Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2006 Issue 3
The study and realization of Linux kernel firewall
Zheng Weifa
..............page:14-16,13
The Security Problem of Mail System
Miao Junmin;Han Minghu;Li Chao
..............page:17-19,8
Study on Disaster Recovery System Model
Wang Kun;Yuan Feng;Zhou Lihua
..............page:10-13
The analysis and defense on the security problem of TCP/IP
Chai Zhengyi;Zheng Liping
..............page:39-40
Development of Embedded System Based on Network
He Fugui;Wang JiaLi
..............page:41-42,25
Analysis and Investigation Of Intrusion Detection System
Wang Chunzhi;Liu Wenhao
..............page:43-45,38
The model of common data access safely
Zhang Qinghua
..............page:46-47,35
Application Research of CAN on Role-based Access Control
Wei Xianmin
..............page:48-49
Realization of File Retrieval and RBAC in OA System
Peng Jingjing;Lan Shunbi
..............page:52-54,68
Buffer Overflow Attack Analysis and Protection
Yan Xiai;Yang Jinmin
..............page:20-22
An Semantic Annotation-based Peer-to-Peer Model
Zhu Xiaoshu
..............page:26-28
A Novel Fragment Marking Scheme for IP Traceback
Yang Jie;Hu Hanping;Wang Lingfei
..............page:29-31,35
Design and Realize a host-based IDS using NDIS
Gao Junling;Zhang Zhen
..............page:32-35
A Survey of Distributed Firewall
Wang Hanyan;Liu Wenhao
..............page:36-38
Modern College Network Solution
Fang Hui;Su Xianli;Wang Qian
..............page:60-61
Implementation of Mixed Cryptography System based on AES
Yao Huazhen
..............page:65-68
The Research of Dynamic Symmetric Cipher Algorithm
Hu Xiangyi;Liu Tong
..............page:69-71
xin wen ji zuo
..............page:94-95
Garbage mail of dangerous and reply measure
Long Yimin
..............page:82-83,93
Techniques on Digital Video Watermarking
Wu Shaofei;Zhang Xuan
..............page:75-76,71
A New Project for OS Security
Zhang Shouquan;Fei Liyun
..............page:77-78
Maintenance Security for Mobile Terminal
Sun Yong;Wang Tao;Yang Yixian
..............page:79-81,78
Methods of Detecting and Cleaning Computer Viruses Manually on Windows
Yun Jun;Tang Yi;Liu Lei;Tang Yanyan
..............page:84-87
the computer virus and prevention and cure
Gao Yongren
..............page:88-90,78
Risk Assessment of the Wireless Network Security
Zhao Dongmei;Xu Ning;Ma Jianfeng
..............page:91-93