Peer-to-Peer

Peer-to-Peer

Author: Andy Oram

Publisher: "O'Reilly Media, Inc."

Published: 2001-02-26

Total Pages: 450

ISBN-13: 1491942975

DOWNLOAD EBOOK

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and control to ordinary users. While this book is mostly about the technical promise of peer-to-peer, we also talk about its exciting social promise. Communities have been forming on the Internet for a long time, but they have been limited by the flat interactive qualities of email and Network newsgroups. People can exchange recommendations and ideas over these media, but have great difficulty commenting on each other's postings, structuring information, performing searches, or creating summaries. If tools provided ways to organize information intelligently, and if each person could serve up his or her own data and retrieve others' data, the possibilities for collaboration would take off. Peer-to-peer technologies along with metadata could enhance almost any group of people who share an interest--technical, cultural, political, medical, you name it. This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems they've faced, and the technical solutions they've found. Learn here the essentials of peer-to-peer from leaders of the field: Nelson Minar and Marc Hedlund of target="new">Popular Power, on a history of peer-to-peer Clay Shirky of acceleratorgroup, on where peer-to-peer is likely to be headed Tim O'Reilly of O'Reilly & Associates, on redefining the public's perceptions Dan Bricklin, cocreator of Visicalc, on harvesting information from end-users David Anderson of SETI@home, on how SETI@Home created the world's largest computer Jeremie Miller of Jabber, on the Internet as a collection of conversations Gene Kan of Gnutella and GoneSilent.com, on lessons from Gnutella for peer-to-peer technologies Adam Langley of Freenet, on Freenet's present and upcoming architecture Alan Brown of Red Rover, on a deliberately low-tech content distribution system Marc Waldman, Lorrie Cranor, and Avi Rubin of AT&T Labs, on the Publius project and trust in distributed systems Roger Dingledine, Michael J. Freedman, andDavid Molnar of Free Haven, on resource allocation and accountability in distributed systems Rael Dornfest of O'Reilly Network and Dan Brickley of ILRT/RDF Web, on metadata Theodore Hong of Freenet, on performance Richard Lethin of Reputation Technologies, on how reputation can be built online Jon Udell ofBYTE and Nimisha Asthagiri andWalter Tuvell of Groove Networks, on security Brandon Wiley of Freenet, on gateways between peer-to-peer systems You'll find information on the latest and greatest systems as well as upcoming efforts in this book.


Peer-to-peer

Peer-to-peer

Author: Dana Moore

Publisher: McGraw-Hill Companies

Published: 2002

Total Pages: 0

ISBN-13: 9780072192841

DOWNLOAD EBOOK

This text demonstrates through clear explanations how to easily leverage the power of peer-to-peer networks to achieve seamless personal and business communication and transactions.


Streaming Media with Peer-to-peer Networks

Streaming Media with Peer-to-peer Networks

Author: Martin Fleury

Publisher:

Published: 2012

Total Pages: 0

ISBN-13: 9781466616134

DOWNLOAD EBOOK

"This book offers insights into current and future communication technologies for a converged Internet that promises soon to be dominated by multimedia applications, at least in terms of bandwidth consumption"--Provided by publisher.


Networking Bible

Networking Bible

Author: Barrie Sosinsky

Publisher: John Wiley & Sons

Published: 2009-08-13

Total Pages: 715

ISBN-13: 0470543426

DOWNLOAD EBOOK

Everything you need to set up and maintain large or small networks Barrie Sosinsky Networking Bible Create a secure network for home or enterprise Learn basic building blocks and standards Set up for broadcasting, streaming, and more The book you need to succeed! Your A-Z guide to networking essentials Whether you're setting up a global infrastructure or just networking two computers at home, understanding of every part of the process is crucial to the ultimate success of your system. This comprehensive book is your complete, step-by-step guide to networking from different architectures and hardware to security, diagnostics, Web services, and much more. Packed with practical, professional techniques and the very latest information, this is the go-to resource you need to succeed. Demystify the basics: network stacks, bus architectures, mapping, and bandwidth Get up to speed on servers, interfaces, routers, and other necessary hardware Explore LANs, WANs, Wi-Fi, TCP/IP, and other types of networks Set up domains, directory services, file services, caching, and mail protocols Enable broadcasting, multicasting, and streaming media Deploy VPNs, firewalls, encryption, and other security methods Perform diagnostics and troubleshoot your systems


Handbook of Research on Wireless Security

Handbook of Research on Wireless Security

Author: Yan Zhang

Publisher: IGI Global

Published: 2008-01-01

Total Pages: 860

ISBN-13: 1599049007

DOWNLOAD EBOOK

Provides research on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security.


Business Data Communications and Networking

Business Data Communications and Networking

Author: Jerry FitzGerald

Publisher: John Wiley & Sons

Published: 2009-01-09

Total Pages: 609

ISBN-13: 0470055758

DOWNLOAD EBOOK

Over the past few years, many fundamental changes have occurred in data communications and networking that will shape the future for decades to come. Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field. Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared.


Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks

Author: Jie Wu

Publisher: CRC Press

Published: 2005-08-08

Total Pages: 893

ISBN-13: 0203323688

DOWNLOAD EBOOK

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network


Networked Group Communication

Networked Group Communication

Author: Jon Crowcroft

Publisher: Springer

Published: 2003-06-30

Total Pages: 215

ISBN-13: 3540455469

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Third International COST264 Workshop on Networked Group Communication, NGC 2001, held in London, UK, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 40 submissions. All current issues in the area are addressed. The papers are organized in topical sections on application-level aspects, group management, performance topics, security, and topology.


Windows Vista: The Complete Reference

Windows Vista: The Complete Reference

Author: Margaret Levine Young

Publisher: McGraw Hill Professional

Published: 2007-04-03

Total Pages: 769

ISBN-13: 007150950X

DOWNLOAD EBOOK

The Ultimate Windows Vista Resource Take full advantage of the high-performance features available in Microsoft Windows Vista and experience the power of this integrated, next-generation operating system. Windows Vista: The Complete Reference shows you how to install and configure Windows Vista for optimal performance, customize the streamlined new desktop, display sidebars and gadgets, and enjoy all the entertainment capabilities, including music, movies, and games. Find out how to manage your files, install software and hardware, and use the latest Internet technologies. You'll also learn to secure your system, back up and restore your files, and set up a Local Area Network (LAN) so you can share resources. Filled with clear screenshots and detailed explanations, this is your one-stop guide to mastering Windows Vista. Customize your desktop with new UI components Use the new User Account Control (UAC) to prevent unauthorized changes to your computer Manage files and folders using Windows Flip 3D and Windows Live Taskbar thumbnails Protect your files using the Backup and Restore Center Manage and edit your photos with the new Windows Photo Gallery Keep track of your appointments with the new Windows Calendar Use Windows Media Center to record live TV and radio, view digital photos, play music, and burn CDs and DVDs Connect to the Internet and use Windows Mail, Internet Explorer 7, and Windows Live Messenger Secure your PC and use Windows Update Troubleshoot and tune Windows Vista for maximum performance


Securing IM and P2P Applications for the Enterprise

Securing IM and P2P Applications for the Enterprise

Author: Marcus Sachs

Publisher: Elsevier

Published: 2005-12-12

Total Pages: 480

ISBN-13: 0080489699

DOWNLOAD EBOOK

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics