Legitimate applications of peer to peer networks
Furkejuvvon:
| Váldodahkki: | |
|---|---|
| Searvvušdahkki: | |
| Materiálatiipa: | Elektrovnnalaš E-girji |
| Giella: | eaŋgalasgiella |
| Almmustuhtton: |
Hoboken, N.J. :
Wiley-Interscience,
c2004.
|
| Fáttát: | |
| Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
| Fáddágilkorat: |
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Geahča maid: Legitimate applications of peer to peer networks
- Implementing and managing APPC protected conversations
- Steal this file sharing book what they won't tell you about file sharing /
- Synergy of peer-to-peer networks and mobile ad-hoc networks bootstrapping and routing /
- Cooperative networking
- Network+ 2005 in depth
- P2P how peer-to-peer technology is revolutionizing the way we do business /