Books on the topic 'Peer-to-Peer Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 30 books for your research on the topic 'Peer-to-Peer Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Proudler, Graeme J. Security for a connectionless peer-to-peer link. Hewlett-Packard Laboratories, Technical Publications Department, 1996.
Find full textKorzun, Dmitry. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer New York, 2013.
Find full textOualha, Nouha. Peer-to-peer storage: Security and protocols. Nova Science Publishers, 2010.
Find full textJudiciary, United States Congress Senate Committee on the. The dark side of a bright idea: Could personal and national security risks compromise the potential of peer-to-peer file-sharing networks? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, first session, June 17, 2003. U.S. G.P.O., 2003.
Find full textUnited States. Federal Trade Commission. Office of Consumer and Business Education, ed. Uso compartido de archivos: Cómo evaluar los riesgos. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.
Find full textReform, United States Congress House Committee on Government. Overexposed: The threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003. U.S. G.P.O., 2003.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.
Find full textOffice, General Accounting. File sharing: Selected universities report taking action to reduce copyright infringement : report to congressional requesters. U.S. General Accounting Office, 2004.
Find full textGurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2014.
Find full textGurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2012.
Find full textUS GOVERNMENT. Overexposed: The Threats to Privacy and Security on Filesharing Networks: Hearing Before the Committee on Government Reform, House. Government Printing Office, 2003.
Find full textMerriden, Trevor. Irresistible Forces: The Business Legacy of Napster and the Growth of the Underground Internet. Capstone, 2001.
Find full textMerriden, Trevor. Irresistible Forces: The Business Legacy of the Napster Phenomenon (And the Growth of the Underground Internet. Capstone Ltd, 2001.
Find full textLiu, Fuwen. Securing Peer-to-Peer Video Conferences - from Concepts to Implementations. Simon & Schuster, 2007.
Find full textBrooks, Richard R. Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks. CRC, 2004.
Find full textBrooks, Richard R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2005.
Find full textBrooks, R. R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2004.
Find full textBrooks, R. R. Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks. Taylor & Francis Group, 2004.
Find full textDisruptive security technologies with mobile code and peer-to-peer networks. CRC Press, 2005.
Find full textUso compartido de archivos: Cómo evaluar los riesgos. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.
Find full textUS GOVERNMENT. The Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of Peer-To-Peer File-Sharing Networks?: Hearing Be. Government Printing Office, 2003.
Find full textOnline File Sharing: Innovations in Media Consumption. Taylor & Francis Group, 2013.
Find full textInformed P2P User Act: Report (to accompany H.R. 1319) (including cost estimate of the Congressional Budget Office). U.S. G.P.O., 2009.
Find full textSachs, Marcus, and Paul Piccard. Securing IM and P2P Applications for the Enterprise. Elsevier Science & Technology Books, 2005.
Find full textH.R. 2221, the Data Accountability and Protection Act, and H.R. 1319, the Informed P2P User Act: Hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. U.S. G.P.O., 2012.
Find full textCommittee on the Judiciary (SENATE). Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of Peer-To-peer File-sharing Networks? Independently Published, 2020.
Find full textBouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2010.
Find full textBouguettaya, Athman, and Zaki Malik. Trust Management for Service-Oriented Environments. Springer, 2014.
Find full textInadvertent file sharing over peer-to-peer networks: How it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009. U.S. G.P.O., 2009.
Find full textSinger, Peter W., and Allan Friedman. Cybersecurity and Cyberwar. Oxford University Press, 2014. http://dx.doi.org/10.1093/wentk/9780199918096.001.0001.
Full text