Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Jilin University(Earth Science Edition)》 2008-S1
Add to Favorite Get Latest Update

Secuity Problems and Countermeasures of the Network Systerm

GAO Kai-peng,ZHOU WeiChina Netcom(Group)Co.Ltd,Changchun Branch,Changchun 130051,China  
This article is about the importance of computer network security system which is according to the background of network security and analysis of network security,Then we can do something to put forward measures to deal with ensuring the safety of computer network,such as making full use of advanced identification technologies,access control technology,cryptography and detection technology of loopholes in the system.At last we can make sure the safety of computer network.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 LIU Lin(School of Management, Hefei University of Technology, Hefei 230009, China);Design of Student Management Information System in Colleges[J];Journal of Anhui Tv University;2002-04
2 CHENG Yi-fei(Computer & Information College, Hefei University of Technology,Hefei 230009 China);The RSA Algorithm and Its Application[J];Journal of Anqing Teachers College(Natural Science Edition);2004-02
3 FENG Xin-ya (School of Computer and Information Science,Anqing Teachers Collgeg,Anqing 246011,China);A Proxy Multi-signature Scheme Based on Elliptic Curve[J];Journal of Anqing Teachers College(Natural Science Edition);2006-04
4 Chen Linyu (Zhangjiakou Power Supply Co. Zhangjiakou 075000);A Brief Analysis on Information Network Security Threats[J];Office Informatization;2009-02
5 LUO Hong, BAO Lin-yu, LONG Chao (College of Computer, Southwest University of Science & Technology, Mianyang 621010, China);Exploration on Exchange and Anti-Virus Technical Fusion[J];Ordnance Industry Automation;2006-01
6 Liu Jinhui(Information Center,China South Industries Group Corp.,Beijing 100089,China);Computer Virus Technical Analysis[J];Ordnance Industry Automation;2012-01
7 LIU Guishan,HU Juncheng(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Design of Communication Stream for the 1553B Bus[J];Journal of Beijing Institute of Technology;2003-03
8 REN Yong-lin~1,QIN Mian~2,REN Wei-lin~3(1.Faculty of Computer Science, University of New Brunswick, New Brunswick Province E3B 5A3,Canada; 2.Beijing Control Industrial Computer Company of P. R. C. State Aerospace Bureau, Beijing 100080,China; 3.Beijing Institute of Control Engineering,Beijing 100080,China);SYSTEM DESIGN AND IMPLEMENTATION OF ELECTRONIC REVENUE AFFAIRS[J];Journal of Beijing Technology and Business University (Natural Science Edition);2005-01
9 LI Shi hong, LI Fang wei (Chongqiing University of Posts and Telecommunications, Chongqiing 400065,P.R.China);Security Improvement of the 3G Mobile Communication System[J];Journal of Chongqing University of Posts and Telecommunications;2002-04
10 YANG Zong-kai~1,HE Yan~(1,2),ZHANG Ao~2(1.Department of Electrons and Information,Huazhong University of Science and Technology,Hubei Wuhan 430074,P.R.China;2.Wuhan Research Institute of Posts and Telecommunications,Hubei Wuhan 430074,P.R.China);Study and implementation of EPON system secruity mechanism[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-05
China Proceedings of conference Full-text Database 8 Hits
1 MENG Li-min WU Yi-fan ZHOU Kai HUA Jing-yu SHEN Xin-yu (College of Information Engineering,Zhejiang University of Technology,Hang Zhou 310032);Research on MANET Network Routing Algorithm Based on Quantum Search Algorithm[A];[C];2009
2 Wei Wei, Feng Pei, Ke Qi, Lin Rui, Zhong Cheng School of Computer and Electronics and Information, Guangxi University, Nanning,530004, China;Thread-Level Parallel Encryption and Decryption for Database on Multi-core Machines[A];[C];2009
3 ChenXiaoFeng University of Electronic Science and Technology Of China;In-depth anatomy of RSA software implement[A];[C];2009
4 Zhao yu,Chi chang,Sun yan (Beijing Branch of China United Network Communications Croup Co.,Ltd,Beijing,China);The Character and Prevention of Internet Attack[A];[C];2010
5 Mo Shiyu (WMCRI No.70005 box wuhan, China 430079);Network Antagonize & Communications Safety[A];[C];2008
6 ZHAO Lin SHANG Yu jin Bengbu tank institute,Bengbu 233050,China;The Application of 3G Mobile Technology in Armored Tactics Networks[A];[C];2008
7 ;OLAP中MDX原理的研究与实现[A];[C];2001
8 ;On the security strategy in computer management[A];[C];2015
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved