Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2012 Issue 6
Based on the safety Certificate PKI Solutions
du li ping ; liu yu
..............
page:23-25
The Introduction and Prospect of Firewall
rong er hu
..............
page:29-31
Cloud computing security legal risk analysis
li zhen shan
..............
page:12-14
guo chan hpc he yun ji suan huo jiang zou jin hao lai wu 3d jiao fu ka mei long can guan shu guang gong si
xiao hui
..............
page:7-7
Information mining in aerial survey data processing applications
chen zuo li ; zhang wen jian
..............
page:54-56
On Our Country Electronic Monitoring System Research under The Background of Informatization-Comparison with England, America, France, Japanese
yang qun
..............
page:67-69
Legislation Protecting of the Right to Network Dissemination of Information
fang fu peng
..............
page:70-71
Research on Satisfation of Community Information Service System based on ExtJs
wang guan yu
..............
page:36-38
The Model of Extended Visual Eryptography Echemes That Use Only a pair of Basic Matrixes
wu li ; wu wen bin
..............
page:57-59,28
Analysis of computer statistics and community policing
kuang zuo
..............
page:60-61
Theoretical Model of Corporations' Green IT Practice
kang le le ; wang xiang ; yang xue ; yang ze ru
..............
page:45-48
Practice Teaching System Research Of Electronic Forensics speciality
tan min ; fan qiang
..............
page:49-50
Discussion on the protecting of computer forensic searching
sun chuan
..............
page:75-76
Legal analysis of the network
wang dai
..............
page:62-63
Analysis on the characteristics and Countermeasures of network crime forensics
liu jian jun ; chen guang yi ; qin zi hui
..............
page:4-6
Analysis on the Privacy Policy of the real-name system microblogging
li min hua
..............
page:72-74
The Exploration of Cyber Collective Behavior
zhu si he
..............
page:64-66
Oracle hot standby in the enterprise database application in environment
liu gang ; xing hua ni ; li ya ru ; wang lei ; ye xiu fen ; dong jun yan
..............
page:32-33
55 000 ming twitter yong hu xin xi bei dao
..............
page:80-80
On the public security information analysis of internet public opiuion analysis
yu li
..............
page:77-79
mei guo guo an xiao zu ke neng jian yi ju jue zhong guo yi dong zai mei kai zhan dian hua ye wu
..............
page:80-80
ying guo duo ge zheng fu wang zhan chu xian wang luo tan huan
..............
page:80-80
fang zhi hei ke ru qin ji shu
..............
page:F0002-F0002,1
How to realize remote data transmission of digital management of single well
fan hai feng
..............
page:9-11
RFID Technology in the Passbook Printer
lin xiao zuo
..............
page:39-41,16
Research based on the wormhole attack and defense of the Ad Hoc
huang cheng bing
..............
page:17-19
The Application of optical fiber communication transmission technology
li jian lei
..............
page:15-16
On the principle of disk data loss and recovery methods
jin ke ning
..............
page:51-53
Application Study on Internet of Things in Public Security Information Field based on RFID
mai er dan a bu la
..............
page:42-44
Research of Security Situation Awareness based on Mobile Network Terminal
zhang zuo ; zhong qiu xi ; gong jian wei
..............
page:26-28
check point shou xian tui chu fang yu wang luo fan zui de xie tong shi wang luo
xiao hui
..............
page:8-8
wen jia bao zhu chi guo wu yuan chang wu hui yi bu shu xin xi an quan gong zuo
..............
page:80-80
anonymous qin ru mei guo si fa bu wang zhan
..............
page:80-80
Research of Network Information Security Countermeasure Based on Asymmetrical Encrypts
chen hong xing ; zhou zuo lan
..............
page:20-22
How to realize remote data transmission of digital management of single well
hou lei ; liang ya xiong ; xu jin jun ; liu feng ; xing hua ni ; yao li rui ; guo jing
..............
page:34-35,11
di shi san jie zhong guo xin xi an quan da hui long zhong zhao kai
..............
page:80-80