P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
INDEX 933Root element,V1: 760
of XML document,V1: 735
Rosetta Books,V1: 517
RosettaNet,V3: 764
Rosh, Mark,V1: 364
Rotoscoping,V2: 655
Routers,V2:246 –247.See alsoIP routers;
Routing
as firewalls,V1: 431
packet filtering,V1: 836
Routing,V1:176, 184.See alsoRouters
dynamic,V3: 834
information,V2:254 –255;V3: 834
multicast,V2: 259
protocols,V2:255;V3:427– 428, 834
tables,V2:253–254
technologies,V3:785–787
Routing and Remote Access Service
(RRAS),V3: 799
Routing Information Protocol (RIP),
V2:255;V3: 834
RSA (Rivest, Shamir, Adelman)
cryptosystem,V1:691–692
user authentication via,V1: 53
Ruby,V3: 49
Rule-based filtering,V3: 53
Rule-based languages,V2:360 –361
Rule-based profiling,V3: 52
Rule-Based Systems (RBSs),V3:237–245
chaining and inference directions in,
V3:239–240
expert systems development,
V3:240 –241
features of,V3: 238
Internet applications for,V3:242–244
production system paradigm and,
V3:237–238
theoretical and computational aspects of,
V3:238–239
Rule induction,V1:403, 409
Run-length coding,V1: 389
Run-time licenses,V1:14, 15
RUSSEL language,V2:360 –361Sabotage, on IRC,V2:317–318
Safe harbor principles, compliance with,
V2:223–224
Safe Harbor framework,V1:807–808
Safety, issues related to,V3:72–73
Safety deposit boxes, electronic,
V2: 728
Salami scam,V1: 252
Sales channels, wireless,V3: 857
Sales promotion,V2:569–570
Sales tax base,V3: 418
SAML-based security technology,V3: 761
Samples, biometric,V1: 81
Sampling, digital-product,V2:569–570
SAN applications,V3:331–332.See also
Storage Area Networks (SANs)
SAN architecture,V3:332–333
Sanctions, administrative,V2: 331
San Jose Mercury Newssite,V2: 763
SANS Institute,V1: 366
SANs-over-IP technology,V3: 335
SAP R/3 system,V1:113, 712
SAP systems,V1:712, 714
Satellite communication systems,V3:178,
183
Satellite connection,V2: 300Satellite Digital Broadcast Systems (DBS),
V1: 699
Satellite systems, training and,V3: 667
Satellite technology,V1:298;V3: 171
SavvySearch approach, to Web searching,
V3: 748
Scalability,V1:116, 146, 710, 717.
See alsoScaling
ASP.NET,V1: 9
in Internet-enabled databases,V1: 375
Scalable Vector Graphics (SVG),V1:455;
V2:136, 137, 207
Scalable Web Server (SWEB),V2: 509
Scalars, Perl,V3: 36
Scalar quantization,V1:389–390
vector quantization versus,V1:391–392
Scaling.See alsoScalability
of hardware and software architecture,
V2:714 –715
video streaming and,V3: 558
Scams, Internet,V2: 451
Scanned physical signatures,V1: 533
Scanners, antiviral,V1:250, 257, 260
Scattering, radio wave,V3: 184
Scatternets,V1: 93
Scenario testing, in biometric
authentication,V1: 76
Scholarly Publishing and Academic
Resources Coalition (SPARC),V1: 514
Science Direct,V1: 513
Science Information Gateway,V1: 516
Science laboratory simulations,V1: 555
Scientific visualization,V3:596 –597
Scientific community, Internet2 and,
V2: 339
Scope statement.SeeProject scope
statement
Screened host firewalls,V1: 836
Screened Subnet Firewall,V1:836.
See alsoDemilitarized Zone (DMZ)
Script components, Windows,V3: 631
Script encoding,V3: 631
Script files, Windows,V3: 630
Scripting.See alsoScripts
active server pages,V1: 31
ActiveX,V1:14, 23
client-side,V1:15;V2:206;V3: 633
engines,V3: 622
host object models,V3:627–630
hosts,V3: 622
remote,V3:630 –631
Scripting programming languages,V1:2;
V2:401– 402, 406.See alsoJavaScript
advantages of,V1: 226
Microsoft implementation of,V3: 622
Scriptlets, Java,V2: 418
Scripts,V1:10.See alsoScripting
external,V2: 411
Internet relay chat and,V2: 317
Script viruses,V1:248, 254
Search agents, fuzzy,V1:844 –845.See
alsoSearch engines; Search service
companies
Search controls,V3:727–728
Search engines,V1:133–134, 137, 570;
V2:289.See alsoSearch utilities
effectiveness of,V3:204 –205
ethics of,V2:473– 474
how to use,V3:726 –728
information ignored by,V3:731–733linking and,V1: 349
performance of,V3:728–733
private,V3:735–736
research and,V3:203–205
Web site design and,V3: 774
Web site discovery by,V3: 734
Search features,V1: 286
Search for Extraterrestrial Intelligence.
SeeSETI@home
Search operations,V1: 235
Search service companies,V3: 735
Search utilities,V1:825.See alsoSearch
engines
Search Web sites,V3: 772
Second-and-a-half generation (2.5G)
wireless networks,V2:620 –621
Second-generation (2G) wireless
networks,V2:618–620
Second Normal Form (2NF) for data,
V1: 377
Secretarial groupware products,V2: 68
“Secret knowledge,”V1: 49
Secrets,V1: 56
Secret sharing,V1: 693
Section 508 Web Electronic and
Information Technology Accessibility
Standards,V3:486 – 487
Sector benchmarking,V1: 63
Secure channels, history of,V3: 262
Secure Electronic Payment Protocol
(SEPP),V3:247–248
Secure Electronic Transactions (SETs),
V1:290, 293, 606, 640;V3:247–260.
See alsoEasySET project; SET entries
credit card processing,V3:249–253
digital certificates for,V3: 252
new directions in,V3:255–258
products related to,V3:253–255
standard for,V3:249, 762
user concerns about,V3: 254
Secure Shell (SSH) protocol,V1:52–53;
V2:330;V3: 434
Secure Sockets Layer (SSL),V1:639–640;
V3:261–273.See alsoSSL entries
alternatives to,V3:271–272
architecture of,V3:266 –270
cryptographic concepts used in,V3: 266
e-commerce and,V3:261–262
internetworking concepts and,
V3:262–265
protocol with,V1: 293
status of,V3:270 –272
Secure Transaction Technology (STT),
V3:247–248
SecurID card,V1: 798
Securities Exchange Act of 1934,V1: 333
Securities trading,V3:274 –285
e-finance and,V3:274 –276
history of,V3:276 –282
low-priced,V3: 276
Security.See alsoPhysical security;
Security system guidelines
ActiveX,V1: 15
application service providers and,
V1:44–45
administrators,V2: 145
breaches of,V1:115, 246
corporate responsibility for,V2:332–333
document-level,V3: 761
e-business,V1: 103