Peer-to-peer Computing: The Evolution of a Disruptive TechnologyRamesh Subramanian, Brian D. Goodman Idea Group Inc (IGI), 2005. gada 1. janv. - 308 lappuses Peer to Peer Computing: The Evolution of a Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bioinformatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications. |
No grāmatas satura
1.–5. rezultāts no 41.
iv. lappuse
... USA Chapter VII Security and Trust in P2P Systems Michael Bursell, Cryptomathic, UK ......................................................... 145 Chapter VIII Peer-to-Peer Technology and the Copyright Crossroads................... 166 ...
... USA Chapter VII Security and Trust in P2P Systems Michael Bursell, Cryptomathic, UK ......................................................... 145 Chapter VIII Peer-to-Peer Technology and the Copyright Crossroads................... 166 ...
vi. lappuse
... innovation. Security will no longer be the biggest issue—authentication will. Digital certificates will enable people, computers, handhelds, and applications to interact securely in a distributed Web of trust. With a redesign of vi ...
... innovation. Security will no longer be the biggest issue—authentication will. Digital certificates will enable people, computers, handhelds, and applications to interact securely in a distributed Web of trust. With a redesign of vi ...
vii. lappuse
... trust. With a redesign of e-mail protocols, we also will gain confidence and control over whom we communicate with. The potential of the Internet is much greater than meets the eye. As the Internet evolves, it will become so pervasive ...
... trust. With a redesign of e-mail protocols, we also will gain confidence and control over whom we communicate with. The potential of the Internet is much greater than meets the eye. As the Internet evolves, it will become so pervasive ...
x. lappuse
... trust, security and law in P2P systems and communities. Section III explores P2P's domain proliferation. It attempts to capture some of the areas that have been irreversibly influenced by P2P approaches, specifically in the area of ...
... trust, security and law in P2P systems and communities. Section III explores P2P's domain proliferation. It attempts to capture some of the areas that have been irreversibly influenced by P2P approaches, specifically in the area of ...
xii. lappuse
... trust management. Sridhar Asvathanarayanan takes a data-centered approach in Chapter VI, and details some of the security issues associated with databases in peer networks. Microsoft Windows® is currently one of the most popular ...
... trust management. Sridhar Asvathanarayanan takes a data-centered approach in Chapter VI, and details some of the security issues associated with databases in peer networks. Microsoft Windows® is currently one of the most popular ...
Saturs
Systems and Assets Issues Arising from Decentralized Networks in Security and Law | 113 |
P2P Domain Proliferation Perspectives and Influences of Peer Concepts on Collaboration Web Services and Grid Computing | 194 |
About the Editors | 296 |
About the Authors | 298 |
Index | 305 |
Citi izdevumi - Skatīt visu
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Peer-to-peer Computing: The Evolution of a Disruptive Technology Ramesh Subramanian,Brian D. Goodman Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
activity allow applications approach architecture authors bioinformatics central chapter client collaboration communication computing connected consistency Copying or distributing Copyright cost court create database described discovery discussion distributing in print dynamic e-mail electronic forms entities environment example exchange existing FastTrack Figure file sharing forms without written function Gnutella grid Idea Group Inc identifier implementation infrastructure infringement interaction interest Internet issues keywords knowledge maintain markets mechanism Napster node offer operations organization overlay P2P networks P2P systems peer peer-to-peer networks performance possible present print or electronic problem Proceedings protocol query received request result Retrieved routing servent server shared objects sharing space storage stored structure topology trust types University users