Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2009 Issue 5
ji yu ke xin ji suan ji shu gou jian zhi neng xin xi an quan guan li kong zhi ping tai
qi jian huai ; zheng wei fan ; song jing ; liu zhi
..............page:14
yi dong cun chu jie zhi zai dian zi zheng wu xin xi hua zhong de shi yong an quan jie jue fang an
bei jing ding pu ke ji gu fen you xian gong si
..............page:12
gou jian an quan ke xin de xiao yuan wang luo
yang yan yan ; wu jia zuo
..............page:76
guo wai guan jian xin xi ji chu she shi bao hu gai shu
bei jing jiang nan tian an ke ji you xian gong si
..............page:69
Use the registry to improve computer security measures
HU Deng-hua;XUE Lun-sheng
..............page:64
Computer Data Secure Delete and Privacy Protect
YIN Yan-bin;WEN Wei-ping
..............page:55
Research on kinds of RootKit Hiding and Detecting Technology in Windows OS
ZHANG Ya-hang;LIU Bo;HAN Xiao;JIANG Dian-bo;JIN Yuan-you
..............page:51
Windows Security: The gradual improvement of SEH mechanism
XU You-fu;ZHANG Jin-han;WEN Wei-ping
..............page:47
The Research of RPC Overflow Vulnerability
ZHOU Hu-sheng;WEN Wei-ping
..............page:38
EFI and Security Analysis of EFI Framework
LIU Dong;WEN Wei-ping
..............page:32
ClearBug An improved automatic tool for bug analysis
LIU Bo;WEN Wei-ping;SUN Hui-ping;QING Si-han
..............page:28