<--- Back to Details
First PageDocument Content
File sharing networks / Intellectual property law / Peer-to-peer file sharing / File sharing / Peer-to-peer / Secure Federal File Sharing Act / Social peer-to-peer processes / Information security / Shared resource / Computing / Concurrent computing / Distributed computing
Date: 2013-01-11 14:42:37
File sharing networks
Intellectual property law
Peer-to-peer file sharing
File sharing
Peer-to-peer
Secure Federal File Sharing Act
Social peer-to-peer processes
Information security
Shared resource
Computing
Concurrent computing
Distributed computing

Whack-A-Mole Security: Bad Policy, Bad Legislation

Add to Reading List

Source URL: www.itif.org

Download Document from Source Website

File Size: 214,95 KB

Share Document on Facebook

Similar Documents

File sharing networks / Intellectual property law / Peer-to-peer file sharing / File sharing / Peer-to-peer / Secure Federal File Sharing Act / Social peer-to-peer processes / Information security / Shared resource / Computing / Concurrent computing / Distributed computing

Whack-A-Mole Security: Bad Policy, Bad Legislation

DocID: NsS3 - View Document