| 000 | 01936pam a22004454a 4500 | ||
|---|---|---|---|
| 005 | 20250918011708.0 | ||
| 006 | m d | ||
| 007 | cr cn ---ancau | ||
| 008 | 090701t20042005flua sb 001 0 eng | ||
| 010 | _a2004-057902 | ||
| 020 | _a0849322723 ( | ||
| 035 | _a(OCoLC)ocm56194801 | ||
| 035 | _a13682451 | ||
| 039 | 9 |
_y07-01-2009 _zpuitm2 |
|
| 040 | _aUKM | ||
| 042 | _apcc | ||
| 082 | 0 | 0 |
_a005.8 _222 |
| 090 |
_aTK5105.525 _b.B76 2004 |
||
| 100 | 1 |
_aBrooks, R. R. _q(Richard R.) |
|
| 245 | 1 | 0 |
_aDisruptive security technologies with mobile code and peer-to-peer networks _h[electronic resource] / _cR.R. Brooks |
| 260 |
_aBoca Raton : _bCRC Press, _c2004, c2005 |
||
| 500 | _aAccess to 2http://www.egnetbase.com/ejournals/search/advsearch1.asp3 and type in the title. You may access the full text after you type in the advanced search screen | ||
| 504 | _aIncludes bibliographical references (p. [355]-372) and index | ||
| 650 | 0 | _aPeer-to-peer architecture (Computer networks) | |
| 650 | 0 |
_aComputer networks _xSecurity measures |
|
| 650 | 0 | _aComputer viruses | |
| 650 | 0 | _aDisruptive technologies | |
| 856 | 4 | 0 | _uhttps://eresourcesptsl.ukm.remotexs.co/login?url=http://www.egnetbase.com/ejournals/search/advsearch1.asp |
| 856 | 4 | 0 |
_3CRCnetBASE _uhttp://www.engnetbase.com/ejournals/books/book_km.asp?id=5442 _zClick here for the electronic version |
| 907 |
_a.b14529786 _b2022-04-06 _c2019-11-12 |
||
| 942 |
_n0 _kTK5105.525 .B76 2004 |
||
| 914 | _avtls003412759 | ||
| 906 |
_a7 _bcbc _corignew _d1 _eocip _f20 _gy-gencatlg |
||
| 990 | _aaini | ||
| 998 |
_ae _b2009-01-07 _cm _dz _feng _gflu _y0 _z.b14529786 |
||
| 999 |
_c445205 _d445205 |
||