Peer-to-peer Computing: The Evolution of a Disruptive TechnologyIdea Group Pub., 2005 - 308 lappuses Peer to Peer Computing: The Evolution of a Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bioinformatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications. |
No grāmatas satura
1.–3. rezultāts no 58.
iii. lappuse
... Chapter I Section I : Then and Now : Understanding P2P Spirit , Networks , Content Distribution and Data Storage Core Concepts in Peer - to - Peer Networking Detlef Schoder , University of Cologne , Germany Kai Fischbach , University of ...
... Chapter I Section I : Then and Now : Understanding P2P Spirit , Networks , Content Distribution and Data Storage Core Concepts in Peer - to - Peer Networking Detlef Schoder , University of Cologne , Germany Kai Fischbach , University of ...
iv. lappuse
... Chapter VI Potential Security Issues in a Peer - to - Peer Network from a Database Perspective ................. Sridhar Asvathanarayanan , Quinnipiac University , USA 131 Chapter VII Security and Trust in P2P Systems Michael Bursell ...
... Chapter VI Potential Security Issues in a Peer - to - Peer Network from a Database Perspective ................. Sridhar Asvathanarayanan , Quinnipiac University , USA 131 Chapter VII Security and Trust in P2P Systems Michael Bursell ...
xii. lappuse
... process could be rendered more secure . The author underscores that security starts by analyzing and being treated at the technol- ogy level . Michael Bursell offers a more holistic focus on security in xii Chapter Chapter.
... process could be rendered more secure . The author underscores that security starts by analyzing and being treated at the technol- ogy level . Michael Bursell offers a more holistic focus on security in xii Chapter Chapter.
Citi izdevumi - Skatīt visu
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
algorithm architecture bandwidth bioinformatics central server chapter client cluster collaboration connected Copying or distributing Copyright 2005 copyright holders copyright law court create data elements data lookup data management database server decentralized descriptor discussion distributing in print dynamic e-mail electronic forms encryption entities example FastTrack file sharing forms without written Gnutella Gnutella network grid grid computing hybrid Idea Group Inc identifier implementation infringement interaction Internet IP address issues Kazaa keywords knowledge sharing late-join liability Napster OpenFT operations overlay network P2P applications P2P communities P2P infrastructures P2P networks P2P systems password peer-to-peer networks peer-to-peer systems peers ping pong messages print or electronic Query Hit ReachOut request Retrieved November 15 Retrieved October scalability servent SETI@home shared objects Sony space Squid stored structure Super Nodes synchronous topology trust users Web services