Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Ordnance Industry Automation》 2011-01
Add to Favorite Get Latest Update

Secrecy Network Information Security

Li Gang,Lei Ai,Zhang Xianxian(Information Center,No.58 Research Institute of China Ordnance Industries,Mianyang 621000,China)  
Aiming at the security requirements of secrecy network,research the information security technology.Analyze the security of network information safety precautions and its implementation will be detected,the technology and the technology and capacity to identify technologies for enhanced coordination to increase their own dynamics flexible response and immunity ability to guarantee the network security of secret information.Network information confidential the technological development trend that must keep track of new information technology to upgrade and update and improve information systems security precautions.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YANG Xin-kun WANG Wei( Institute of Electronic Technology, the PLA Information Engineering University, Zhengzhou 450004);Design of Distributed Firewall System and its Implement in Campus Network[J];Journal of Anyang Institute of Technology;2006-06
2 ;PKI技术的应用及思考[J];Journal of Chengdu Electromechanical College;2006-04
3 Guo Jun (Information Engineering Department,Chongqing Industry & Trade Polytechnic,Fuling Chongqing,408000);The Security Management of Campus Network[J];Journal of Chongqing Industry & Trade Polytechnic;2008-02
4 WU Xiang-dong (Hu'nan Economic Management College,Changsha,Hu'nan,China 410004);Briefly on the process of cyber trading with E-check[J];Journal of Changsha Telecommunications and Technology Vocational College;2006-01
5 Yang Yanhang, Sun Bingxin(Harbin University of Science and Technology, Harbin 150080, P. R. China)//Journal of Northeast Forestry University.-2003,31(1).-74~75;Tactics for Security of Operation System[J];Journal of Northeast Forestry University;2003-01
6 LU Xiaojun1,DONG Dalong2,SONG Bin1,TANG Chenghong1(1.Shenzhen NARI Technologies Co.Ltd.,Shenzhen 518057,China;2.Tangshan Power Supply Company,Tangshan 063000,China);An OPC Technology Based SCADA System Design for Wind Power Plants[J];Automation of Electric Power Systems;2008-23
7 QIU Shui-sheng,CHEN Yan-feng,WU Ming,MA Zai-guang,LONG Min,Liu Xiong-ying(College of Electronic & Information,South China Univ.of Tech.,Guangzhou 510640,China);A novel scheme of chaotic encryption system[J];Journal of Circuits and Systems;2006-01
8 LIANG Jin-zhao,NING Bo ,XIA Qing,CHEN Shou-sun(Tsinghua University,Beijing100084,China);Information portal solution of power enterprise[J];Electric Power Automation Equipment;2003-05
9 ZHANG Xuejun;Implementation of VPN Based on IPSec[J];Computer and Information Technology;2003-05
10 XU Yun-xiang,CHEN Zhi-gang,DENG Xiao-heng (School of Information Science and Engineering,Central South University, Changsha 410083,China);Designing of Audit Model Based on SSH Protocol[J];Computer and Information Technology;2009-02
China Proceedings of conference Full-text Database 2 Hits
1 QIU Fa-lin ZHOU Kai WANG Yi (Faculty of Mapping and Computer Information,Kunming Metallurgy College,Kunming 650033,China);Design of Information Integration Management System Based on Web Service[A];[C];2009
2 Jin Liping (Tianjin Broadcasting Television & Film Group Tianjin 300000);The Research of Office Automation System Security Policy Based on Domino/Notes[A];[C];2007
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved