LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
|
|
- Hope Potter
- 5 years ago
- Views:
Transcription
1 LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
2
3 LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
4
5 LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
6 This book is published on acid-free paper. Copyright 2004 by John Wiley & Sons, Inc. Published by John Wiley & Sons, Inc. All rights reserved. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) , fax (978) , or on the web at Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) , fax (201) Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representation or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the U.S. at , outside the U.S. at or fax Wiley also publishes its books in a variety of electronic formats. Some content that appears in print, however, may not be available in electronic format. Library of Congress Cataloging-in-Publication Data: Verma, Dinesh, Legitimate applications of peer to peer networks / Dinesh C. Verma. p. cm. Includes bibliographical references and index. ISBN (Cloth) 1. Peer-to-peer architecture (Computer networks) 2. Application software Development. 3. Electronic data processing Distributed processing. I. Title. TK V '5 dc Printed in the United States of America
7 Dedicated to Paridhi, Archit, and Riya
8
9 CONTENTS Preface Who Will Benefit from This Book? Who Is This Book Not For? Organization of the Book xi xii xiii xiii 1 The Peer-to-Peer Architecture Distributed Applications A Distributed Computing Example Client-Server Architecture Peer-to-Peer Architecture The Peer-to-Peer Software Structure Base Overlay Layer Middleware Functions Application Layer Comparison of Architectures Ease of Development Manageability Scalability Administrative Domains Security Reliability 16 vii
10 viii CONTENTS 2 Peer Discovery and Overlay Formation Discovery Static Configuration Centralized Directory Using the Domain Name Service Member Propagation Techniques with 24 Initial Member Discovery Member Propagation with Full 25 Member List Member Propagation with Partial 25 Member List Member Propagation with a 26 Hint Server 2.2 Overlay Formation Creating an Overlay Link Communicating Across Firewalls Communicating Across Two 29 Firewalls 2.3 Topology Selection Random Mesh Formation Tiered Formation Ordered Lattices 34 3 Application-Layer Multicast General Multicast Techniques Group Addressing Group Maintenance Message Forwarding Scheme Multicast Routing Secure Multicast Reliable Multicast Multicast Flow and Congestion Control Network-Layer Multicast IP Multicast Problems with IP-Layer Multicast Application-Layer Multicast Broadcast Mechanisms in Peer-to-Peer 52 Networks Multicast in Peer-to-Peer Overlays 53 4 File-Sharing Applications File-Sharing Overview 55
11 CONTENTS ix Disk Space Management File Indexing File Search/Retrieval Access Control and Security Anonymous File Retrieval Search Acceleration Techniques Digital Rights Management Usage of File-Sharing Applications Limitations of File-Sharing Applications Preventing Unauthorized File Sharing Firewall-Based Techniques Asset Inventory Port Scanning Usage-Based Rate Control Malicious Participation 73 5 File Storage Service Handle Management Retrieving Files with Handles Circular Ring Routing Plaxton Scheme CAN Routing Algorithm Modified Network Routing Schemes Modified Broadcast Miscellaneous Functions Access Control Availability and Reliability Usage Scenarios Distributed File Systems Anonymous Publishing 92 6 Data Backup Service The Traditional Data Management System The Peer-to-Peer Data Management System The Backup/Restore Manager The Peer Searcher The File Searcher The Properties Manager The Data Manager The Schedule Manager Security Issues 103
12 x CONTENTS 6.4 Hybrid Data Management Approach Feasibility of Peer-to-Peer Data Backup Service Peer-to-Peer Directory System LDAP Directory Servers Why Use Peer-to-Peer Directories? A Peer-to-Peer Directory System Schema Maintenance Operation Processing Local Placement of Records Name Space Partitioning Access Management Example Applications of Peer-to-Peer Directory Publish-Subscribe Middleware Overview of Publish-Subscribe Systems Server-Centric Publish-Subscribe Services Peer-to-Peer Publish-Subscribe Services Broadcast Scheme Multicast Group Approach Comparison of Approaches Example Application Collaborative Applications General Issues Instant Messaging IP Telephony Shared Collaboration Databases Collaborative Content Hosting Anonymous Web Surfing Related Topics Legacy Peer-to-Peer Applications Grid Computing 154 References 157 Index 161
13 PREFACE Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the Internet have clouded the entire peer-to-peer technology industry and given peer-to-peer networks a bad name. Many companies and universities have banned peerto-peer networks because of copyright infringement issues. The vitriolic legal debate over copyright violations has the potential danger of eclipsing many different legitimate applications that can be developed over peer-to-peer networks. Such networks offer decentralized domains of control and an increased level of parallelism and are extremely resilient to failures of machines and network. As a result, peer-to-peer technology can be used to develop many new applications that would benefit from the unique features offered by the peer-to-peer architecture. Some companies already offer peer-to-peer software for applications such as instant messaging, search engines, and data storage. The goal of this book is to describe some of the applications that can exploit the unique features of peer-to-peer networks and to discuss why developing these applications on a peer-to-peer netxi
14 xii PREFACE work is better than developing them in the traditional manner. Peer-to-peer technology is not an appropriate choice for all applications, and the book also discusses the disadvantages that a peer-to-peer version of an application would have compared with a conventional client-server implementation of the same application. WHO WILL BENEFIT FROM THIS BOOK? This book is intended for enterprise IT operators, architects, software developers, and researchers who are interested in peer-topeer networks. If you are a graduate student or network researcher who wants to learn about the different types of applications that could be developed on a peer-to-peer infrastructure, you will find this book to be very useful. The book contains a detailed description of many applications that can be developed on a peer-to-peer infrastructure and compares the relative merits and demerits of building those applications with a traditional client-server approach versus a peer-to-peer approach. If you are a network operator who operates a corporate intranet, you will find the overview of peer-to-peer architecture contained in this book very helpful. This book will help you understand peer-to-peer systems and how you can monitor and control the peer-to-peer applications running on your intranet. You may want to pay special attention to the sections of Chapter 4 that describe the different measures and countermeasures to monitor and regulate your network bandwidth usage with peer-to-peer applications. If you are an architect responsible for an enterprise network or an enterprise IT system and would like to harness peer-to-peer technology for use within your enterprise system, this book will help you understand the relative merits and demerits of peer-topeer implementations of various applications compared with the traditional client-server implementations of the same application. This will help you decide among the different possible ways of implementing your own applications, as well as providing useful information to understand the trade-offs of different vendor products. Finally, if you are a software developer working for a peer-topeer software development company, or want to develop your own
15 PREFACE xiii peer-to-peer application, this book will give you a comprehensive view of how different researchers have tried to approach problems similar to the ones you may be encountering in your specific application. WHO IS THIS BOOK NOT FOR? This book is not intended to provide information about the specific implementation of peer-to-peer networks. It does not describe the architecture of a specific peer-to-peer protocol but discusses general techniques that can be used for peer-to-peer network construction and the applications that can run on such networks. Although it provides a broad overview of many common peer-to-peer networks, you will not find it appropriate if you are looking for an in-depth treatment of a specific instance. This book is not intended as a discussion of the legal issues related to running peer-to-peer systems. If you are looking for a legal discussion on running applications on peer-to-peer networks, this book is not for you. This is a technical book that describes various applications that can take advantage of peer-to-peer technology in various manners and is not intended for a legal audience. ORGANIZATION OF THE BOOK The material in this book is organized into 10 chapters. Chapter 1 discusses the architecture of a peer-to-peer network and compares the peer-to-peer approach to traditional client-server architecture. It examines the key benefits of a peer-to-peer architecture and discusses its relative merits vis-à-vis the traditional client-server architecture. Chapter 2 discusses how the different nodes in a peer-to-peer network can be connected together to create an overlay network connecting the participants over the Internet. It also discusses how the nodes discover each other in order to create such an overlay. Chapter 3 discusses a common building block that supports many of the applications that are run on peer-to-peer systems, namely, the ability to multicast messages to a number of partici-
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationReal-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationIP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H
IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationDIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING
DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING DIFFERENTIAL EQUATION ANALYSIS IN BIOMEDICAL SCIENCE AND ENGINEERING ORDINARY DIFFERENTIAL EQUATION APPLICATIONS WITH R William E. Schiesser
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationOracle PL/SQL. DUMmIES. by Michael Rosenblum and Dr. Paul Dorsey FOR
Oracle PL/SQL FOR DUMmIES by Michael Rosenblum and Dr. Paul Dorsey Oracle PL/SQL For Dummies Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright 2006 by
More informationNetworking. 11th Edition. by Doug Lowe
Networking 11th Edition by Doug Lowe Networking For Dummies, 11th Edition Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com Copyright 2016 by John Wiley & Sons,
More informationOVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! CPA EXAM REVIEW. Auditing and Attestation. O. Ray Whittington, CPA, PhD Patrick R.
OVER 750 QUESTIONS AND 55 TASK-BASED SIMULATIONS! 2012 CPA EXAM REVIEW Auditing and Attestation O. Ray Whittington, CPA, PhD Patrick R. Delaney, CPA, PhD WILEY CPA EXAM REVIEW WILEY EXAM REVIEW Auditing
More informationBeginning Transact-SQL with SQL Server 2000 and Paul Turley with Dan Wood
Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with Dan Wood Beginning Transact-SQL with SQL Server 2000 and 2005 Beginning Transact-SQL with SQL Server 2000 and 2005 Paul Turley with
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationLinux Command Line and Shell Scripting Bible. Third Edtion
Linux Command Line and Shell Scripting Bible Third Edtion Linux Command Line and Shell Scripting BIBLE Third Edition Richard Blum Christine Bresnahan Linux Command Line and Shell Scripting Bible, Third
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationCloud Phone Systems. Andrew Moore. Making Everything Easier! Nextiva Special Edition. Learn:
Making Everything Easier! Nextiva Special Edition Cloud Phone Systems Learn: What cloud phone systems are and how they can benefit your company About the many advantages a cloud phone system offers Features
More informationExploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz
MOBILE CLOUDS Exploiting Distributed Resources in Wireless, Mobile and Social Networks Frank H. P. Fitzek and Marcos D. Katz MOBILE CLOUDS MOBILE CLOUDS EXPLOITING DISTRIBUTED RESOURCES IN WIRELESS,
More informationBeginning Web Programming with HTML, XHTML, and CSS. Second Edition. Jon Duckett
Beginning Web Programming with HTML, XHTML, and CSS Second Edition Jon Duckett Beginning Web Programming with HTML, XHTML, and CSS Introduction............................................... xxiii Chapter
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationJ2EE TM Best Practices Java TM Design Patterns, Automation, and Performance
J2EE TM Best Practices Java TM Design Patterns, Automation, and Performance Darren Broemmer Wiley Publishing, Inc. Dear Valued Customer, The WILEY advantage We realize you re a busy professional with
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More informationLinux. The book you need to succeed! Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and 13 Other Distributions Edition.
DVD and CD-ROM Included Run or install 18 different Linux distributions from the multi-boot DVD and CD-ROM! Christopher Negus Linux 2009 Edition Boot up to Ubuntu, Fedora, KNOPPIX, Debian, opensuse, and
More informationDesigning Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran
More informationSecuring SCADA Systems. Ronald L. Krutz
Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,
More informationMagical Math G ROOVY G EOMETRY. Games and Activities That Make Math Easy and Fun. Lynette Long. John Wiley & Sons, Inc.
Magical Math G ROOVY G EOMETRY Games and Activities That Make Math Easy and Fun Lynette Long John Wiley & Sons, Inc. G ROOVY G EOMETRY Also in the Magical Math series Dazzling Division Delightful Decimals
More informationMastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications
Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server
More informationWireless Sensor and Actuator Networks Algorithms and Protocols for Scalable Coordination and Data Communication Edited by Amiya Nayak and Ivan Stojmenovic A JOHN WILEY & SONS, INC., PUBLICATION Wireless
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationDATABASE DESIGN AND DEVELOPMENT
DATABASE DESIGN AND DEVELOPMENT DATABASE DESIGN AND DEVELOPMENT An Essential Guide for IT Professionals PAULRAJ PONNIAH A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley & Sons, Inc.
More informationMCITP Windows Server 2008 Server Administrator Study Guide
MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson MCITP Windows Server 2008 Server Administrator Study Guide MCITP Windows Server 2008 Server Administrator Study Guide Darril Gibson
More informationiwork DUMmIES 2ND EDITION FOR
iwork FOR DUMmIES 2ND EDITION iwork FOR DUMmIES 2ND EDITION by Jesse Feiler iwork For Dummies, 2nd Edition Published by John Wiley & Sons, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright
More informationEntrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4
Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 July 2008 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationCustomizing and Upgrading Linux Second Edition Linda McKinnon Al McKinnon Gearhead Press Wiley Computer Publishing John Wiley & Sons, Inc. Customizing and Upgrading Linux Customizing and Upgrading Linux
More informationThe Internet of Things
The Internet of Things The Internet of Things Connecting Objects to the Web Edited by Hakima Chaouchi First published 2010 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
More informationTessent TestKompress & Adv. Topics. Student Workbook
Student Workbook 2016 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors and is subject
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationSECURITY FOR WIRELESS AD HOC NETWORKS
SECURITY FOR WIRELESS AD HOC NETWORKS SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris Wiley Bicentennial Logo: Richard J. Pacifico Copyright # 2007 by John Wiley & Sons, Inc.
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationFUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE Mostafa Abd-El-Barr King Fahd University of Petroleum & Minerals (KFUPM) Hesham El-Rewini Southern Methodist University A JOHN WILEY & SONS, INC PUBLICATION
More informationExcel for Chemists. Second Edition
Excel for Chemists Second Edition This page intentionally left blank ExceL for Chemists A Comprehensive Guide Second Edition E. Joseph Billo Department of Chemistry Boston College Chestnut Hill, Massachusetts
More informationCOMPUTATIONAL DYNAMICS
COMPUTATIONAL DYNAMICS THIRD EDITION AHMED A. SHABANA Richard and Loan Hill Professor of Engineering University of Illinois at Chicago A John Wiley and Sons, Ltd., Publication COMPUTATIONAL DYNAMICS COMPUTATIONAL
More informationPHP & MySQL. Learn to: Janet Valade. Making Everything Easier! 4th Edition. Create well-formed PHP code that s compliant with PHP 4, 5, and 6
Making Everything Easier! 4th Edition PHP & MySQL Learn to: Create well-formed PHP code that s compliant with PHP 4, 5, and 6 Easily install and set up PHP and MySQL using XAMPP Choose a Web host and secure
More information"Charting the Course... MOC /2: Planning, Administering & Advanced Technologies of SharePoint Course Summary
Description Course Summary This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft environment. The course teaches you how to deploy, administer, and troubleshoot
More information"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary
MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationHands-On Oracle Application Express Security
Hands-On Oracle Application Express Security BUILDING SECURE APEX APPLICATIONS Recx Hands-On Oracle Application Express Security: Building Secure Apex Applications Published by John Wiley & Sons, Inc.
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationINCLUDING MEDICAL ADVICE DISCLAIMER
Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of
More informationGOVERNANCE, RISK, AND COMPLIANCE HANDBOOK
GOVERNANCE, RISK, AND COMPLIANCE HANDBOOK TECHNOLOGY, FINANCE, ENVIRONMENTAL, AND INTERNATIONAL GUIDANCE AND BEST PRACTICES Edited By ANTHONY TARANTINO, PHD JOHN WILEY &SONS, INC. Additional Praises for
More informationCLD100. Cloud for SAP COURSE OUTLINE. Course Version: 16 Course Duration: 2 Day(s)
CLD100 Cloud for SAP. COURSE OUTLINE Course Version: 16 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2017 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication
More informationOracle Fusion Middleware
Oracle Fusion Middleware Installation Planning Guide 11g Release 1 (11.1.1.7.0) B32474-16 June 2013 Oracle Fusion Middleware Installation Planning Guide, 11g Release 1 (11.1.1.7.0) B32474-16 Copyright
More informationWebSphere Commerce Developer Professional 9.0
Software Product Compatibility Reports Continuous Delivery Product - Long Term Support Release WebSphere Commerce Developer Professional 9.0 Contents Included in this report Operating systems Hypervisors
More informationHigh-Performance Oracle Proven Methods for Achieving Optimum Performance and Availability Geoff Ingram Wiley Publishing, Inc. High-Performance Oracle Proven Methods for Achieving Optimum Performance and
More informationAltiris Software Management Solution 7.1 from Symantec User Guide
Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationSymantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2
Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished
More informationSecurity Explorer 9.1. User Guide
Security Explorer 9.1 User Guide Security Explorer 9.1 User Guide Explorer 8 Installation Guide ii 2013 by Quest Software All rights reserved. This guide contains proprietary information protected by copyright.
More informationimagerunner 2545i/ i/ / Remote UI Guide
Remote UI Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG imagerunner 2545i/2545 2535i/2535 2530/2525
More informationOracle Fusion Middleware
Oracle Fusion Middleware Planning an Installation of Oracle Fusion Middleware 12c (12.2.1.2) E76887-02 November 2016 Documentation for installers and system administrators that describes how to plan and
More informationOracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management. 12c ( )
Oracle Fusion Middleware Installing and Configuring Oracle SOA Suite and Oracle Business Process Management 12c (12.2.1.3.0) E95730-01 May 2018 Oracle Fusion Middleware Installing and Configuring Oracle
More informationCOMPUTING FOR NUMERICAL METHODS USING VISUAL C++
COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ COMPUTING FOR NUMERICAL METHODS USING VISUAL C++ Shaharuddin Salleh Universiti Teknologi Malaysia Skudai, Johor, Malaysia Albert Y. Zomaya University of
More informationOracle Fusion Middleware
Oracle Fusion Middleware Upgrade Planning Guide 11g Release 1 (11.1.1.7.0) E10125-09 February 2013 Oracle Fusion Middleware Upgrade Planning Guide, 11g Release 1 (11.1.1.7.0) E10125-09 Copyright 2009,
More informationCLOUD MANAGEMENT AND SECURITY
CLOUD MANAGEMENT AND SECURITY Imad M. Abbadi University of Oxford, UK Wiley Contents About the Author Preface Acknowledgments Acronyms xi xiii xix xxi 1 Introduction 1 1.1 Overview 1 1.2 Cloud Definition
More informationOracle Fusion Middleware
Oracle Fusion Middleware Concepts Guide for Oracle API Catalog 12c Release 1 (12.1.3.0) E55976-02 August 2015 Documentation for anyone evaluating or implementing Oracle API Catalog. This guide describes
More informationFileMaker. Pro 10. The book you need to succeed! Companion Web Site. Ray Cologon. Go from basics to full-scale development
Companion Web Site Example FileMaker Pro 10 application Demos, tips, and additional resources Ray Cologon FileMaker Pro 10 Go from basics to full-scale development Write your own FileMaker applications
More informationSolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement
This PDF is no longer being maintained. Search the SolarWinds Success Center for more information. SolarWinds Orion Integrated Virtual Infrastructure Monitor Supplement INTEGRATED VIRTUAL INFRASTRUCTURE
More informationFUZZY LOGIC WITH ENGINEERING APPLICATIONS
FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition Timothy J. Ross University of New Mexico, USA A John Wiley and Sons, Ltd., Publication FUZZY LOGIC WITH ENGINEERING APPLICATIONS Third Edition FUZZY
More informationRuby on Rails. Bible
Ruby on Rails Bible Ruby on Rails Bible Timothy Fisher Ruby on Rails Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright 2008 by Wiley Publishing,
More informationCreating Web Pages. Learn to: Bud E. Smith. Making Everything Easier! 9th Edition. Design, build, and post a Web page
Making Everything Easier! 9th Edition Creating Web Pages Learn to: Design, build, and post a Web page Build pages using HTML, Web design software, and online tools Optimize photos, video, and audio for
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationLaser Beam Printer. Network Guide. IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference.
