000 01936pam a22004454a 4500
005 20250918011708.0
006 m d
007 cr cn ---ancau
008 090701t20042005flua sb 001 0 eng
010 _a2004-057902
020 _a0849322723 (
035 _a(OCoLC)ocm56194801
035 _a13682451
039 9 _y07-01-2009
_zpuitm2
040 _aUKM
042 _apcc
082 0 0 _a005.8
_222
090 _aTK5105.525
_b.B76 2004
100 1 _aBrooks, R. R.
_q(Richard R.)
245 1 0 _aDisruptive security technologies with mobile code and peer-to-peer networks
_h[electronic resource] /
_cR.R. Brooks
260 _aBoca Raton :
_bCRC Press,
_c2004, c2005
500 _aAccess to 2http://www.egnetbase.com/ejournals/search/advsearch1.asp3 and type in the title. You may access the full text after you type in the advanced search screen
504 _aIncludes bibliographical references (p. [355]-372) and index
650 0 _aPeer-to-peer architecture (Computer networks)
650 0 _aComputer networks
_xSecurity measures
650 0 _aComputer viruses
650 0 _aDisruptive technologies
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/login?url=http://www.egnetbase.com/ejournals/search/advsearch1.asp
856 4 0 _3CRCnetBASE
_uhttp://www.engnetbase.com/ejournals/books/book_km.asp?id=5442
_zClick here for the electronic version
907 _a.b14529786
_b2022-04-06
_c2019-11-12
942 _n0
_kTK5105.525 .B76 2004
914 _avtls003412759
906 _a7
_bcbc
_corignew
_d1
_eocip
_f20
_gy-gencatlg
990 _aaini
998 _ae
_b2009-01-07
_cm
_dz
_feng
_gflu
_y0
_z.b14529786
999 _c445205
_d445205