P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
928 INDEXmanagement of,V3:6–9
one-time,V1: 53
resetting,V1: 533
retrieval of,V3:5, 6
reusable,V1:530, 533
security of,V3:3– 4, 6 –9
selecting,V3: 7
simplified,V3:10 –11
sniffing of,V1:335;V3:5–6
static,V1: 798
synchronization of,V3: 8
vulnerabilities of,V3:6–7
Web access via,V1: 50
Password services,V1: 50
Patch installation,V1: 431
Patent law,V1:484;V2:458;
V3:14 –24
non-U.S.,V3:21–22
U.S.,V3:14 –21
Patent rights, protecting,V3:19–20
Patents,V1: 340
application for,V3: 16
infringement of,V3:19–20
obtaining,V3:14 –18, 21
prosecution of,V3:16 –17
reading,V3:18–19
software,V2:229–230, 303
term of,V3:17–18
types of,V3: 21
Path control, ActiveX,V1: 21
Path Loss (PL),V3: 185
Patriot Act.SeeUSA Patriot Act of 2001
Path profiles,V2: 531
Pattern matching, in Perl,V3:40 – 42
Pattern-matching language,V1:760, 791
Pattern memory, in Perl,V3:41– 42
Payback period,V3: 216
Payment card standards,V3: 248
Payment gateway systems,V3: 254
Payment methods,V1:290.See also
Secure Electronic Transactions (SETs)
conventional,V1:635–638
Internet-based,V1: 288
online auction,V2: 716
secure online,V3:255–258
Payment services, for auctions,V2:703,
716
Payment systems,V1:624 –627, 650
e-commerce,V1:606 –607
for Web services,V3:762–763
Payment types, trust infrastructures
supporting,V1:629–630
PayPal,V1:288, 605, 607, 630 –631
Pay-per-Play business model,V1: 703
Pay-per-Use (PPU) business model,
V1: 703
Pay-per-view industry,V1: 300
Pay-Per-View (PPV),V1:699, 705
Payroll services,V2: 725
Payroll support systems,V2: 155
Payword system,V1: 643
P-BEST language,V2: 361
PC-based home banking,V2: 721
PC-EPhone mobile device,V2: 631
PC-meter measurements,V1: 67
PC industry, value chain analysis in,
V3:531–533.See alsoPersonal
Computers (PCs)
PC penetration, e-business and,
V1: 805PCS standards,V3:821–822.See also
Personal Communication Services
(PCS)
PDF format books,V2:789.See also
Portable Document Format (PDF)
Pearson correlation,V2:533–534
Peer-to-Peer (P2P) systems,
V3:25–33
in business,V3:31–32
examples of,V3:28–31
functions of,V3: 27
network,V2:542–543
Penetration attacks,V2: 320
PeopleSoft,V1:712–713
PEOPLink,V1: 441
Performance:
benchmarking,V1: 144
digital communication,V1: 461
isolation,V3: 713
models,V1: 147
objectives of,V1: 147
risk,V1: 147
scenarios,V1: 147
search engine,V3:728–733
tracking,V3:119–120
of Web proxy servers,V3: 721
Performance guarantees, Web server,
V3:713–721
Performance management,V1:139, 151
employee,V2:153–155
systems,V2: 154
Performance metrics,V2:566 –567
supply network,V3: 410
Performance testing:
in biometric authentication,
V1:76 –77
of Web-based systems,V1:150 –151
Periodicals, benchmarking,V1:57.
See alsoJournals; Magazines;
Newspapers
Perishable goods, selling,V1: 286
Perl modules,V3: 45
“CGI,”V3: 46
Permanent Establishment (PE) concept,
V3:417– 418
Permanent Virtual Circuits (PVCs),
V2: 188
networks with,V1: 182
Permission-based e-mails,V1: 324
Permission-based marketing,V1: 320
Permission marketing,V2:568, 580 –581;
V3: 855
Persistence, JavaBean,V2:392–393
Personal Area Networks (PANs),V1:85;
V3:843–844.See alsoWireless
Personal Area Networks (WPANs)
Personal Communication Services (PCS),
V3:181–182.See alsoPCS standards
Personal Computers (PCs),V1:297.
See alsoPC entries
advent of,V1: 37
procurement and,V1: 645
Personal Digital Assistants (PDAs),V1:6,
294;V2:347–348, 582, 583, 621, 627,
628–629;V3: 829
Personal Digital Cellular (PDC) wireless
networks,V2: 620
Personal Digital Cellular/Japanese Digital
Cellular (PDC/JDC) wireless,V3: 822
Personal firewalls,V1: 431Personal Identification Number (PIN),
V1: 798
Personal information:
corporate use of,V2:471– 472
customer expectations regarding,
V2: 174
privacy rights and,V2:470 – 471
Personalization,V1:410.See alsoMass
personalization; Personalization and
customization technologies
of auctions,V2: 715
data mining and,V1:407– 408
defined,V3: 51
in e-manufacturing,V1: 723
in online shopping,V1:279, 282
intranets and,V2:349–350
location-based,V3:56 –57
in marketing strategy,V1: 604
in search engine design,V1:844 –845
systems for,V2: 534
Personalization and customization
technologies,V3:51–63
applications for,V3:58–61
filtering in,V3:53–54
intelligent agents for,V3: 56
for location-based personalization,
V3:56 –57
preference modeling and,V3:57–58
privacy and,V3:61–62
user profiling and,V3:51–53
Web usage analysis via,V3:54 –56
Personalization Consortium,V3: 51
Personalized Fuzzy Web Search Agent
(PFWSA),V1: 845
Personalized opt-in e-mail,V1: 815
Personalized Web browser,V1: 407
Personalized Web services,V3: 764
Personal Video Recorders (PVRs),
V1:701, 705
Personnel.See alsoEmployees
directories of,V2: 437
key,V1:99–100
Pessimistic lock type,V1:30, 34
PetrochemNext.com,V1:678–679
Pets.com,V1:97–98, 130, 136
Pew Research Center Internet and
American Life Project,V1:593, 598
P-frames,V3:559–560
Phatic communication,V1: 302
Phones, future,V3:829.See alsoAdvanced
Mobile Phone System (AMPS); Digital
Advanced Mobile Phone System
(D-AMPS); Plain Old Telephone
Service (POTS); Telephone entries
Photographs, historical collections of,
V1:510 –512
Photography,V1: 296
PHP: Hypertext Processor (PHP),V1:226,
227, 381
script language for,V1:824, 829;
V2: 412
Physical access control,V3: 71
Physical health issues,V2: 109
Physical privacy,V1: 78
Physical security,V3:64 –83.See also
Security
awareness training and,V3:78–79
computer and network,V3:81–82
preventive measures and,V3:70 –79
reactive measures and,V3:79–81