Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Study》 2008-03
Add to Favorite Get Latest Update

Countermeasure of Computer Network Security

Li Delang  
The paper introduces the countermeasure of computer network security.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 Gao Ying (The Shaanxi technical institute manages engineering department, Shanxi Hanzhong, 723003);Discusses the Network Security and the Guard[J];Journal of Chengdu College of Education;2006-03
2 ZHANG Yi (Information Technology Centre,Sanxia University,Yicang443002,China);On online security[J];Journal of Changchun University;2006-02
Chinese Journal Full-text Database 10 Hits
1 LIU Lin(School of Management, Hefei University of Technology, Hefei 230009, China);Design of Student Management Information System in Colleges[J];Journal of Anhui Tv University;2002-04
2 Sun Xiaozhen Zhang Xueguang (Anhui Posts & Telecommunications School Hefei 230031);On the Security of Open Interconnection Network[J];JOURNAL OF ANHUI INSTITUTE OF MECHANICAL AND ELECTRICAL ENGINEERING;1998-02
3 Chen Linyu (Zhangjiakou Power Supply Co. Zhangjiakou 075000);A Brief Analysis on Information Network Security Threats[J];Office Informatization;2009-02
4 LUO Hong, BAO Lin-yu, LONG Chao (College of Computer, Southwest University of Science & Technology, Mianyang 621010, China);Exploration on Exchange and Anti-Virus Technical Fusion[J];Ordnance Industry Automation;2006-01
5 LIU Guishan,HU Juncheng(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Design of Communication Stream for the 1553B Bus[J];Journal of Beijing Institute of Technology;2003-03
6 Zhou ping , Ouyang Kai (Capital University of Medical Sciences, Dept. BME, Beijing 100054);Some Applications and Properties of Discrete Hopfield ModelWith Nonsymmetry Weight Matrix[J];BEIJING BIOMEDICAL ENGINEERING;1997-02
7 REN Yong-lin~1,QIN Mian~2,REN Wei-lin~3(1.Faculty of Computer Science, University of New Brunswick, New Brunswick Province E3B 5A3,Canada; 2.Beijing Control Industrial Computer Company of P. R. C. State Aerospace Bureau, Beijing 100080,China; 3.Beijing Institute of Control Engineering,Beijing 100080,China);SYSTEM DESIGN AND IMPLEMENTATION OF ELECTRONIC REVENUE AFFAIRS[J];Journal of Beijing Technology and Business University (Natural Science Edition);2005-01
8 HOU Tong~1,HOU Hong~2,WAN Ya-bing~2,SHENG Yu-ping~3,HOU Kang-sheng~1(1.Education college,Jiangxi Normal University,Nanchang 330027,China;2.JMC croup Waggon and Interior Factory,Nanchang 330001,China;3.Agricuture College,Guangxi University,Nanning 53000,China;4.College of Physisc & Communication Electionics,Jiangxi Normal University,Nanchang 330027,China);An Information and Data Encipherment System in Network Communication[J];Journal of Jiangxi Normal University (Natural Sciences Edition);2005-06
9 LI Shi hong, LI Fang wei (Chongqiing University of Posts and Telecommunications, Chongqiing 400065,P.R.China);Security Improvement of the 3G Mobile Communication System[J];Journal of Chongqing University of Posts and Telecommunications;2002-04
10 YANG Zong-kai~1,HE Yan~(1,2),ZHANG Ao~2(1.Department of Electrons and Information,Huazhong University of Science and Technology,Hubei Wuhan 430074,P.R.China;2.Wuhan Research Institute of Posts and Telecommunications,Hubei Wuhan 430074,P.R.China);Study and implementation of EPON system secruity mechanism[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-05
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 ZHOU Ye-ru,XU Qin-biao (Xucheng Power Supply Bureau, Xuancheng 242000, China);Application and Research of Network Security Passive and Active Defense System[J];;2004-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved