Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 1
Constructing DHCP Using Electronic Archetypes
xi yan gui ;, yu yue ;
..............page:7,9
The role of Java technology in embedded systems inquiry
Zhou Ruitang;
..............page:8-9
Design and implementation of border protection system based on secure isolation
Du Jun;,Ji Jun;,Shi Ning;,Yu Jingyu;
..............page:16,18
PC application of RAID technology
Cao Ye;
..............page:20-21
Based on iot elevator monitoring system are discussed
Chao Nan;,Cui Yunlong;
..............page:26-27
Security technology of financial information system
Zhou Yang;
..............page:29-30
Linux-based server security gateway design and research
Luo Laixi;
..............page:32-33
B2C online book trading platform based on B2C
Zhang Lei;
..............page:42-43,46
Data distribution system based on object serialization technology
Lu Baoguo;,Zhu Jianhong;
..............page:49-50,52
Implementation and improvement of DES algorithm
Gao Jianxing;
..............page:61-62
Application and Practice of Open Analysis Model for Test Requirements
Gu Bin;,Gu Hongfeng;,Xu Ying;
..............page:63-64,66
The Research of Clustering Algorithm in Data Mining
Qin Yan;,Wang Hong;,Zhou Quanhua;
..............page:65-66
A Secure Two Party Authenticated Key Agreement Protocol
Chen Qirui;,Liu Zhiyuan;
..............page:67-68,73
Analysis and Application Research on Fuzzy Clustering
Li Xinshe;,Yao Junping;
..............page:69-70
How to carry out efficient performance test
Cui Kai;,Xie Bin;
..............page:82-84,87
Combination designed for voice-based redundant interleaving method
Chen Yongquan;,Chu Jin;,Hu Chonghao;,Zhang Yu;
..............page:90-91
A dynamic adjustment algorithm of node in Internet of Things
Lu Baoguo;,Zhu Jianhong;
..............page:92-94
Design and Implementation of A New File Storage on Separate Storage of catalogue data
Du Min;,He Wencai;,Liu Peihe;,Zheng Zhao;
..............page:95-97
Safety of hospital information network
Zhao Wenjun;
..............page:99-100
ru he fang fan min gan xin xi xie lu ?
mou jian jun ;
..............page:封2,1
Study on safety tuning terminal equipment based on user experience
Feng Youjun;,Li Hanju;
..............page:101,103
Discuss ICMP flood and trojon
Liu Hong;,Liu Hui;,Zhou Mingjun;
..............page:105-106
The Construction of Computer Network Security System
Shi Xinyu;
..............page:111-112
Analysis of network application system performance optimization test
Kong Liuyan;,Ling Lang;,Liu Xin;
..............page:113-114
Research and Application Based Database Security
Zhang Xingping;
..............page:119,121
DDoS attacks research based on WLAN
Huang Haiyan;,Liu Linlin;
..............page:122
Based on iot elevator monitoring system are discussed
Wu Wenbin;
..............page:126,128
Safe and stable operation of the computer network information system solutions
Liu Jinlang;,Ping Chang;
..............page:127-128
Research on Security Strategy of Web Server Publishing
Guo Yulong;,Yang Haojie;
..............page:138-139
Study on information system planning of rail transit network
Gao Peng;,Li Yue;,Yang Yiqing;
..............page:148-149
Information network security and protection strategy
Duan Yiyong;,Sun Liling;,Tang Jie;
..............page:152-153
The design and making of multimedia courseware
Lin Mingxin;,Sun Huaying;
..............page:159-160
Safety management of Digital Campus
Sun Li;
..............page:162-163
Digital campus information platform
Wang Xin;
..............page:164-165
Computer network system seven protocols teaching skills
Zhang Wanliang;
..............page:166,168
The Informatization Construction of College defense
Liu Yuchen;
..............page:169,171
Impact on young people's online game
Li Ziyan;,Shu Xiaobin;
..............page:175,177
Brief Remarks on Machine Learning Methods
Zhen Panhao;
..............page:176-177
Trends and Trends Analysis Network Information Service
Cai Minfu;,Zhang Haidong;
..............page:184,186
The computer aided teaching investigation and thinking
Wang Meng;
..............page:191-192
Web production course teaching method
Li Yang;
..............page:193,195
The problems and Countermeasures of the integration of information technology and curriculum teaching
Kang Xiaoqing;,Li Shaogong;,Tang Zhaoyan;
..............page:197-198
In the text of the Tibetan case function words Identify and research
Dang zeng zhuo ma;
..............page:200-201
Optimization of electromechanical classroom Suggestions
Qi Bing;
..............page:202,204
Application of Biology Immunological Mechanism in Network Anti-hotlinking
Fan Zhenyu;,Li Ming;,Song Guangjun;,Zhang Yan;
..............page:203-204
Let the colorful information world into the art class
Fang Longqiang;,Zhai Peihong;
..............page:207,211
Four dimensional construct school network teaching platform
Shu Dingfeng;
..............page:208-209
Analysis of computer network security
Keyilan·tuerxunbieke;
..............page:210-211
Application of Microteaching System Training Normal Students' Teaching Ability
La Guoqing;,Liu Chuanyong;,Wang Yue;
..............page:216-217
Virtual machines Live migration Remote property Attestation
Chen Fuwei;,Li Jian;
..............page:218-219