V1: 113
Java 2 Standard Edition (J2SE), operating
system for,V2: 638
Java Abstract Windowing Toolkit (AWT),
V2:389, 397
Java Agent for Meta-Learning (JAM),
V2: 362
Java Applets,V1:446;V3: 732
Java Application Programming Interface
(API),V2: 382
Java Archive (Jar) file mechanism,V2: 393
Java Authentication and Authorization
Service (JAAS),V3: 761
Java-based security technology,
V3:760 –761
JavaBeans,V2:382, 388–399, 421– 423;
V3:290.See alsoDistributed
JavaBeans
architectural support and,V2:398–399
characteristics of,V2:390 –394
deploying,V2:422– 423
in other Java technologies,V2:397–398
usage and applications of,V2:389–390
versus Enterprise JavaBeans,
V2:396 –397
java.beans.BeanInfo interface,V2: 393
java.beans.Introspector,V2: 394
Java Database Connectivity (JDBC),
V1:118, 378;V2: 397
access to databases using,V2:425– 428
Java Development Kit (JDK),V2:379, 381
Java Foundation Classes (JFC),V2: 382
Java GSS-API,V3:760 –761
JavaMail,V2: 397
Java Management Extensions (JMX),
V2:397–398
Java Message Queue (JMQ),V1: 198
Java Message Service (JMS),
V1: 198
Java platforms,V2:381–382
Java RMI,V2:252, 395;V3: 574
Java Runtime Environment (JRE),
V2: 382
JavaScript,V1:824, 829;V2:206,
401– 414.See alsoJScript language
advantages and disadvantages of,
V2:403– 406
applications of,V2: 406
client-side,V2:406, 409– 412
as a client-side HTML scripting
language,V2:409– 412
future of,V2: 413
history of,V2:402– 403
I/O with,V2:411– 412
need for,V2:401– 402
principles of,V2:406 – 407
server-side,V2:412– 413
standards for,V2: 403
success of,V2: 403
syntax of,V2:407– 409
JavaScript functions, DHTML and,
V1:446, 447, 448
Java Secure Socket Extension (JSSE),
V3: 760
Free download pdf