Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2011 Issue 7
SQL Server Database Backup System based on Data De-duplication
DENG Liang;HU Xiao-qin;LIANG Gang
..............page:9-12
liang zi mi yue fen pei xie yi
luo yun mei
..............page:58-60
The Research of Social Security Institutional Net Trust Evaluation System
LUo Guo-hai;WANG Zhi;ZHAO Yan-hong;TIAN Wen-jin
..............page:81-84
ye nei dong tai
..............page:16,32,96-97,99
Small and Medium Enterprises Network Control Program Analysis and Design
YU Ben-cheng;MU Dong-zhou;LU Yu-yang
..............page:72-74
Analysis and Simulation on Routing Protocols of Ad Hoc Networks
ZHAO Xin-wei;ZHENG Hong-fei
..............page:40-43
SAS Discriminant Analysis Applied in Credit risk Management of the Banks
LI Jun-yi;LIANG Zhi-cheng
..............page:13-16
Ajax and its Security Analysis
YANG Zhen-hua
..............page:48-50
Host Anomaly Detection Based on Bayesian Tree
CHEN Wen
..............page:51-53
Power Plant Information Security Management Overview
SHI Qiang
..............page:78-80
The Application Research of Virtual Machine in Packers
YAO Wei-guang;CHEN Wen-yu
..............page:36-39
The Recovery of Password on Common Cisco Routers
CHEN Xiao-hong
..............page:75-77
A New IDS based on Multi-Agent System
PENG Bin
..............page:54-57
Research and Realization of the Technology Real-time Fusing Alerts Information
DUAN Xiang-wen;YANG Bing;ZHANG Yi
..............page:2-8
Design and Implementation of DNS Server
WU Qing-xiu;Ou Jun
..............page:44-47
shi wen xuan yi
..............page:94-95
A Mutual Authentication Protocol based on Key for RFID
LI Zhong-yang;LIU Jin-ping;LI Ting-ting
..............page:20-23
bao yu yan cheng de si kao
..............page:1
Web3.0 Password Protection Management Strategy
XU Feng
..............page:33-35