Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2009 Issue 5
ju xin lao peng you shang hu hang dui ce gong an bu ke ji xin xi hua ju xie yi ping ju chang zai lun tan shang de zhi ci
..............
page:1
zheng ce tui dong ruan jian chan ye zuo da zuo qiang
chen ying
..............
page:21
chuang jian zi zhu ke kong de ye wu xi tong an quan ji xian ji shu ti xi
sun tie
..............
page:19
chuan tong de zhu ji an quan ji shu ru he cheng wei deng ji bao hu an quan zhi cheng huan jie
an tian shi yan shi
..............
page:17
ji yu ke xin ji suan ji shu gou jian zhi neng xin xi an quan guan li kong zhi ping tai
qi jian huai ; zheng wei fan ; song jing ; liu zhi
..............
page:14
yi dong cun chu jie zhi zai dian zi zheng wu xin xi hua zhong de shi yong an quan jie jue fang an
bei jing ding pu ke ji gu fen you xian gong si
..............
page:12
chong fen jie jian bei jing ao yun wang luo an quan bao wei cheng gong jing yan shen ru tui jin xin xi an quan deng ji bao hu gong zuo
guo qi quan
..............
page:10
guan yu " liang hua rong he " tiao jian xia dian zi zheng wu ye wu xi tong jian she mo shi de ji dian si kao
ren jin hua
..............
page:8
luo shi an quan deng ji bao hu zeng qiang xin xi xi tong an quan
zhou de ming
..............
page:7
man tan dian zi zheng wu ke xue fa zhan de xin fang fa xu qiu fen xi
..............
page:5
xu qiu fen xi xin li nian " di si jie zheng fu / xing ye xin xi hua an quan lun tan " te bie bao dao
..............
page:2
gou jian an quan ke xin de xiao yuan wang luo
yang yan yan ; wu jia zuo
..............
page:76
yi " deng bao " wei he xin de xin xi an quan guan li gong zuo ping tai she ji
wang chong
..............
page:73
e yi dai ma wei xie you zai geng xin an quan bu ding xu ji shi
ji yu chun
..............
page:71
guo wai guan jian xin xi ji chu she shi bao hu gai shu
bei jing jiang nan tian an ke ji you xian gong si
..............
page:69
VGGA Arithmetic and it's Application in Network System Vulnerability Mend
HUANG Hong
..............
page:66
Use the registry to improve computer security measures
HU Deng-hua;XUE Lun-sheng
..............
page:64
Script-based Intrusion Detection System category to resist attacks Web technology
MAO Wei-wei;YU Su-ping
..............
page:62
Computer software security holes to explore the legal regulation
WANG Jia-xi
..............
page:59
Computer Data Secure Delete and Privacy Protect
YIN Yan-bin;WEN Wei-ping
..............
page:55
Research on kinds of RootKit Hiding and Detecting Technology in Windows OS
ZHANG Ya-hang;LIU Bo;HAN Xiao;JIANG Dian-bo;JIN Yuan-you
..............
page:51
Windows Security: The gradual improvement of SEH mechanism
XU You-fu;ZHANG Jin-han;WEN Wei-ping
..............
page:47
Design and Implementation of Self-Protection Scheme for Network Monitor Program Based on Winsock2 SPI Framework
ZHANG Ya-hang;WEN Wei-ping
..............
page:44
Vulnerability mining model for Windows based on vulnerability characteristics and Fuzz tecbnology
XU Jun-yang;WEN Wei-ping
..............
page:41
The Research of RPC Overflow Vulnerability
ZHOU Hu-sheng;WEN Wei-ping
..............
page:38
Research of Process Concealment Technology Used by Trojan Horse in Windows Environment
LU Li-lei;WEN Wei-ping
..............
page:35
EFI and Security Analysis of EFI Framework
LIU Dong;WEN Wei-ping
..............
page:32
ClearBug An improved automatic tool for bug analysis
LIU Bo;WEN Wei-ping;SUN Hui-ping;QING Si-han
..............
page:28
Security applications and the formal specification process of refinement
LI Gai-cheng
..............
page:23