1.
Research and Implementation of Transparent Network Security Technology Based on IP Security;
基于IPSecurity的透明网络安全技术的研究和实现
2.
Network Security Analysis Model Based on Logic Exploitation Graph
基于逻辑渗透图的网络安全分析模型
3.
Building Secure Network Access Point Based on a Linux Transparent Bridge
基于Linux系统实现透明网桥式安全接入点
4.
Strengthen the Network Security,Ensure the Development of Network Security;
加强网络安全 确保网络安全发展
5.
STUDY ON COMMUNICATION SECURITY OF CHINESE PLAIN TEXT IN COMPUTER NETWORK
计算机网络上中文明码通信安全性的研究
6.
The Research Based on the Zero Knowledge Discusses about the Graph Questions and the Network Security;
基于零知识证明的图论问题和网络安全的研究
7.
Design to the Softswitch Network and Implementation to Its Security Mechanism of Kunming Telecom;
昆明电信软交换网络设计及其安全机制的实施
8.
Web Safety in Domestic Network of Intranet;
Intranet内联网中的网络安全
9.
Collision truncation requires no change to the host network repeaters, and is completely transparent to hosts.
冲突屏蔽对主机是完全透明,不要求改变主机的网络适配器。
10.
Information Transparence and Information Security--Considerations of the Campus Network Event
信息透明与信息安全——由“校内网”事件所引发的思考
11.
Setup the Security System of Network of Intranet;
构建Intranet网络安全体系
12.
Internet Security Architecture;
Internet网络安全系统结构
13.
The Security Mechanism of Intra-Network of Windows 2000 Server;
Windows 2000 Server的网络安全机制
14.
Network Security and Protection Technique of Internet;
Internet网络安全及防护技术
15.
Network s Safe and Internet Fireware;
网络安全与Internet防火墙
16.
The Design of BitTorrent Security P2P Network
BitTorrent安全P2P网络设计
17.
Network Security Technology and the Solution to Campus Network Security;
网络安全技术与校园网络安全解决方案刍探
18.
NSAP-A network storage access protocol for transparent computing
NSAP——支持透明计算的网络存储访问协议