Laser Beam Printer Network Guide IMPORTANT: Read this manual carefully before using your printer. Save this manual for future reference. ENG Network Guide How This Manual Is Organized Chapter 1 Before
More informationINFORMATION RETRIEVAL SYSTEMS: Theory and Implementation
INFORMATION RETRIEVAL SYSTEMS: Theory and Implementation THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Series Editor W. Bruce Croft University of Massachusetts Amherst, MA 01003 Also in the
More informationInstalling and Configuring Oracle HTTP Server 12c (12.1.3)
[1]Oracle Fusion Middleware Installing and Configuring Oracle HTTP Server 12c (12.1.3) E48247-03 January 2015 Documentation for installers and system administrators that describes how to install and configure
More informationAn Introduction to GPFS
IBM High Performance Computing July 2006 An Introduction to GPFS gpfsintro072506.doc Page 2 Contents Overview 2 What is GPFS? 3 The file system 3 Application interfaces 4 Performance and scalability 4
More informationOracle Fusion Middleware Planning an Installation of Oracle Fusion Middleware. 12c ( )
Oracle Fusion Middleware Planning an Installation of Oracle Fusion Middleware 12c (12.2.1.3) E80584-01 August 2017 Oracle Fusion Middleware Planning an Installation of Oracle Fusion Middleware, 12c (12.2.1.3)
More informationSymantec Endpoint Protection Integration Component User's Guide. Version 7.0
Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms
More informationCapital. Capital Logic Aero. v Student Workbook
Capital v2018.1 Student Workbook 2019 Mentor Graphics Corporation All rights reserved. This document contains information that is trade secret and proprietary to Mentor Graphics Corporation or its licensors
More information"Charting the Course... MOC B Core Solutions of Microsoft Skype for Business Course Summary
MOC 20334 B Core Solutions of Microsoft Skype for Description Course Summary This course provides students with the knowledge and skills required to plan, deploy, configure, and administer a Skype for
More informationWindows 10 Revealed. The Universal Windows Operating System for PC, Tablets, and Windows Phone. Kinnary Jangla
Windows 10 Revealed The Universal Windows Operating System for PC, Tablets, and Windows Phone Kinnary Jangla Windows 10 Revealed Kinnary Jangla Bing Maps San Francisco, California, USA ISBN-13 (pbk): 978-1-4842-0687-4
More informationOracle Utilities Customer Care and Billing
Oracle Utilities Customer Care and Billing Quick Install Guide Release 2.5.0 E61796-01 May 2015 Oracle Utilities Customer Care and Billing Quick Install Guide E61796-01 Copyright 2000, 2015, Oracle and/or
More informationExam Ref Implementing Microsoft Azure Infrastructure Solutions Michael Washam Rick Rainey
Exam Ref 70-533 Implementing Microsoft Azure Infrastructure Solutions Michael Washam Rick Rainey PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399
More informationBasic Set of Services provided to AUBG students
Office of Communications and Computing Student Computing Basic Set of Services provided to AUBG students I. Computing environment 1. Network infrastructure OCC builds, supports and develops a university
More informationOracle Fusion Middleware
Oracle Fusion Middleware Configuration Guide for IBM WebSphere Application Server 11g Release 1 (11.1.1) E17764-01 January 2011 This document describes how to use the Oracle Fusion Middleware Configuration
More informationEssential Angular for ASP.NET Core MVC
Essential Angular for ASP.NET Core MVC Adam Freeman Essential Angular for ASP.NET Core MVC Adam Freeman London, UK ISBN-13 (pbk): 978-1-4842-2915-6 ISBN-13 (electronic): 978-1-4842-2916-3 DOI 10.1007/978-1-4842-2916-3
More information"Charting the Course B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course Summary
Course Summary Description This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange Server 2010 messaging environment. This course does not require previous
More informationGPU Shader Library. Mali. User Guide. Version: 1.0. Copyright 2009 ARM. All rights reserved. ARM DUI 0510A (ID101409)
Mali GPU Shader Library Version: 1.0 User Guide Copyright 2009 ARM. All rights reserved. ARM DUI 0510A () Mali GPU Shader Library User Guide Copyright 2009 ARM. All rights reserved. Release Information
More informationNetwork Performance Analysis
Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and
More information