Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Modern Computer》 2010-08
Add to Favorite Get Latest Update

Exploration on the Firewall System Security Technology

LI Xiao-qian(Guizhou Province Public Security Bureau Narcotics Corps,Guiyang 550002)  
With the rapid development of computer networks,network security has become the topic of everyday concern.How to quickly and easily access external networks,while the effective protection of internal network security,analyses the various kinds of network attack technologies,especially those that aiming at the firewall.And through the research results about network attacks technologies,concludes two practical model of firewall security technologies,and describes the security policy in details.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 SONG Xuan,ZHANG Zhonghu,LU Guobin(Network Center,China University of Geosciences,Wuhan430074,China);The Technique of Capturing Network-packet in Windows 2000[J];Computer and Modernization;2003-04
2 MAO Xin-yu~1, LIANG Yi-wen~2 (1. East Lake school, Wuhan University, Wuhan 430072, China; 2. School of Computer, Wuhan University, Wuhan 430072, China);Research on the model of immune firewall[J];Computer Engineering and Design;2004-08
3 WANG Xiaowei1,LI Feng\+2(1College of Information Technology,Shenyang Normal University,Shenyang 110034,China;2Expressway Administration Bureau,Shengyang 110031,China);Study on correctness of firewall′s packet filtering rule[J];Journal of Shenyang Normal University(Natural Science);2003-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 XU Chang-jun FU Guang-xuan (Institute of Computer Network,Guizhou University,Guiyang 550025,China);Research on Analysis and Application of IPv6 Network Security Architecture[J];Journal of Anqing Teachers College(Natural Science Edition);2007-03
2 HU Shan~1,ZHANG Bing~2(1.School of Computer Science and Engineering,Anshan University of Science and Technology,Anshan 114044,China;2.Anshan Research Center of Information Technology,Anshan 114044,China);Control of computer's surf on internet by SPI[J];Journal of Anshan University of Science and Technology;2004-05
3 WEN Hai-bo(Anhui Communications Vocational Technology,Hefei 230051,China);Construction and analysis of data-share server on base of campus network[J];Journal of Anhui Technical College of Water Resources and Hydroelectric Power;2006-04
4 ZHAO Yong-chi, WU Jian, CHEN Bo(College of Computer, Southwest University of Science & Technology, Mianyang 621002, China);Application of Network Address Translation Technology in Firewall[J];Ordnance Industry Automation;2005-01
5 XU Chui-ze~1,LIAO Shu-hua~2(1.Information Center,The board of health of nanhai Nanhai,Guangdong 528200,China;2.Guangdong Institute of Textile technology Foshan,Guangdong 528041,China);Construct the Efficiently Secure Campus Network System[J];Journal of Changchun Teachers College;2005-07
6 CHEN Hengyou (Taizhou Vocational & Technical College Computer Engineering Department, Taizhou 318000);Study on the Prevention about Network Security of Intelligence Building[J];;2006-03
7 GAN Kai-feng(Chongqing University of Posts and Telecommunications,Chongqing 400065);THE RESEARCH OF STREAM FILTER TECHNOLOGY IN FIREWALL[J];Chaohu College Journal;2006-06
8 YANG Qing(Sichuan Business Vocati0nal College,Chengdu Sichuan 610091,China);The Consideration about Constructing Efficient and Secure Campus Network System[J];Journal of Chongqing Vocational & Technical Institute;2006-05
9 NIE Dan (The Information and Technology Institute,Liaodong University, Dandong 118003);The Backup Project Profitable to Medium and Small Enterprises[J];Journal of Changzhou Institute of Technology;2005-02
10 Li Juying;Global Safety Solution of Campus Network[J];Computer Study;2008-05
China Proceedings of conference Full-text Database 3 Hits
1 ZHANG Man-huai (China Telecom Group Guangdong Corporation Guangzhou Branch,Guangdong Guangzhou 510055,China);Research of Network Security for IDC[A];[C];2007
2 Wang Xinzhong (China Mobile Group Ningxia Co.,Ltd 750002);The integration and application of the firewall business[A];[C];2008
3 Yuan Wei Li,He Dan Dan (CHINA Institute of Defense Science and Technology,LangFang 065201);The security and defense of campus network[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 ZHANG Dei ming (Department of Postgraduate Education,Chongqing University of Posts and Telecommunication,Chongqing 400065);Internet Security —— Packet Filter and Firewall[J];Journal of Chongqing University of Posts and Telecommunications;1999-04
2 LIANG Yi wen,LI Jun tao,GUO Xue li,KANG Li shan (Dept.of Computer Science & Technology,State Key Laboratory of Software Engineering,Wuhan University, Wuhan Hubei 430072,China);A Constructional and Evolutionary Method of Self set Based on User's Behavior[J];Application Research of Computers;2001-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved