Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2007 Issue 10
sentinel rmse wei qian ru shi xi tong ti gong yuan dong li
safenet gong si
..............
page:92
nac, yu xu qiu tong mai bo
array networks gong si
..............
page:93
qi ming xing chen : an quan guan li zhong xin zou xiang san ge wei du
qi ming xing chen gong si
..............
page:90-91
xu qiu yuan yu yong hu li yi dai gei yong hu
dong ruan gong si
..............
page:88-89
an quan shen ji : wu fa hui bi de an quan xin hua ti
pu xin yu
..............
page:86-87
lian xiang wang yu san da fu wu ju cuo zhong quan chu ji
..............
page:85
Discussion on the GAP-based Meteorological network Isolation Plan
SHENG Mei;FENG Zhi-wei;CHEN Shi-chun
..............
page:81-82
Research on Information Security of Large-scale Communications System Computer Network
HAN Hai-hang;WANG Jiu-hui
..............
page:77-80
mpls/bgp vpn zai yun nan dian zi zheng wu wang zhong de ying yong
du bo
..............
page:73-76
Tries to discuss Performance Management of The Orale Databases on E-government Network
ZHU Yun-hang
..............
page:69-72
Anti-jamming Measures of Software in Embeded System
BIAN Li-li
..............
page:65-68
The Network Security Management System Based on SNMP
Ai Qun
..............
page:63-64
Research of IPSec Security Policy
CHEN Zhuo;ZHANG Zheng-wen
..............
page:60-62
A Way of Anti-spoofing ARP Technology on the basis of PVLAN
SONG Zhi
..............
page:55-59
Wireless LAN(WLAN) Security Problems and Solution
LI Ji-liang
..............
page:51-54
Research of security policy in database backup and restore
guo xiao xue
..............
page:47-50
Practical Analysis and Study of Instruction Detection Model
WANG Cai-rong
..............
page:44-46
Guard against theft and alarm system of credit card Based on CVI
DENG Ming-xing;CONG Hai-rui;WANG Weng-yuan;HUANG Hai-bin;FENG Gao-hui
..............
page:102-103,105
xiao yuan wang chang jian gu zhang ji jie jue fang fa
wang zhe
..............
page:104-105
jie mi web an quan wei xie yu web xin yu fu wu
..............
page:97
shi guan xie mi pu guang tor dai li an quan wen ti
qian dui zhan
..............
page:98
xiao yuan wang luo an quan guan li zhong de hei ke ru qin yu fang fan
tan zhen
..............
page:99-101
An Optimization Algorithm of Digital Watermarking Scaling Parameter
WANG Shu-mei;ZHAO Wei-dong;WANG Zhi-Cheng
..............
page:1-4
The Introduction and Pipeline Designing Study of AES
WANG Xue-mei;SUN Xiao-dong;CHEN Hao-ming;LIU Yan-hua
..............
page:5-8
Designing of Automatic Curriculum Scheduling Based on Genetic Algorithm
XU Ke-sheng;ZHANG Su-fang
..............
page:9-12
Design and Implementatino of Secure Remote Wireless Access Platform
TIAN Huan
..............
page:13-17
Operating System Detection Based on TCP/IP and Protective Technology Research
ZHANG Zai-feng;HAN Hui-lian
..............
page:18-21
rang fa gui zun cong bu zai fu za rsa envision ying yong an li
rsa,emc xin xi an quan shi ye bu
..............
page:94
zhi neng nan bei hu tong jie jue wang tong dian xin hu lian " lao da nan "
radware gong si
..............
page:95
zheng quan he xin ye wu shu guang fang huo qiang lin wei shou ming
shu guang gong si xin xi an quan shi ye bu
..............
page:96
yi zhi ding qian kun :thinkpad zhi wen shi bie ji shu ying yong jing yan tan
..............
page:97
an quan zi xun
..............
page:106-111
zai bang wu yuan , zai jia wu yuan
qu ding
..............
page:112-113
yan lun
..............
page:114
lan dai si ke fa bu zhong guo fa zhan zhan lue bing tui chu an quan xin pin
..............
page:17
sonicwall yu shen zhou shu ma zai wang luo an quan shi chang jian li he zuo huo ban guan xi
..............
page:39
zhong wang fa bu s3 ge ren an quan ruan jian xin pin
..............
page:91
diao yan biao ming :it ji shu yu yuan gong guan nian zai xin xi an quan bao zhang zhong tong deng zhong yao
..............
page:83
lian xiang wang yu : wei yong hu da zao 4a wang guan an quan xi tong
..............
page:84-85
A Simple Way of Video Capture Implementation
SHEN Xu
..............
page:40-43
A Design and Realization Scheme of Data Validation with the Aspect Oriented Programming
NIU Lu-jun
..............
page:37-39
Study owing to that DCT region algorithmic figure watermark video frequency stream and screen stream protect method
HUANG Ruo-hong;LI Bi-xiang;SUN Jun-yi;CHEN Qi-xiang
..............
page:22-26
Discusses the LAMP safe defense system
ZHOU Jian-qiao;JIANG Zhao-yaun
..............
page:27-30
The Research on The Peer-To-Peer security model
ZHOU Ji;HE Qin-lu;DONG Li-li
..............
page:31-33
IPSec VPN based on Secure SMS system
YANG Yan;TAN Cheng-xiang;ZHAO Hong-fu
..............
page:34-36