Search Results for Peer-to-peer architecture (Computer networks) - Narrowed by: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dPeer-to-peer$002barchitecture$002b$002528Computer$002bnetworks$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2025-12-13T15:49:35Z Securing IM and P2P applications for the enterprise ent://SD_ILS/0/SD_ILS:253939 2025-12-13T15:49:35Z 2025-12-13T15:49:35Z Author&#160;Piccard, Paul L.&#160;Sachs, Marcus H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490177">http://www.sciencedirect.com/science/book/9781597490177</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing ent://SD_ILS/0/SD_ILS:247871 2025-12-13T15:49:35Z 2025-12-13T15:49:35Z Author&#160;Mitchell, Chris, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBPC006E">http://dx.doi.org/10.1049/PBPC006E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>