Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2007 Issue 8
80 wan she bao ji jin dang an diu shi de dai jia
guo jia xin xi zhong xin shu ju hui fu zhong xin
..............page:93
nei wang an quan jian she gui hua fang an tan tao
xiao wei chun
..............page:94-95
utm: li ti bao hu shi gen ben
shen ying
..............page:96,102
zhong dian huo mei ji tuan yi ti hua an quan jie jue fang an
fang zheng xin xi an quan ji shu you xian gong si
..............page:97
shu zi ban quan guan li bi jia mi nei gong
safenet gong si
..............page:91-92
gu shi wei sha yao ji du mu qiao ? ye tan zai xian jiao yi bao hu
rsa,emc xin xi an quan shi ye bu
..............page:90
Exports The Campus Network DNS Server Disposition
Xu Tao
..............page:82-84
The Practice and Application In Web Security Request With SSL
Zhang Liu-cheng;Wang Shuai
..............page:76-78,81
Safe threat and counterplan of the network of Ad Hoc
WANG Bo;XU Jing
..............page:73-75
A New Network Security Situation Assessment Model Research
hu jing zhen
..............page:68-69,72
Research on handling resource leaks in C++ programming
LI Wen;CHEN Yong;CHEN Ge
..............page:63-67
DESIGNS FOR DROOLS-BASED POLICY ARCHITECTURE
Ren Zhong-bao;Zhang Yan-jing;Li Li-ya
..............page:60-62,67
Hash Algorithms Research Based on C# Language
DU Yu-lan;ZHAO Lei
..............page:57-59
Network Attack and Defense Engineering Research
Ying Hong
..............page:47-52
Application of DBSCAN Cluster Algorithm in Anormaly Detection
Wu Zhen-zhen;Huang Jian-hua
..............page:43-46
yi ge ren zheng zhong xin de she ji yu shi xian
li an ping
..............page:15-16,32
Efficient Scheme of Rabin Digital Signature
CHEN Xiao-wen
..............page:17-20
Design and Implement of a Database Disaster Tolerant System
Zhang Chang-qing;Liu Xiao-jie;Li Tao;Lu Zheng-tian
..............page:21-23
Design and Implement of an Oracle Database Disaster Tolerance System
Huang Bin;Liu Xiaojie;Li Tao;Lu Zhengtian
..............page:24-26
Research on Secure Practices of SMS Application
XIE Liang;WANG Hai-hang;TAN Cheng-xiang
..............page:30-32
Research on the fault self testing of computer system
Niu yanru;Zhou Duan;Ma Zhen
..............page:33-35
The Implementation and Study of IPv4/IPv6 Dual Stack Network Security Detection System
Wang Kai;Zhu Heng-jun;He Peng
..............page:36-37,52
Mainstream operating system security analysis and security
Liu Zhen;Liu Zhong;Mai Fan-jin;Zhao Rong-yang
..............page:38-40
yi zhong ji yu xie tong de fen bu shi fang yu xi tong
zhu ge tao
..............page:41-42
The Application of Information Fusion Technology in Computer Virus Detection
Fu Mai-xia;Zhang Tian-le
..............page:100-102
an quan ge li ji shu shi jian tan
yang xia
..............page:107-108
an quan zi xun
..............page:109-112
xiang linux jin jun
qu ding
..............page:113-114
yan lun
..............page:115