Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2007 Issue 3
nsfocus 2006 nian shi da an quan lou dong
..............
page:封3
The Realization of Monitoring System of Network on Linux
Li Ruiwei;Ye Lichun
..............
page:11-13
The DAWNING Mute Server Creates the "Peaceful" Transacts
..............
page:10
The Check Point is this Year Safe Profession Trend Vein
Xiao Hui
..............
page:9
The CA Announced the Body Identifies with Visit the Latestedition in Solution(IAM)in Management in Legal Power
Li Guoqing
..............
page:8
News
..............
page:96
Analysis on Throughput of Data Transmission in Bluetooth Scatternet
Guo Feng;Geng Anan;Zhuang Yiqi
..............
page:93-95
The Classification of Assets of Telecommunications Data Network
Guo Shuguang;Zhang Ruili
..............
page:91-92
The Hill Cryptosystem With Digital Signature Function Base On Matrix Structure Method In Finite Field And RSA Cryptosystem
Li Wenfeng;Ren Jinwei
..............
page:88-90
The Use of Symmetric Cipher in Identification
Hu Xiangyi;Li Yan
..............
page:86-87,90
The Design and Application of IDS in the Network Office Safety System
Zhou Zengguo
..............
page:83-85
Study on the Information Security Management in an Informationalization Society
Liu Wenyan
..............
page:80-82
Analyzing the Effectiveness of Battlefield Network Attacking
Li Dong;Song Lihong;Wang Lu;Lei Zhidong
..............
page:78-79,92
The Analysis of Security Leaks in .NET Programming
Huang Yanbo;Zhong Fenghua
..............
page:76-77,51
Improving Grid Computing Security with TPM
Liu Ping;Chi Yaping;Fang Yong
..............
page:74-75,67
Design and Research of Computer Networks Integrated Lightning protection System
Cai Zhaoquan
..............
page:70-73
The Security Situation of Campus Network and Improvement Strategy
Chen Xinjian
..............
page:68-69
Addressing Internal Network Threats and Corresponding Counter Measures for Enterprise Network
Cai Xiping;Luan Yuhang;Tang Shen
..............
page:65-67
Research on Security Model Based on Trust in Pervasive Computing Envirenment
Wang Li;Duan Huichuan;Si Qingyan
..............
page:62-64,38
Review and Research on Grid Authorization Techniques
Zhang Chenjing;Han Chunjing;Liao Zhensong
..............
page:39-41
Data Capture in the Intrusion Honeypot System
Yu Wei;Hu Bei;Chen Changfang
..............
page:36-38
On the Analysis with the Countermeasures on the Problem of Intrusion Detection System on False Positives and False Negatives
Feng Yunfang
..............
page:33-35
About the Construction and Application of Small local Area Network
Li Kefeng
..............
page:31-32,13
Research of Network Security Technology for IDC
Wang Ting;Huang Wenpei
..............
page:28-30
The Key Technologies of Intrusion Detection System Based on Mobile Agent
Chen Yunfang;Wang Ruchuan
..............
page:25-27
Networks Topology Finding Based on SNMP and Depicting Topology Spanning Tree
Qu Zhaoyang;Hu Xuchao
..............
page:23-24,27
Service Development Mode Based On Parlay Web Service Technology
Shen Yulong;Pei Qingqi;Ma Jianfeng
..............
page:20-22
Design and Analysis of Enhanced PKI Application Model in IPSec-VPN
Fan Bingbing;Long Can
..............
page:17-19
Implementation and Evolution of SNMP's Security Mechanism
Chang Wenna;Guo Yuchun
..............
page:14-16
Recommendation to Build a Security Audit Monitoring System in the Procuratorial Organ's Intranet
Ji Hui
..............
page:60-61,35
The Analysis of safe Certificate in E-Commerce
Shuai Qinghong
..............
page:57-59
The Application of Xml File Encryption in Online Transactions
Gao Kai
..............
page:55-56,19
The Capture of Data Packets in the System of the Control and Monitor of the Network
Li Aiping;Hao Ying
..............
page:52-54
The Aggressive Network Defense and It's Application Research
Huang Jialin;Zhang Zhengfan
..............
page:48-51
Rearch on DoS Attack to DHT of P2P
Zhu Yunpeng;Lu Yuliang
..............
page:45-47
Analysis And Research About Misuse Detection Technology Of Network
Sun He;Qi He
..............
page:42-44