To see the other types of publications on this topic, follow the link: Peer-to-Peer Network Security.

Books on the topic 'Peer-to-Peer Network Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 30 books for your research on the topic 'Peer-to-Peer Network Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Proudler, Graeme J. Security for a connectionless peer-to-peer link. Hewlett-Packard Laboratories, Technical Publications Department, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Korzun, Dmitry. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oualha, Nouha. Peer-to-peer storage: Security and protocols. Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Judiciary, United States Congress Senate Committee on the. The dark side of a bright idea: Could personal and national security risks compromise the potential of peer-to-peer file-sharing networks? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, first session, June 17, 2003. U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Federal Trade Commission. Office of Consumer and Business Education, ed. Uso compartido de archivos: Cómo evaluar los riesgos. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reform, United States Congress House Committee on Government. Overexposed: The threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003. U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Malik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. File sharing: Selected universities report taking action to reduce copyright infringement : report to congressional requesters. U.S. General Accounting Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

US GOVERNMENT. Overexposed: The Threats to Privacy and Security on Filesharing Networks: Hearing Before the Committee on Government Reform, House. Government Printing Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Merriden, Trevor. Irresistible Forces: The Business Legacy of Napster and the Growth of the Underground Internet. Capstone, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Merriden, Trevor. Irresistible Forces: The Business Legacy of the Napster Phenomenon (And the Growth of the Underground Internet. Capstone Ltd, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Liu, Fuwen. Securing Peer-to-Peer Video Conferences - from Concepts to Implementations. Simon & Schuster, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Brooks, Richard R. Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks. CRC, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Brooks, Richard R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Brooks, R. R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Brooks, R. R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Disruptive security technologies with mobile code and peer-to-peer networks. CRC Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Uso compartido de archivos: Cómo evaluar los riesgos. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

US GOVERNMENT. The Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of Peer-To-Peer File-Sharing Networks?: Hearing Be. Government Printing Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Online File Sharing: Innovations in Media Consumption. Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Informed P2P User Act: Report (to accompany H.R. 1319) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Sachs, Marcus, and Paul Piccard. Securing IM and P2P Applications for the Enterprise. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

H.R. 2221, the Data Accountability and Protection Act, and H.R. 1319, the Informed P2P User Act: Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Committee on the Judiciary (SENATE). Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of Peer-To-peer File-sharing Networks? Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Bouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Inadvertent file sharing over peer-to-peer networks: How it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009. U.S. G.P.O., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Singer, Peter W., and Allan Friedman. Cybersecurity and Cyberwar. Oxford University Press, 2014. http://dx.doi.org/10.1093/wentk/9780199918096.001.0001.

Full text
Abstract:
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution’s impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet’s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!