Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ…
Contents
1. INTRODUCTION
1.1. BACKGROUND
1.2. DEFINITIONS
1.3. CONTRIBUTION, PURPOSE AND GOAL
1.4. TARGET GROUPS
1.5. LIMITATIONS
1.6. PROBLEM DESCRIPTION
1.7. LITERATURE STUDY AND DATA COLLECTION
1.8. HYPOTHESIS
1.9. METHODS
2. BASIC PEER-TO-PEER – LITERATURE RESEARCH
2.1. DEFINITION
2.2. THE MAIN AREAS OF PEER-TO-PEER
2.3. BACKGROUND TO SECURITY ISSUES
2.4. PROBLEMS CONCERNING PEER-TO-PEER
2.5. SECURITY POLICY
2.6. SUMMARY – LITERATURE RESEARCH
3. SURVEY
3.1. DATA ANALYSIS
3.2. SUMMARY – SURVEY
4. CASE STUDY
4.1. DATA ANALYSIS – SURVEY
4.2. DATA ANALYSIS – NETWORK SCAN
4.3. SUMMARY – CASE STUDY
5. LABORATORY TEST
5.1. DESIGN AND IMPLEMENTATION
5.2. DATA ANALYSIS…
………
Author: Linus Petersson
Source: Blekinge Institute of Technology
Download URL 2: Visit Now
Keywords: Project Reports, Dissertation, Thesis