Database
authentication and, 150-154
management system (DBMS), 44-45, 136
tradition, 44
Data mining, 288
Decnet, 225
Decomposition, 87, 89-90
Decryption. See Cryptography
DeCSS, 295-296
Defects, 56
Delay, 27-29, 57, 340
Denial-of-service attacks, 289-290
Depreciation, 195-196
Development, xi, 70
agile, 81-82
community-based, 78-81, 227
efficiency and, 76-78
iterative, 73-76
provisioning and, 129-133
spiral model and, 74-76
tools for, 106
waterfall model and, 71-73
Device driver, 242-243
Digital certificates, 286-287
e-commerce and, 164-165
management and, 155-160
Digitalization, 14-18
Digital Millennium Copyright Act (DMCA), 283-284
Digital rights management, 161
Digital signatures, 104-105
nonrepudiation and, 162-164
Digital subscriber loop (DSL), 182-183
Digital Transmission Copy Protection (DTCP), 280
Digital Versatile Disk (DVD), 55, 277
Content Scrambling System and, 295-296
software creation and, 67
standards and, 235
Digital Video Interface (DVI), 280
Distribution, 94. See also Networks
compilation and, 100-104
downloading and, 186-188
environment and, 96-97
execution trust and, 104-105
federation of, 158
independent vendors and, 178-184
infrastructure and, 95-96
interpretation and, 100-104
operating systems and, 105-106
pay-per-use, 190-191
platforms and, 96-97
portability and, 98-100
security and, 145-166
shared secret and, 156-160
subscriptions, 190-191
superdistribution model, 191, 325
suppliers and, 186-188
value chain and, 325 (see also Value chain)
Web services and, 260-263
DNA, 16
Document tradition, 43-44, 46
DOS, 237-238
Downloading, 186-188
Downtime, 131