Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2012 Issue 12
check point jie du 2013 an quan
..............page:77-78
The Research and Application of a Vertical Search Engine in Porn sites Monitoring System
LUO Xiu-chun;SHI Xian-sheng;HAO Zhi-chao;LI Jian-qing
..............page:9-14
Government Websites System Security Research
XIAO Mei-hua
..............page:72-74
How to do the Software Security Testing Bestly
PAN Hao-liang;LU Xin-hua;WANG Guang-yi
..............page:54-57
The Construction of Information Security System in Military Academies
WU Yao-wu;ZHENG Lin;BI Sheng
..............page:68-71
Research and Implementation of Security WLAN Gateway based on EAP-TLS
ZHOU Li;TAN Fang-yong;ZHANG Yan;XU Lu-lei
..............page:25-27,33
rang da jia sao xing liao
..............page:90
Research and Implementation of Key Management Mechanism based on PKCS11
Meng Zhi-min;Liu Jun
..............page:50-53
xin xi dong tai
..............page:14,49,64,71,88-89,91
zhen dui gao ji yin dun ji shu de gong fang ce shi
li ming jiang ; xu jin wei ; li shi yuan
..............page:2-8
Review On Enterprise Information Security Standard Application
DING Jian;ZHOU Kai;FU Xiao-juan;SHEN Liang
..............page:61-64
Review of Information Grid Network Security Technology
QING Song
..............page:15-19,24
wang luo an quan li fa bao hu
..............page:1
A Hybrid Mutual Identity Authentication Technology with its Application
Chen Bang-chun;Huang Yu-hua;Shi Yang-yang
..............page:34-37
Exploration of Web Automation Security Maintainence
LIANG Wan-long
..............page:58-60