Search Results for Peer-to-peer architecture (Computer networks) - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPeer-to-peer$002barchitecture$002b$002528Computer$002bnetworks$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?
2025-12-13T15:49:35Z
Securing IM and P2P applications for the enterprise
ent://SD_ILS/0/SD_ILS:253939
2025-12-13T15:49:35Z
2025-12-13T15:49:35Z
Author Piccard, Paul L. Sachs, Marcus H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing
ent://SD_ILS/0/SD_ILS:247871
2025-12-13T15:49:35Z
2025-12-13T15:49:35Z
Author Mitchell, Chris, ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>