Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2012 Issue 1
2011 zhong guo dian zi yin xing nian hui zai jing long zhong ju xing
xiao hui
..............
page:4-4
Computer network security scanning technology research
li qiu rui
..............
page:23-25
Construction of medium-sized enterprises distributed VPN
yuan xiang ying
..............
page:20-22
gong tui shu zi ji qun gong wang zai zhong guo de fa zhan
xiao hui
..............
page:5-5
One monitoring system and method on the smart phone with GPS
zhang xin ; wang zuo
..............
page:57-61
Optimization and Implementation of EIMS System
yang zuo ; wang bin ; yang yong guo
..............
page:34-36
Research and Design of Three-dimensional Virtual Reality Public Technology Platform of Development Services
li yu gang
..............
page:55-56,48
Research on Network Forensics Perfect Mode Based on Policing Information
liu ze
..............
page:76-79
shu guang long teng fu wu qi chu huo 1000 tai ti qian wan cheng 2012 nian he gao ji ren wu
xie jing
..............
page:6-6
TrafficManagement for Multi_link Acess and Its Application in the Campus Network
wang guan yu ; cai da peng ; qin ai mei
..............
page:17-19
Analysis of the Characteristics,the Prevention and Control of Transnational cyber crime
kong xiao xi
..............
page:62-63
Research of Bayesian Text Classifier Based On Tan Structure
wang jing zhong ; yi lu jie
..............
page:53-54,43
Research on Anti-jamming Technology of Frequency Hopping in IFF system
chen xiu fang ; mao xi rong
..............
page:49-52
On the psychological reasons for the formation of cyber crime and the prevention and control
yang heng yi
..............
page:37-39
Telecommunications fraud crimes
cai jun ping
..............
page:7-9
IPv6 QoS in the Three Significant Improvements
zhou jun ; xu feng
..............
page:15-16
Information security is facing grim situation the army
yang yan
..............
page:10-11,16
it hou jing zheng shi dai fu wu wei wang hang tian xin xi ti qian shi zhan zhong zi li liang
..............
page:F0002-F0002
The Study and Implementation of the Beller-Yacobi Transfer Protocol
liu cheng xia
..............
page:30-33
xin wen ji zuo
..............
page:80-80
The 802.1x Protocol Authentication and Accounting System Design and Implementation and Improvement
pi zong hui
..............
page:46-48
Legal Issues on the copyright of microblogging
yang bin
..............
page:66-67
The Research Model on the Connection of Multi-network Wireless Access Points
li shi ; xiu chang hong ; liang jian kun
..............
page:12-14
Criminal law from the perspective of "the concept of computer crime" differentiate and analyse
cui huai kun
..............
page:73-75
Discussion on police public security from the perspective of people's livelihood micro-blog use
wu hao
..............
page:68-69
Research of IT Source Management System based on distributed computing
yang zuo zuo ; qing xi ke
..............
page:40-43
A Security Production Dispatching System Based on Web Configuration Technology
luo hai ying
..............
page:44-45,39
dong ruan zhu ce xin xi an quan zhuan ye ren yuan cisp pei xun
..............
page:F0003-F0003
Popular Microblogging Impact on Social Stability
zhang guo dong
..............
page:70-72,61
Reflections on international cybercrime
wang zuo
..............
page:64-65
sui mo gao fa zhi an wen ti hang tian xin xi gong gong an quan xi lie zhi neng jie jue fang an zhong quan zhi luan
..............
page:1-1
Research of the Mobile E-commerce's Transaction Safety Problem
xu hong feng
..............
page:28-29,25
Analysis of Communication Network Management
jiang wei
..............
page:26-27