This book presents initial steps towards creating secure systems that overcome attacks through adaptation. It provides a model explaining mobile code and methods for designing robust peer-to-peer networks. Methods are provided for implementing adaptive systems designed to tolerate many current attac
Disruptive security technologies with mobile code and peer-to-peer networks
โ Scribed by R R Brooks
- Publisher
- CRC Press
- Year
- 2005
- Tongue
- English
- Leaves
- 378
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content: 1. Overview --
2. Network security problems --
3. Current security solutions --
4. Disruptive technologies --
5. Understanding networks --
6. Understanding mobile code --
7. Protecting mobile code --
8. Protecting mobile code platforms --
9. Maintaining trust on the network --
10. Designing peer-to-peer systems --
11. Emergent routing --
12. Denial of service countermeasures --
13. Conclusion.
๐ SIMILAR VOLUMES
I work in the MP3 player industry, so the title of my review is only a slight exaggeration. P2P technology created the MP3 revolution. This book takes an honest look back at where P2P came from and where it is going from several different viewpoints. I think it is a must-read for anyone working o
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the technology's technical underpinnings is its socially disruptive potential: in various ways the
<DIV><p>The term ''peer-to-peer'' has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various
<p>This book presents the goals that drive the developers of the best-known peer-to-peer systems, the problems theyve faced, and the technical solutions theyve found. The contributors are leading developers of well-known peer-to-peer systems, such as Gnutella, Freenet, Jabber, Popular Power, SETI@Ho