The Internet Encyclopedia (Volume 3)

(coco) #1

P1: IML


WL040-Index WL040/Bidgolio-Vol I WL040-Sample.cls September 15, 2003 8:59 Char Count= 0


936 INDEX

Spiritual interaction, altered styles of,
V2:808.See alsoOnline religion
Sponsor interest, in online communities,
V2: 739
Spoofed FIN packet,V3: 433
Spoofing,V1:52, 433
biometric,V1: 77
identity,V3: 659
IP,V3:432, 659
Spot buying,V1:120, 122
Spreadsheet software,V1:239, 821;
V3: 221
Spread Spectrum (SS) modulation
technique,V3: 186
Sprint PCS,V1: 667
Spyware,V1:252–253, 574, 576;V2: 270
SQL server,V1:749.See alsoStructured
Query Language (SQL)
SQL-to-XML mapping,V1:749–751
SSL protocols,V1:51–52;V3:268–270,
271, 326.See alsoSecure Sockets
Layer (SSL)
handshake,V1: 51
record,V3:267–268
SSLv3,V3:270 –271
SSPing attack,V1: 433
Staff.See alsoEmployees; Personnel
availability planning for,V1: 148
for library management,V2: 482
Stakeholders,V3: 109
health insurance and,V2:90 –91
in Internet2,V2:337–338
of nonprofit organizations,V2: 680
Stalkers, defined,V2:814.See alsoOnline
stalking
Stallman, Richard,V2:492, 493, 494
Standard Generalized Markup Language
(SGML),V3: 864
Standardized Internet benchmarks,
V1:63–66
table of,V1:62–63
Standard Music Description Language
(SMDL),V3: 326
Standards.See alsoOpen standards
movement
administrative,V2:327–330
audio coding,V3: 316
biometric,V1:79–80
data communications,V3:320 –328
multimedia communications,
V2:205–206
JavaScript,V2: 403
speech coding,V3:313–314
training materials and,V3: 670
webcasting,V3:680 –682
wireless communications,V3:822–824
wireless LAN,V3:826, 827
Standard Template Library (STL),
V1: 174
Star Alliance,V1: 122
Starfield graphs,V1: 406
Star network,V2: 517
Star topology,V1: 262
Start-ups, considerations for,
V1:101–102
State-aware load balancing,V2: 503
State-blind load balancing,V2:503, 504,
507
State databases, privacy and,V2:472– 473
State diagram,V3: 429

Stateful firewalls,V1:834, 839
State income tax, sourcing rules related
to,V3:419– 420
Stateless protocols,V1: 444
Statement of Work (SOW),V3: 112
State of mind, knowledge as,V2:432,
434 – 435
State statutes, trademark-related,
V3:450 – 451
State Transition Analysis Tool (STAT) kit,
V2:361–362
Static cursor,V1: 30
Static Web sites,V3: 769
Statistical Analysis of Science, Technology
and Industry,V1: 64
Statistical delay guarantees,V3:716 –717
Statistical Indicators Benchmarking the
Information Society (SIBIS),V1: 64
Statistical modeling,V2: 356
Statistical multiplexing,V3: 544
Statistical operations,V1: 235
Statistical representative approaches,
V3:746 –748
Statistical Time Division Multiplexing
(STDM),V2: 672
Stealth technologies,V1: 260
Stereoscopic pictures,V1: 512
Stereotypes, gender-related,V2: 18
Stock brokers, online,V3: 279
Stock exchanges, electronic
communications networks and,
V3:279–280
“Stock guru” scheme,V1: 333
Stock information,V1:845–846
Storage,V1: 236
in knowledge management systems,
V2:435, 436
mass,V3: 27
primary,V1: 231
technologies,V3: 335
Storage Area Networks (SANs),V1:545;
V3:329–339.See alsoSAN entries
benefits of,V3: 331
emerging technologies associated with,
V3:334 –336
organizations associated with,
V3:336 –337
standards associated with,V3: 336
technologies associated with,
V3:333–334
vendors and service providers associated
with,V3: 337
Storage Networking Industry Association
(SNIA),V3:336 –337
Storage Over IP (SoIP),V3: 335
Storage Resource Management (SRM),
V3: 336
Storage Systems Standards Working
Group (SSSWG),V3: 336
Stored procedures,V1: 34
Storefronts, online-only,V1: 130
Stores, online,V1: 98
Stovepipe data marts,V1: 414
Strandware,V3: 242
Strategic alliances,V3:340 –352
business role in,V3:346 –347
business success and,V3:340 –342
case study involving,V3:344 –345
company mission and,V3:345–346
comparing,V3: 342

department enhancement and,
V3:342–344
in e-commerce,V3:340, 341
finding partners for,V3: 344
growth of,V3: 350
potential problems with,V3:348–349
reasons for joining,V3: 347
strong relationship with,V3:347–350
world platform for,V3:350 –351
Strategic alliance contract,
V3:349–350
Strategic decision making, agent-based,
V2:198–200
Strategic factions,V3:401– 402
Strategic network relationships,
V3:406 – 407
Strategic positioning,V1:718, 726
Strategic sourcing,V1:120, 685
Strategic thinking,V1: 423
Strategy framework, c-commerce,
V1:210 –211
Streaming,V1:576;V3: 317
applications for,V2: 502
Streaming data, downloading,V1: 566
Streaming media,V1: 829
companies,V3:564 –565
Streaming video,V1:300.See alsoLive
streaming webcasting; Video
streaming
technology for,V1: 299
Streamlined Sales Tax Project (SSTP),
V3: 421
Stream objects,V1: 30
Strengths, Weaknesses, Opportunities,
and Threats (SWOT) analyses,V2: 481
Stress testing,V1: 151
of Web-based systems,V1:150 –151
“Strict effects” test,V2: 220
String manipulation, in Perl,V3: 41
String searches, viral detection via,
V1: 257
Stroustrup, Bjarne,V1: 164
Structured documentation,V2: 441
Structured graphics control, ActiveX,
V1: 20
Structured programming,V3: 609
Structured Query Language (SQL),
V1:111, 118, 379–380, 382, 521;
V3:353–364.See alsoSQL entries
enhanced versions of,V3: 362
features of,V3:355–356
mathematical foundation of,V3:353–355
result set and,V3:356 –361
transaction control in,V3: 361
Structures, C/C++,V1: 171
Style rules,V1: 163
Styles, hiding,V1: 162
Style sheets.See alsoCascading Style
Sheets (CSS)
external,V1: 162
types of,V1:159–160
XBRL,V3:873–875
Subband coding,V1:395–396
Subject-oriented data collection,V1: 413
Subnets,V2: 253
Subnotebooks,V3: 829
Subroutines, Perl,V3: 39
Subscriber Identity Modules (SIMs),
V1:641, 642;V2: 622
Subscription business model,V1: 704
Free download pdf