Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2012 Issue 6
Based on the safety Certificate PKI Solutions
du li ping ; liu yu
..............page:23-25
The Introduction and Prospect of Firewall
rong er hu
..............page:29-31
Cloud computing security legal risk analysis
li zhen shan
..............page:12-14
Information mining in aerial survey data processing applications
chen zuo li ; zhang wen jian
..............page:54-56
Analysis of computer statistics and community policing
kuang zuo
..............page:60-61
Theoretical Model of Corporations' Green IT Practice
kang le le ; wang xiang ; yang xue ; yang ze ru
..............page:45-48
Practice Teaching System Research Of Electronic Forensics speciality
tan min ; fan qiang
..............page:49-50
Legal analysis of the network
wang dai
..............page:62-63
Analysis on the characteristics and Countermeasures of network crime forensics
liu jian jun ; chen guang yi ; qin zi hui
..............page:4-6
The Exploration of Cyber Collective Behavior
zhu si he
..............page:64-66
Oracle hot standby in the enterprise database application in environment
liu gang ; xing hua ni ; li ya ru ; wang lei ; ye xiu fen ; dong jun yan
..............page:32-33
fang zhi hei ke ru qin ji shu
..............page:F0002-F0002,1
RFID Technology in the Passbook Printer
lin xiao zuo
..............page:39-41,16
Research based on the wormhole attack and defense of the Ad Hoc
huang cheng bing
..............page:17-19
On the principle of disk data loss and recovery methods
jin ke ning
..............page:51-53
Research of Security Situation Awareness based on Mobile Network Terminal
zhang zuo ; zhong qiu xi ; gong jian wei
..............page:26-28
How to realize remote data transmission of digital management of single well
hou lei ; liang ya xiong ; xu jin jun ; liu feng ; xing hua ni ; yao li rui ; guo jing
..............page:34-35,11