Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2010 Issue 11
The teaching of computer basic military
Du Xiaojing;He Qiuyan;Hu Le;Yang Zhen
..............
page:63-64,58
The discusses of information service platform security
Wang Xiaoming;Liu Wance;Huang Ren
..............
page:31-33
Research and Design of E-government Security Architecture
Zhang Zhen;Wang Huifang
..............
page:23-25
Research on Network attack and Defensive
Wang Min;Tang Jun
..............
page:17-19
The Security Analysis and Precaution Strategy of Campus Network
Chen Shanwei
..............
page:29-30
An Improved Network Topology Discovery Based on SNMP
Zeng Lin;Tan Minsheng
..............
page:59-62
The virtual machine technology in computer teaching and experimental application
He Qiuyan;Zhong Cheng;Lu Xu;Hu Le
..............
page:73-74
yun ji suan yu mi ma xue fang mei guo ge lun bi ya da xue jiao shou moti yung
..............
page:4
XML Language in Web Application
Qiao Huiping
..............
page:40-42
check point zai bei ya di qu tong qi kai she 6 ge zhuo yue ji shu zhong xin
..............
page:5
The Research of Network Teaching Platform Based on XML/Web Service
Chen Heng
..............
page:34-36
Data communication network of Remote Monitor System Based on GPRS
Chen Xin;Liu Zhongxuan;Han Zhaofu
..............
page:26-28
Analyze calculator network security and guard
Hu Xiuhui;Jiang Chen
..............
page:56-58
xin xi dong tai
..............
page:封2,1,封3
Temperatre and Humidity of Engine Room Monitoring System Based on Zigbee
Zhang Fengying;Bo Wenyan;Wang Xiuhui
..............
page:65-67
A Copy of the DOCument Based on P2P Strategy
Gao Cong
..............
page:49-51
Using Word Excel to Edit Switch Configuration List
Fang Nieping
..............
page:37-39
Research of method to Object-oriented worm simulation
Wang Biao;Wang Zhaobing
..............
page:68-72
Design and Applications of Web Instruction Platform
Xu Cong;Wang Yaxuan
..............
page:75-76,62
Construct the Secure Shell Security Model and Analyze Its Security Performance
Huang Xiaoqiao;Wang Kai
..............
page:10-13
rsa da hui 2010 xin xi an quan guo ji lun tan zai jing ju xing quan qiu zui quan wei de xin xi an quan feng hui
..............
page:6
SSH architecture based performance management system for Vocational Analysis and Design
Shan Jinjun
..............
page:43-46
ARP Cheating Principle and Prevention Technology
Cui Hongxia
..............
page:52-55
Research And Discussion Of Spam Messages interception System
Dai Gang;Hao Junhua;Li Shaohua
..............
page:14-16
Transition Strategies for The Application of Ipv6 in Campus Network
Zhang Li
..............
page:7-9
Customers Can Control State Bank Customer Account Management System
Shi Zhiqiang
..............
page:47-48
Next Generation Networks Network Management Model
Cao Shenglin;Liu Liyan
..............
page:20-22
The Security of Device and Wire Lines of Generic Cabling System
Wu Gang
..............
page:77-80