Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2013 Issue 10
Introduction to switch failure diagnosis and elimination
Hou Maosheng
..............page:10,9
Security Characteristic and Technology in the Internet of Things
Yang Xinai;Li XueMei
..............page:12,14
Windows GDI Graphics Image Processing Technology
Zhou Xiaoqing
..............page:17-18
The application of computer information technology
Qu Jiwen
..............page:20,22
The physical layer of intelligent meter system in the auxiliary authentication technology
Ma Ting;Zhou Nianrong;Gao Feng;Ren Mengyin;Wen Hong
..............page:21-22
Safety Management of Computer Database
Qu Liang
..............page:29,31
Based on the Android platform application development research
Zhu Sheng;Mou Xingliang;Shan Kangkang
..............page:46-47,64
Computer Experimental Teaching Reform
He Qiuyan;Du Xiaojing;Yang Zhen
..............page:50-51
Analysis of Web-based job management system for students
Dong Yuhong
..............page:52,55
Analysis of network intrusion detection system
Luo Zaiyang
..............page:54-55
Analysis of information and network security system model
Shi Baiquan
..............page:56,51
The security tactics of e-government information on
Bai Lu
..............page:60-61
Discussion on computer network security solutions
Chen Yong
..............page:62,73
Research on Security of Wireless Sensor Networks in Internet of Thing
Du Xiaojing;He Qiuyan
..............page:66-67
Computer network security technology and prevention strategy
Yu Guangshan;Li Xianghai;Wu Guoliang
..............page:69,71
Research on the New Mode of Management Informatization Construction
Li Hua;Chen Zhibo;Wang Minquan
..............page:70-71
I plant Lan virus and its preventive measures
Zhang Jinling
..............page:72-73
The security of local area network
Zhao Ying;Zhang Yinxue
..............page:74,61
Boiled water subsidy system based on campus all-in-one-card platform design and implementation
Qiao Yu;Yu Leilei;Liu Zhilei;Guo Shunqiang
..............page:77-78
Network security technology
Liu Jingjing;Lan Wei
..............page:79,87
Modem network IT Security and Management Issues
Li Fan
..............page:81,83
.Net three-dimensional simulation of the campusWebGIS system testing
Huang Zhenying;Peng Peng
..............page:82-83
Hainan radio and network transmission technology
Chen Jiaxiong
..............page:90-91
Research on Security Issues of Smart Grid
Ma Ting;Zhou Nianrong;Gao Feng;Ren Mengyin;Wen Hong
..............page:92-93
Syncretic DRM: Advance on Digital Rights Management
Zhang Zhiyong
..............page:96-97,100
A MHBT-Based Damage Quarantine and Recovery Model for Database
Zhao Fei;Su Zhong;Ding Xiao
..............page:101-104
Things traceability system security technology research
Yao Lixin;Liang Hongtao
..............page:105-106
Several methods of controlling characters in Virtools
Qi Bing
..............page:107,106
Optimization of Removed Algorithm in the Grayscale Bitmap Background Impurities
Han Yongyin;Yu Bencheng
..............page:110-113
Ningxiaadult educationmanagement informationsystem design
Yang Xiaoyan;Liu Wenbo
..............page:114,113
The China meteorological administration and application research on mobile office
Mou QiuJiang;Guo Dong;Zhong Lei
..............page:115-117,122
Basic Course Teaching of Computer Applications Analysis
Zhou ChengXiong
..............page:118-119
CDIO program design of curriculum reform
Fan Liping
..............page:123,122
Discussion on the Model of Information Literacy Based on Integrated Instruction
Zhong Cheng;Yang Zhen;He Qiuyan
..............page:125,119
Analysis of computer network teaching in vocational
Wu Ming
..............page:126,132
Study of axis aligned bounding box algorithm
Wang Wei
..............page:127-128
WEB-basedplatform-baseddesign and practice ofteaching resources
Shan Xiaoyang
..............page:129-130
The software operational management of the power industry
Chang Jian;Mu Jiyuan
..............page:131-132