Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 2
SSH Remote Management Configuration Mode Based on Linux Operating System Server
Kong Xiangzhen;Xu Xiaolong;Xing Hongjian
..............
page:10-11,18
MetThe application of widget in the mobile internet
Zhong Jinxia
..............
page:69-71
Exploring on Teaching Quality Exaltation in Network Supervision Police Training
Yan Xiai
..............
page:46-48
Research on the technology of Virtual Machine Detection and Thwarting
Cheng Weiwei
..............
page:28-32
Mobile e-government research and application of PKI technology
Ou Yang Dezhi;Ye Bailong;Lu Lan
..............
page:33-34,62
Research on Security Schemes in Ad-Hoc Wireless Network
Teng Ping
..............
page:26-27
Research on IPv6 Security Issues
Wang Yanhua;Zuo Ming
..............
page:22-25
Study on Intelligent Search Algorithm of Recruitment Website
Yang Zhongying;Su Xiaolong
..............
page:77-79
jia qiang ji ceng qing bao xin xi gong zuo de tan suo
qu xiao shun
..............
page:4-6
ETS typing system database design
Wang Shanfa;Wu Daorong
..............
page:74-76
Covert Channel Research Based on Information Flow
Gao Ziyun;Li Jian
..............
page:49-52
The design and implementation of salary management system based on ASP.NET technology
Yu Le
..............
page:60-62
Security analysis of local network
Ma Jiahua
..............
page:12-13
Research on 802.x protocol-based System of Campus Network Security and It\'s Application
Zhao Zhao
..............
page:16-18
Discussion about the storage structure design of IP network security by the iSCSI protocol
Li Lilin;Liu Zhuwen
..............
page:7-9
The research on the conceptual design methods of product shape design
Yuan Xiafei;Liu Xiyu;Liu Fengming
..............
page:39-40
xin xi dong tai
..............
page:1,80,封3
Application of Case-Task driving Teaching Method in Electronic Forensics Course
Gao Hongtao
..............
page:35-38
Based on C/S structure of the back door of free ports and Implementation
Wang Caimei;Jiang Weiwei;Liu Wenjie
..............
page:19-21
Research of lock-free programming
Guo Jiasheng;Li Jian
..............
page:72-73
The Analysis and Detection of Hacker Attack Techniques and Tactics
Xu Yiyun
..............
page:14-15
The design and implementation of electronic trading platform DMS based on Agent and data mining technology
Zhao Kexin;Liu Zhenming;Xiao Jintong
..............
page:41-42,55
An Improved Algorithm For slow-start Collision avoidance
Gong Xianli;Wang Jiamei;Fang Xiaoli;Wang Bing
..............
page:53-55
Based on Genetic algorithm of optimization about teacher code in the curriculum
Chen Juan;Han Na
..............
page:43-45
The Application of VLAN Pruning in University Campus Network
Yin Li
..............
page:56-59
The Status and Development Trend of Meteorological Video Consultation and Conference System
Wu Mengchun;Hu yongliang;Ma Qiwei;Zhou jie
..............
page:63-65
SSLVPN Based on NDIS
Zhao Chunping;Liu Wenli
..............
page:66-68