Summary8.1 Peer-to-Peer Computing Systems8.2 P2P Overlay Networks and Properties8.3 Routing, Proximity, and Fault Tolerance8.4 Trust, Reputation, and Security Management8.5 P2P File Sharing and Copyright Protection8.6 Bibliographic Notes and Homework ProblemsAcknowledgementsReferencesHomework Problems