Peer-to-peer Computing: The Evolution of a Disruptive TechnologyIdea Group Pub., 2005 - 308 lappuses Peer to Peer Computing: The Evolution of a Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bioinformatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications. |
No grāmatas satura
1.–3. rezultāts no 19.
54. lappuse
... attacking a specific machine useless , as that cannot bring the Gnutella network down . However , with the introduction ... attacks that can be done easily in a loosely structured , highly dynamic P2P network such as Gnutella : flooding ...
... attacking a specific machine useless , as that cannot bring the Gnutella network down . However , with the introduction ... attacks that can be done easily in a loosely structured , highly dynamic P2P network such as Gnutella : flooding ...
138. lappuse
... Attacks One of the popular methods of denial - of - service ( DoS ) attacks on a database server in a peer - to - peer network is by creating a “ UDP packet storm " on the server . The effect is an attack on one host causes that host to ...
... Attacks One of the popular methods of denial - of - service ( DoS ) attacks on a database server in a peer - to - peer network is by creating a “ UDP packet storm " on the server . The effect is an attack on one host causes that host to ...
140. lappuse
... attack . A method that is adopted to cause denial - of - service attacks on database servers in a peer - to - peer network is by exploiting the existing vulnerability in buffer overruns in SQL Server and causing it to execute arbitrary ...
... attack . A method that is adopted to cause denial - of - service attacks on database servers in a peer - to - peer network is by exploiting the existing vulnerability in buffer overruns in SQL Server and causing it to execute arbitrary ...
Citi izdevumi - Skatīt visu
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
algorithm architecture backup server bandwidth bioinformatics central server chapter collaboration connected Copying or distributing Copyright 2005 copyright holders copyright law create data elements data lookup data management database server decentralized descriptor discussion disruptive technology distributing in print download grid dynamic e-mail electronic forms encryption entities example FastTrack file sharing forms without written Gnutella Gnutella network Gnutella protocol grid computing hybrid Idea Group Inc identifier implementation Information Systems infringement interaction Internet IP address issues Kazaa keywords knowledge sharing Napster OpenFT operations overlay network P2P applications P2P communities P2P infrastructures P2P networks P2P systems password Payload peer-to-peer computing peer-to-peer networks peer-to-peer systems peers ping pong messages print or electronic Query Hit ReachOut request Retrieved November 15 routing scalability Schoder servent SETI@home shared objects stored Super Nodes synchronous topology trust users Web services WSDL