Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2005 Issue 11
News
..............
page:80
The analysis and restraint of Computer wormsí virus
Huang Jialin;Zhang Chao;Ding Han;Li Shuwang
..............
page:77-79
A Kind of Visual Optical Wireless Access Technique Based Upon the USB Interface of Computers
Guan Yibo;Zou Chuanyun;Muo Yanfei
..............
page:74-76,79
Security Research On Mobile IP Based on WiFi
Wang Fengzhen
..............
page:71-73
Safety Mechanism Discuss of IPv6
Hu Fuxiang
..............
page:68-70,55
Release the Strong and Big Power in Sniffer Network General again Exhibition Arrogant
Li Ming
..............
page:10
The Intelligence Protection Resist and Did Not Know
Xie Jing
..............
page:9
The Wyse Establishes the Pacific Asia area Headquarters in Peking with the Development Center
Li Ming
..............
page:8
Ising Dedicated to Promoting the Customer Helps New Hair in Microsoft in the Ability of Making 12 Share Points Chinese Application Template
Xie Jing
..............
page:2
The Information is Safe to Make Policy the Process the Discussion and Analysis
Li Qiang
..............
page:65-67,64
The Continuous Security Risk Management Model in Project Implementation
Cai Lin
..............
page:61-64
Scheme of Deciding Campus Userís Location
Ma Junwen
..............
page:59-60
Building Information Security Laboratory
She Kankan
..............
page:56-58
How to search information resource by addresss earch
Yu Shaoyun
..............
page:52-55
The Data Center Solution in the Securities Trade
Zhong Langhui
..............
page:50-51,73
The technologies of vpn and radius in application at the police mobile computer system
Zhou Junhe
..............
page:46-49
Trails Research of Audit Mechanism of Instrumental System Based On Linux
He Fugui;Wang Jiali
..............
page:22-24
The IMAIL Constructs the Green Mail Application Environment
..............
page:21
The Surfcontrol Web Page Filter Realizes to Have No With the Fire Wall of Check Point to Sew to Gather
..............
page:19-20
Explain the Company of Venus M2S Safety Service System
..............
page:18,20
Resist and Did Not Know the Ability of Threat TruPreventTM Super and Strong
..............
page:16-17,14
Moving the Company Group Unifies the Gate SSL VPN Solution
..............
page:15
The Some Angling Website Invades the Technique Analysis
Wu Nanqing;Wang Guisi
..............
page:11-14
The investigation and policy of endangering network security events
Tan jianwei;Tian hongli
..............
page:43-45,49
A Method of Network Intrusion Detection Based on Biologic Immune Mechanism
Xiang Huihui;Wen Zhiwei
..............
page:40-42,27
Scheme of integrating firewall with network intrusion prevention system
Chen Jinhua;Liu Wenhong;Zhang Sidong
..............
page:37-39,33
A Study of Distributed Intrusion Detection Framework Based on Agent
Wang Quanmin;Lv Ruigang
..............
page:34-36
Distributed Firewall
Li Bingjian
..............
page:31-33
Research on Network System for Indication Based on Anomaly Detection
Liu Jingjie;Qin Hua
..............
page:28-30
Challenges Confronting IDS and Related Countermeasures in Network Security
Li Yang;Liu Guang;Du Weiming
..............
page:25-27