Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 5
Virtualization technology in Changzhou Technician College Campus Network
Yin Yuming;,Zhou Wei;
..............page:10-11
Paper Splicing Technology
Yang Ziyi;
..............page:12-13
Design and implementation of marine products cold chain logistics monitoring system
Cui Weidong;,Liu Hongri;,Sun Daxu;,Wang Min;,Wang Zexuan;
..............page:14-15
Study on Application of 4G technology in Distance Education
La Guoqing;,Zhao Man;
..............page:21,23
Based on PHP + MySQL web development research
Li Qiang;
..............page:22-23
OPNET Simulation Technology and Applied Research Network
Huang Fei;
..............page:31,33
Research and Application on the Security of ASP.NET Web Development Technology
Fang Kaihong;,Liu Xiaoyuan;
..............page:32-33
Study on the Reputation System of P2P Network Based on Particle Swarm Optimization
Cheng Huiqin;,Li Pengcheng;
..............page:35-36
The Application of MD5 Algorithm in The User Password Authentication
Liu Hongmin;,Yin Banghui;
..............page:37,40
Process of Synchronization and Mutual Exclusion
Liu Hong;,Liu Hui;,Zhou Mingjun;
..............page:38,40
The design and application for remote surveillance system in vehicle
Li Yilong;,Lu Jun;
..............page:39-40
Application of network technology in the hall
Liu Zhupei;
..............page:41,43
Design and implementation of identity identification system based on face recognition technology
Chai Xuguang;,Huo Yanling;,Wang Haibin;
..............page:42-43
On Microsoft stopped supporting Windows XP solution
Wang Lu;
..............page:44,46
Panoramic Virtual Tour technology research
Ke Shan;
..............page:45-46
Research on Attribute-based Proxy Signature Technology
Wang Wei;
..............page:47,49
Han Guwan coal mine ventilation system optimization
Wang Zhaoping;
..............page:48-49
The room information management platform design
Wang Yafei;,Zhang Yingxian;
..............page:51-52
Office automation system management Web technology research
Liang Yinglin;
..............page:54,56
construction and application of optical fiber network maintenance system
Hu Liancheng;,Huang Yong;,Shen Weiquan;
..............page:55-56
Study on the Iris Recognition Technology based on 2D-Gabor Filter
Mu Weibin;,Wan Yonggang;,Yu Qinglian;,Zhang Shuli;
..............page:60,62
Analysis and design of Wireless Sensor Network Security
Chen Zhenqing;,Luo Lanhua;
..............page:71-72
Sc computer access user identity recognition technology
Mo Qianling;
..............page:73,75
The analysis of application of data mining in network intrusion detection
Caiyongsheng;,Gu Hong;,Lv Zhibin;
..............page:79,81
Key technology of network security risk assessment
Li Jing;
..............page:82,84
The Continuous Improvements' mode for Command Information Systems
Wang XiaoYu;,Zhang Yanhuan;
..............page:87-88
Discussion on the Application of Recovery Card in University Computer Labs
Lu Honghu;,Xie Jiangtao;,Zhang Weiqing;
..............page:90-91
Cache line rate re-port switch and behavior analysis program
Wu Wuchun;
..............page:97-98,100
Software Reuse Considerations in Software Certification
Xu Fang;
..............page:99-100
Fish quality and safety traceability information management system design and implementation
Cao Shouqi;,Chen Chengming;,Xu Minli;,Yu Lijuan;
..............page:101-102,104
Parsing the Windows environment based on ARP network attack and defense technology
Lu Cuirong;,Sun Guanying;,Wang Xue;,Yao Yukai;
..............page:103-104
Based on the switch technology of network security strategy research
Chen Juan;,Qin Mingxin;,Yang Jiwen;
..............page:108,110
Computer network security protection problems and its strategies
Shao Yanzhen;
..............page:111,113
Financial computer network security risks and precautions
Gao Qihai;
..............page:112-113
How do we ensure your XP discontinuation information security
Li Jianhong;
..............page:114,116
Study on methods to improve the reliability of computer network
Guo Penghui;,He Qiuyu;,Sun Jian;
..............page:117,119
Method to improve the reliability of the computer network analysis
Huang Guangfa;
..............page:121-122
Internet information security research based on power enterprise
Guo Qingrui;,Li Feng;,Li Mingxuan;,Li Yang;
..............page:123,125
On the security of intranet database Oilfield
Jia Yongxian;
..............page:124-125
SEO Strategies of local portal
Zuo Weigang;
..............page:127-128
Security Solution of Cloud Computing
Hao Ting;,Jiang Chunjuan;,Zhou Yong;
..............page:130-131
Computer network security is analysed
Tang Xiaofang;
..............page:133,135
On the Optimization of WEB Site Safety
Wang Yongxiang;
..............page:136,138
After the XP era of network security technology to explore
Yang Jie;
..............page:139,141
The local network reliability evaluation method research
Zhang Xinfeng;
..............page:142,145
Analyses the computer network maintenance and management
Ding Baoxing;
..............page:143,145
Problems and Countermeasures of network security analysis
Peng Yuanqiu;
..............page:144-145
Exploration on the campus network security measures
Wei Lihong;
..............page:146,149
Design based on internal network security solutions
Sun Yuqian;
..............page:147,149
Explore computer network security precautions
Li Qun;,Liao Li;
..............page:148-149
Computer evidence in the network security protection method
Fan Yubai;
..............page:150,153
Advances in wireless sensor network technology environments
Zeng Qing;
..............page:152-153
Application and development of computer network technology
Song Yancheng;
..............page:154-155,157
Cloud service security and reliability analyses
Xu Baochun;
..............page:156-157
An theory of access control based on security entropy
Che Tianwei;,Li Na;,Meng Yong;,Wang Chao;
..............page:158-159
The calculation method of a kind of value at risk of information assets
Chen Minkang;,Shang Minhong;
..............page:163-164
The risk of computer network security and protection analysis
Zheng Zhigang;
..............page:165,169
Virtualization Security
Yan Guoxun;
..............page:170-171
Study on the protection of personal information security based on Cloud Computing
Wu Huiling;,Zhao Zhuo;
..............page:178-179,182
IT certification and professional courses that meet the needs of teaching and research
Han Zhihui;,Liu Xiaoyan;,Sui Qingru;
..............page:186,188
Construction and implementation of the open network laboratory
Ding Yonghong;
..............page:190,193
Teaching computer software applications to explore
Gao Caixia;
..............page:191,193
Practice and Discussion of university computer lab management
Li Zhiqiang;
..............page:198,201
Feedback computer courses at the university in the use of
Han Zhihui;,Liu Xiaoyan;,Sui Qingru;
..............page:200-201
Common tools for multimedia CAI courseware is analysed
Zhao Gangwen;
..............page:203-204
Car slide networking technology and its application to explore
Zhao Zhenjia;
..............page:205,208
University computer room management model of agent
Lan Yingjie;
..............page:206,208
Psychology information multimedia courseware design
Li Xiaohui;
..............page:207-208
Higher occupation Campus Network P2P Traffic Management Research
Kang Junxia;,Tao Fugui;
..............page:217-218
Analysis of the use of computer application technology in project management
Cai Lihong;,Liang Hongjie;
..............page:225-226
A brief analysis about the management of Internet bars and cybercrime
Chi Bijun;,Zhang Daiwei;
..............page:227-228
High speed railway communication system research were reviewed
Xie Qinglong;
..............page:232-233
Local area network data security protection technology
Wang Chunwei;
..............page:239-240
Fingerprints Identifying Technology in The Banking System
Wang Ren;
..............page:244,248