P1: IML
WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0
934 INDEXe-commerce,V1: 290
EDI,V1:617–618
of electronic signatures,V1: 531
in e-manufacturing,V1: 723
extranet,V1:798–800
goals of,V2: 78
in global electronic commerce,V2:58–59
hackers and,V2: 474
Internet,V1:100 –101
in Internet-enabled databases,V1: 375
investment in,V1: 365
IP,V2: 259
IRC,V2:316 –318
JavaScript,V2: 407
LAN,V2: 525
in law enforcement communication,
V2:449– 450
MIP,V3: 840
in mobile commerce,V2: 624
multilayer,V2: 325
network,V3: 175
network communications and,
V3:813–814
network management and,V2: 542
for online consumers,V1: 279
for online credit card transactions,
V1:638–640
password,V3:3– 4, 6 –9
policies,V2:81–82
protocol-level,V3: 761
public relations and,V2: 780
reporting concerns about,V1: 244
risks,V2:304 –305
for securities trading,V3: 276
threats to,V2:80, 320 –326
TCP/IP,V3:432– 433
testing,V1: 310
Unix system,V3: 508
with Voice over Internet Protocol,
V3:658–659
vulnerabilities in,V2:326 –331
Web-based training and,V3:667–668
in Web content management,
V3:695–696
Web services and,V3: 760
Web site design and,V1: 280
zones,V2: 407
Security Account Manager (SAM),
V3:4, 5
Security Assertion Markup Language
(SAML),V1:502;V3: 762
Security Association (SA), IPsec,V1: 55
Security frameworks, XML-based,
V3:761–762
Security incidents,V1: 247
analysis of,V1:244 –245
Security log, W2K,V3: 802
Security planning, computer and network,
V3:81–82
Security Reference Monitor (SRM),
V3: 797
Security standards.SeeInternet security
standards
Security Support Provider Interface
(SSPI), W2K,V3: 798
Security system guidelines,V2:76 –87
asset identification,V2: 79
asset-security continuum,V2:77–78
building a security team,V2:76 –77
dyad tables,V2:78–79risk identification,V2:79–80
for security controls,V2:80 –83
for security goals,V2: 84
Security technology:
Java-based,V3:760 –761
SAML-based,V3: 761
Security transactions, fraudulent,V1: 343
Segmentation variables, for wireless
consumer markets,V3: 855
Selectively ordered works,V1: 305
Self-employed workers,V3: 438
Self-extracting archives,V1: 821
Self-Organizing Map (SOM),V2: 357
Self-serve customer service,V2: 724
Self-sourcing,V1: 723
Selling, direct,V1:121.See alsoMarketing
Selling consortia,V1: 122
Selling-side marketplaces,V1: 125
Sell-side e-procurement architecture,
V1: 649
Sell-side systems,V1: 109
Semantic Web,V3: 690
Seminars, public relations,V2: 774
Sendmail program,V1: 256
Sensitivity analysis,V3: 221
SEQUEL language,V3: 355
Sequential pattern discovery,V1:408– 409
Serial Line Internet Protocol (SLIP),
V1:200;V3: 426
Serials Crisis,V1:513–514
Server farms,V1: 46
Servers,V1:10, 174.See alsoClient/ server
entries; Client-side entries
access logs for,V3: 734
cooperative load balancing in,
V2:508–509
dedicated,V3: 699
failure of,V1: 536
hacking of,V1: 242
load balancing in,V2:502–503
log files for,V1: 405
state-aware load balancing in,
V2:504 –505, 508
types of,V1: 196
shared,V3: 699
Server-side ActiveX controls,V1:14 –15
Server-side files,V1:820, 824
Server-side JavaScript,V2:412– 413
Server-side load balancing,V2:503–509
Server-side processing,V1:378, 380, 382
Server-side scripting,V2:207;
V3:770 –771
Server-side technologies,V1: 1
Server systems,V1: 202
Service browsing,V1: 91
Service business model,V1: 129
Service component pyramid,V3:699, 700
Service differentiation, Web quality of
service and,V3:715–718
Service Discovery Protocol (SDP),V1:90,
91
Service-for-a-fee business model,
V1:134 –135
Service Level Agreements (SLAs),V1:41,
42, 44, 140, 143, 151, 541;V3: 789
Service mark,V1: 351
Service mark symbol (), defined,V3: 450
Service Packs (SPs), W2K,V3: 801
Service providers:
copyright law and,V1:337–338metropolitan area network,V3:788–790
online stalking and,V2: 816
Service Resource Records (SRRs),V3: 794
Services:
added-value,V1: 126
broadband ISDN,V2:187–188
customer,V1:626 –627
knowledge about,V2:574 –576
online experiences as,V1:280 –281
religious,V2: 806
searching,V1: 91
supply chains for,V3: 389
Servlet engines,V2:415– 416
Servlets.SeeJava servlets
Session cookie,V3:103.See alsoCookies
Session identification,V3: 55
Session Initiation Protocol (SIP),V1:668;
V3:653, 655–656, 787–788
Session objects,V1: 7
Session-state management,V1: 7
SETA adaptive Web store,V3:59–60
SET Consortium,V3:248–249
SET digital certificate management,
V3: 250
SETI@home,V3:27, 28, 29
SET international field trials,V3: 254
SET participants, certifying,V3:252–253
Set theory,V3: 353
Set-Top-Boxes (STBs),V1:700 –701
Shadow password file,V1: 48
Shadowing,V3: 185
Shared servers,V3: 699
Shared-server vendors,V3:703–704
Shared Source Initiative (SSI),V2: 827
Shareware,V1: 576
FTP,V1: 573
Sharp mobile device,V2: 631
Shell script,V2: 490
Shell variables, Unix,V3:504 –505
Shill bidding,V1:331;V2: 716
Shippers Export Declaration (SED),
V2: 238
Shockwave files,V1: 824
Shoppers, meeting the needs of,
V1:276 –277
Shopping.See alsoOnline shopping
experiential,V1:273, 275–276
goal-oriented,V1:273–275
multichannel,V1: 276
online,V1:485;V2:729–730
Shopping agents,V1: 816
Shopping bot (buyer advocate) business
model,V1:132–133
Shopping carts,V1:7, 227
Shopping malls, bank-related,V2: 729
Shopping mind-set,V1: 273
Shorebank Corp.,V1: 99
Short Message Service (SMS),V1:668,
670;V2:614;V3:824, 824
advertising and,V3:857–858
marketing and,V2: 569
“Shoulder surfing,”V1: 332
Signal attenuation,V1: 271
Signaling,V3:787–788
Signaling System 7 (SS7),V3: 653
Signal power, digital communication and,
V1:460 – 461
Signal processing, in biometric
authentication,V1: 75
Signal propagation,V3:125–132