Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Office Informatization》 2009-02
Add to Favorite Get Latest Update

A Brief Analysis on Information Network Security Threats

Chen Linyu (Zhangjiakou Power Supply Co. Zhangjiakou 075000)  
In view of the current networks that exist in a variety of security threats,network security on the root of the problem and expressions,a number of network security threat analysis,and introduced various types of threats against the basic means of prevention.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 GUAN Tian-zhu (The Yellow River Water Technical College,Kaifeng 475002, China);Safety Management and Planning of Network in Small and Medium-sized Enterprises[J];Computer Knowledge and Technology;2010-26
2 LI Pingda(Technology Communications Office,Shenzhen Public Security Bureau,Shenzhen 518008,China);Work of Public Security Confidential Information in the Information Age[J];China Public Security(Academy Edition);2012-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 LIU Lin(School of Management, Hefei University of Technology, Hefei 230009, China);Design of Student Management Information System in Colleges[J];Journal of Anhui Tv University;2002-04
2 LUO Hong, BAO Lin-yu, LONG Chao (College of Computer, Southwest University of Science & Technology, Mianyang 621010, China);Exploration on Exchange and Anti-Virus Technical Fusion[J];Ordnance Industry Automation;2006-01
3 LIU Guishan,HU Juncheng(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Design of Communication Stream for the 1553B Bus[J];Journal of Beijing Institute of Technology;2003-03
4 REN Yong-lin~1,QIN Mian~2,REN Wei-lin~3(1.Faculty of Computer Science, University of New Brunswick, New Brunswick Province E3B 5A3,Canada; 2.Beijing Control Industrial Computer Company of P. R. C. State Aerospace Bureau, Beijing 100080,China; 3.Beijing Institute of Control Engineering,Beijing 100080,China);SYSTEM DESIGN AND IMPLEMENTATION OF ELECTRONIC REVENUE AFFAIRS[J];Journal of Beijing Technology and Business University (Natural Science Edition);2005-01
5 LI Shi hong, LI Fang wei (Chongqiing University of Posts and Telecommunications, Chongqiing 400065,P.R.China);Security Improvement of the 3G Mobile Communication System[J];Journal of Chongqing University of Posts and Telecommunications;2002-04
6 YANG Zong-kai~1,HE Yan~(1,2),ZHANG Ao~2(1.Department of Electrons and Information,Huazhong University of Science and Technology,Hubei Wuhan 430074,P.R.China;2.Wuhan Research Institute of Posts and Telecommunications,Hubei Wuhan 430074,P.R.China);Study and implementation of EPON system secruity mechanism[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-05
7 GAO Kai-peng,ZHOU WeiChina Netcom(Group)Co.Ltd,Changchun Branch,Changchun 130051,China;Secuity Problems and Countermeasures of the Network Systerm[J];Journal of Jilin University(Earth Science Edition);2008-S1
8 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
9 HUANG Qiangbo1,TANG Qian2,LIU Xinqiao2(1.Central South University,ChangshaHunan410004;2.Changsha Aeronautical Vocational and Technical College,ChangshaHunan410014);Software Watermark Research Based on Portable Executable File[J];Journal of Changsha Aeronautical Vocational and Technical College;2009-03
10 Zhang Lin1 Yao Shuo1 Zhang Keli2 (1 China Mobile Group Design Institute Co.,Ltd.,Beijing 100080) (2 Tianjing National Cybernet Security Limited Tianjin 300052);Research of Identity Management[J];Telecom Engineering Technics and Standardization;2009-07
China Proceedings of conference Full-text Database 5 Hits
1 Zhu Yu Cao Aijian Xin Yang Ruan Chuangai Niu Xinxin (Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications Beijing,100876 China);A Research on Defending DDoS Attack in Equipment[A];[C];2008
2 Zhao yu,Chi chang,Sun yan (Beijing Branch of China United Network Communications Croup Co.,Ltd,Beijing,China);The Character and Prevention of Internet Attack[A];[C];2010
3 Mo Shiyu (WMCRI No.70005 box wuhan, China 430079);Network Antagonize & Communications Safety[A];[C];2008
4 Yang ZhiHong~1 Zhou Juan~2 1 Commangding Communications Academy 430010, 2 No.4 of Naval Experimentation Base 524000;Research of Information Security Techniques and the Trend[A];[C];2008
5 ZHAO Lin SHANG Yu jin Bengbu tank institute,Bengbu 233050,China;The Application of 3G Mobile Technology in Armored Tactics Networks[A];[C];2008
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Sun Xiaozhen Zhang Xueguang (Anhui Posts & Telecommunications School Hefei 230031);On the Security of Open Interconnection Network[J];JOURNAL OF ANHUI INSTITUTE OF MECHANICAL AND ELECTRICAL ENGINEERING;1998-02
2 WANG Mei-xia (Office of Academic Affairs, Anhui Vocational College of Police Officers, Hefei 230031, China);On the Present Situation of Individual Message Protection in Our Country and Its Countermeasures[J];Journal of Anhui Agricultural University(Social Science Edition);2009-04
3 Jin Pan (Zhengzhou Institute Of Aeronautical Industry Management,Henan 450015,China);Analysis of Internet Security Management and Protection Strategy[J];Journal of Beijing Polytechnic College;2008-03
4 YIN Wen-shan(Changsha Telecommunications and Technology Vocational College,Changsha,Hu'nan,China 410015);Monitoring technology and realization of VoIP flow rate[J];Journal of Changsha Telecommunications and Technology Vocational College;2007-03
5 ZOU Wen,TANG Xin-yu(Hunan University of Commerce,Changsha 410205,China);The Research and Analysis of Honeypot and Honeynet[J];Computer Knowledge and Technology;2008-07
6 CHEN Ze-xu (Guangdong LiTong Property Investment Co., Guangzhou 510620, China);Simple Analysis on Security Policy of Company Network[J];Computer Knowledge and Technology;2009-09
7 LI Jing-xing (School of the Geosciences and Resources, China University of Geosciences, Beijing 100083, China);Research on Technology of Network Firewall[J];Computer Knowledge and Technology;2009-12
8 LI Pei (Zhengzhou Vocational Institute of Tourism Department of Tourism Business, Zhengzhou 450009, China);Analysis of Computer Network Security[J];Computer Knowledge and Technology;2009-12
9 XU Jian-feng (Kexin Software College,Shenyang Normal University,Shenyang 110101,China);Computer Network Security Fire Wall Technology Research[J];Computer Knowledge and Technology;2009-12
10 Lin Xiaodong;Yang Yixian(Beijing University of Posts and Telecommunications, Beijing 100088);A Design of Security Network Protocol System Based on TCP/IP[J];TELECOMMUNICATIONS SCIENCE;1996-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved