Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2007 Issue 5
From Web to Information Grid
Shi Xiangning
..............
page:20-22
Security Protocol Analysis about TCP/IP Network
Chen Liang
..............
page:18-19,12
Create the Safe and Blue Flagship in the Sea in Information
Huang Yufei
..............
page:17
The SECWORLD Safety Management Guides the Safe and New Standard in the Next Generation
Wen Bin
..............
page:16
The Safe Terminal in Net in Inside Reinforces for First
Meng Gang
..............
page:15
New Edition in etalk Offering Many Language Motion Analyzes the Function
Lu Xiaoli
..............
page:14
The High Performance Calculation Grows for Tomorrow for the Aviation Business
Wang Xinying
..............
page:13
Passing the Resources of Integration Promotes the Business Enterprise Information Turns the Level
ZhU Changfeng
..............
page:10-12
The IronPort Serves for the Safe Offering in Information in Chinese Internet Internationalization
Xie Jing
..............
page:9
The Front Involves the Present Condition of the Network Crime and Probes to Against the Counterplan First Step Study
Qiu Bo;Ji Lei
..............
page:23-25
Distributed Object Systems Role Security Access Control
He Xu
..............
page:26-27,83
Integrated Management of the Network Service DESIGN Model Based On ITIL
Zhao Hongxin;Yu Hongguang;Zhang Yan
..............
page:28-29,59
Research of Network Data Transmission Technology Based on PKI
Xia Jingqing
..............
page:30-32
Message Inoculation-Based Spam Filting Technology
Tang Xiaoling
..............
page:33-35
Analysis of Honeypot Technology
Ye Fei
..............
page:36-37,35
The Electromagnetic Leakages Problem and Prevention of the Computer Based Information System Connecting with the Secrets
Lu Libo
..............
page:38-40
The Analysis and Trend Predicts for the New Trojan Horse
Jia Jianzhong;Jiang Rui
..............
page:41-43
Obstruct to Control to the Tradition the Strategy Improve of Conceive Outline
Lu Na
..............
page:44-45,22
Development of embedded Web Server based ARM920T
Su Xianli;Fang Hui
..............
page:46-47
Computer Virus and Prevention and Killing Measure
Zheng Jianguang;Zhu Zhengde
..............
page:48-49,57
The Analysis of The Security and Defend of Network Printers
Zhuang Haiyan;Wang Gang
..............
page:50-51
10GbE Application on Campus Network
Shen Zhong
..............
page:68-69
The Safety Design of the "II-in-One" System
Deng Yongjun;Ren Aifeng;Liu Hongkun
..............
page:70-71
Chinese Web Page Automatic Classification System Based on Oracle Text
Liu Jie;Liu Bing;Liu Meng;Chen Xiaohong
..............
page:72-74
Secure Web Application With ModSecurity
Zhang Hongyang;Tang Xuewen
..............
page:75-77
It is Shallow to Talk About Safe System in net Inside the Frontier Guards in Public Security Official Developments
Shi Feng
..............
page:78-80
According to an U for Reading Dish Data Instauration Technique
Dai Jianfeng;Gao Jing
..............
page:81-83
The DAWNING is High With INTEL to Carry the Strategy Cooperates the Propulsion Will Convoke in the City
Xiao Hui
..............
page:8
The Discussion of The Application for GAP in The Informational Public Security
Zhang Yu;Feng Zhaohui
..............
page:52-54
Design About the System in the Adaptive Management of Forest Ecosystem Based on bp Network
Wang Chuanli;Li Jiping
..............
page:55-57
Realization of Identifying Code Based on C#
Chen Shan;Qiao Mengli
..............
page:58-59
Research on the Directory Service of Electronic Government Based on the Application Integrated
Liu Mingliang;Tu Hang
..............
page:60-61
Comparative Study on the Memory Speciation
He Lianghua;Li Qin
..............
page:62-63
Enterprise Portal System
Wang Na
..............
page:64-65
The Enterprise Information Safety Threatens the Analytical and Safe Strategy
Zhang Fan
..............
page:66-67
A Study of black-and-white Digital Watermark Technique Based on Wavelet
She Zhenyan;Luo Jie
..............
page:84-85
A Key Distribution Scheme Based MSR
Li Chunzi;Liu Yining
..............
page:86-87
Adaptive Digital Watermarking Based on Wavelet Transform Using SSO and HVS
Wang Yufeng;WangMeng;Ma Yuefeng;Zhang Haijun
..............
page:88-90
Design and Realize of PKC-DES Scheme in Data Encoding System JT-P/D
Wu Wenxing
..............
page:91-93
The Analysis of the Serial Standards of WLANIEEE802.11
Zhao Guifang
..............
page:94-95,87
News
..............
page:96