Listing 1 - 10 of 26 << page
of 3
>>
Sort by

Book
P2P networking and applications
Authors: --- ---
ISBN: 1282287206 9786612287206 0080921191 0123742145 9780123742148 9780080921198 9781282287204 6612287209 9788131222492 8131222497 Year: 2009 Publisher: Amsterdam Boston Elsevier/Morgan Kaufmann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual ope


Book
WebRTC integrator's guide
Author:
ISBN: 178398127X 9781783981274 1783981261 9781783981267 Year: 2014 Publisher: Birmingham, UK Packt Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is for programmers who want to learn about real-time communication and utilize the full potential of WebRTC. It is assumed that you have working knowledge of setting up a basic telecom infrastructure as well as basic programming and scripting knowledge.


Periodical

Book
Python passive network mapping : P2NMAP
Authors: ---
ISBN: 0128027428 0128027215 9780128027424 9780128027219 9780128027219 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The ""Heartbleed"" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most important


Book
Structured peer-to-peer systems : fundamentals of hierarchical organization, routing, scaling, and security
Authors: ---
ISBN: 1461454824 1461454832 1283909987 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. Structured Peer-to-Peer Systems  covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems.


Book
On peers and copyright : why the EU should consider collective management of P2P
Author:
ISBN: 384524190X 3832976388 Year: 2012 Publisher: Nomos Verlagsgesellschaft mbH & Co. KG

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book analyzes the EU’s approach to P2P, a digital age technology that highlights the tensions between the Internet and a territorial and fragmented copyright law. It aims at providing the necessary legal qualification and context to understand why the EU, while following an economic and socially onerous path, has thus far failed to achieve its deterrence goals. It is argued that a solution to this conundrum must be based on the use of copyright law and policy as tools for market organization and innovation growth, with respect for rights holders and users (sometimes) opposing interests and the existing legal framework. The best answer to mass online P2P uses seems to be that of collective rights management, as it offers an organized licensing and remuneration system compatible with the interests of stakeholders. This is especially true in the EU, home to a developed and sophisticated market of CMOs, subject to numerous ECJ and Commission decisions, as well as varying EU institutional approaches, all pointing towards a preference for multi-territorial and pan-European licensing models. In this context, this book tests the compatibility of several non-voluntary and voluntary approaches to P2P with international treaties, the acquis or simply strategic policy considerations.

Fighting the war on file sharing.
Authors: --- ---
ISBN: 9789067042383 9067042382 Year: 2007 Publisher: The Hague TMC Asser press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Fighting the War on File Sharing aims at a multi-faceted understanding of why peer-to-peer services currently fail to gain their full potential in our society. The analysis focuses on music-file sharing. Three parts of the book ( The Morality of Regulation by Architecture', The Economics of Peer-to-Peer in Music' and Intellectual Property Rights for Music File Sharing') investigate the positions and opinions that individual disciplines can offer. As these analyses yield partial solutions, the final part of the book provides an institutional framework and applies it to produce new and crisp results on a tough, otherwise almost comprehensively researched subject. The framework recognizes the influence of outstanding work from law and information technology (Lessig), political anthropology (Douglas, Geertz, Smits), new institutional economics (Coase, North, Greif) and jurisprudence (Fuller, Bobbitt, Tamanaha). Its application allows a glimpse of veritable multidisciplinary co-operation concerning the perplexities of regulating the regularities in our social behaviour.

Securing IM and P2P applications for the enterprise
Authors: ---
ISBN: 128102032X 9786611020323 0080489699 1597490172 1423754905 9781423754909 9780080489698 9781597490177 Year: 2006 Publisher: Rockland, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themse

Peer-to-Peer Computing : Building Supercomputers with Web Technologies
Author:
ISBN: 1846287472 1846283817 Year: 2007 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Client/Server architecture was first proposed in the late 1980s as an alternative to conventional mainframe systems. Mainframe processing quickly becomes a bottleneck in any information system, but client/server models shift the processing burden to the client computer. Through workload sharing, client/server systems can improve overall efficiency while reducing budgets. Companies are again searching for ways to improve their processing power without further investment in new hardware and software. Many client computers are idle most of the time, and have unused disk space. The next logical step is to maximise the resources of these computers, and the peer-to-peer (P2P) model is the answer. A new and simple peer-to-peer model will be introduced in this book. In it: Readers will be taught to install peer-to-peer systems which can then manage and distribute the processing power of any number of clients. The size of network can range from two to over a million computers. The software necessary to implement peer-to-peer systems quickly can be downloaded from the book’s website at www.springer.com/1-84628-381-7/ The deployment of web technologies will enable individuals and organisations of all sizes to use computers across a network as though it were a single supercomputer to solve complex problems, and after reading this book, readers will be able to install a peer-to-peer system of any size.

Listing 1 - 10 of 26 << page
of 3
>>
Sort by