|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn624323571 |
003 |
OCoLC |
005 |
20231117033135.0 |
006 |
m o d |
007 |
cr bn||||||abp |
007 |
cr bn||||||ada |
008 |
100519s1995 maua ob 001 0 eng d |
040 |
|
|
|a OCLCE
|b eng
|e pn
|c OCLCE
|d OCLCQ
|d OCLCF
|d E7B
|d OPELS
|d OCLCQ
|d STF
|d LUN
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 297938465
|a 974615346
|a 974670513
|
020 |
|
|
|a 9780127387659
|q (electronic bk.)
|
020 |
|
|
|a 012738765X
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)624323571
|z (OCoLC)297938465
|z (OCoLC)974615346
|z (OCoLC)974670513
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.754
|b .W39 1995
|
082 |
0 |
4 |
|a 005.3
|2 20
|
084 |
|
|
|a 54.50
|2 bcl
|
100 |
1 |
|
|a Wayner, Peter,
|d 1964-
|
245 |
1 |
0 |
|a Agents unleased :
|b a public domain look at agent technology /
|c Peter Wayner.
|
260 |
|
|
|a Boston :
|b AP Professional,
|c �1995.
|
300 |
|
|
|a 1 online resource (x, 358 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 337-349) and index.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a Agents Unleashed: A Public Domain Look at Agent Technology covers details of building a secure agent realm. The book discusses the technology for creating seamlessly integrated networks that allow programs to move from machine to machine without leaving a trail of havoc; as well as the technical details of how an agent will move through the network, prove its identity, and execute its code without endangering the host. The text also describes the organization of the host's work processing an agent; error messages, bad agent expulsion, and errors in XLISP-agents; and the simulators of errors, functions, and resources. Agent language, XLISP, TCL and other languages are also considered. The book further tackles security and encryption; commercial cash; and some ambitious and extreme examples of how people are attempting to create agents. The text also encompasses the instructions on how to use the XLISP agents. Software agents will find the book invaluable.
|
650 |
|
0 |
|a Computer software.
|
650 |
|
0 |
|a Computer programs.
|
650 |
|
6 |
|a Logiciels.
|0 (CaQQLa)201-0032041
|
650 |
|
7 |
|a software.
|2 aat
|0 (CStmoGRI)aat300028566
|
650 |
|
7 |
|a Computer programs
|2 fast
|0 (OCoLC)fst00872410
|
650 |
|
7 |
|a Computer software
|2 fast
|0 (OCoLC)fst00872527
|
650 |
1 |
7 |
|a Software.
|2 gtt
|
653 |
0 |
|
|a Computers
|a Networks
|
776 |
0 |
8 |
|i Print version:
|a Wayner, Peter, 1964-
|t Agents unleased.
|d Boston : AP Professional, �1995
|w (DLC) 95000109
|w (OCoLC)31970067
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780127387659
|z Texto completo
|