Published by Mechanical Industry Press, 2024
ISBN 10: 7111762908 ISBN 13: 9787111762904
Language: English
Seller: liu xing, Nanjing, JS, China
US$ 132.75
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Language:Chinese.Paperback.Pub Date:2024-08 Pages:442 Publisher:Machinery Industry Press This book is a textbook for candidates who take the self-study examination of higher education. based on the Computer Network and Information Security Self-study Examination Outline recently formulated by the National Higher Education Self-study Examination Steering Committee. Aiming at the talent training needs of computer science and technology. software engineering and information security. this book i.
Published by China Science and Technology University Press, 2000
ISBN 10: 7312025277 ISBN 13: 9787312025273
Seller: liu xing, Nanjing, JS, China
US$ 209.33
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2009 08 Pages: 453 Language: Chinese in Publisher: University of Science and Technology of China Publishing House of the 24th National Computer Security Academic Exchange will all my colleagues in the strong support of the information security sector and Computer Security Professional Committee of China Computer Federation joint efforts. will be held in the beautiful Lijiang. This year is the year of the 60 anniversary of the founding of our country Daqing. the old saying.
Published by China Science and Technology Pub. Date :2010-9-1, 2000
ISBN 10: 7312025463 ISBN 13: 9787312025464
Language: Chinese
Seller: liu xing, Nanjing, JS, China
US$ 209.33
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2010 09 Pages: 430 Language: Chinese in Publisher: China University of Science and Technology Press annual National Computer Security Symposium necessary convened as scheduled. which is 25 of the Professional Committee of China Computer Society Computer Security annual meeting Computer Society Computer Security Professional Committee of paramount important event. the event of the country in the field of computer security technology. research. management. People look forwa.
Published by China Science Pub. Date :2008-09-01 version 1, 2008
ISBN 10: 7312022774 ISBN 13: 9787312022777
Language: Chinese
Seller: liu xing, Nanjing, JS, China
US$ 487.00
Convert currencyQuantity: 10 available
Add to basketpaperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 452 Publisher: China Science Pub. Date :2008-09-01 version 1. Contents: 2008 situation analysis of network security in the first half of 2008 China reported computer virus outbreak investigation technical analysis report 2007 - 2008 Information Security Products overview of cross-system interconnect test the credibility of a security system based on the credibility of the TPM chip. a new model of network access router problem solution is based on anonymous multi-level multi-angle analysis of network security situational awareness of the AES algorithm based on random mask anti-DPA attack OO login protocol implemented in hardware security research and analysis is based on a combination of symmetric key storage and transmission of confidential data involving P2P software case study method of investigation and evidence collection of electronic monitoring technical standards of European and American e-commerce Probe hacker crime classified removable storage prosecution application in media protection policy direction of China's internet users and to achieve legislative Model of network simulation tools in the application of network security test techniques based on active probing of P2P network monitoring a software implementation of the transient fault detection method is based on reliable distributed systems trusted authentication technology of trusted computing technologies and management strategies comparative study of a passive monitoring of information attacks using a new way to achieve color consistency of the digital image forensics forgery method is based on fault injection technology. information systems security vulnerability detection technology research paper filter driver Monitoring System Design and Implementation of Web-based network of Tibetan public opinion research in the J2EE monitoring system under the framework of implementation of LDAP-based RBAC model in service-oriented software architecture in software testing based on digital watermarking technology. M-gent study of the digital watermark detection research support each other operation and a unified user authentication privacy platform DRM system to store package two key strategic research based on complex cepstrum transform the self-synchronous Audio Watermarking for MPEG-4 video semi-fragile watermarking authentication schemes based on Multi-SVM network intrusion detection technology based SIM card Windows mobile two-factor user authentication technology is based on the content of Internet Research Information filtering based on NDIS intermediate driver simulation test platform distributed network devices prosecutors dedicated network security analysis of network security architecture prosecution Analysis of a number of issues on how to do a brief analysis of network information security prosecutors On the military aid of computer virus and information security precautions On Campus Network Security Analysis Network Security Attorney dedicated network to enhance network security within SSL Thoughts protocol and its application in network access in IPv6 transition denial of service attack protection based on the file system filter driver file access control technology based on the authentication of wireless network security research network coordinated attack detection method for wireless sensor network routing protocol security and simplify the program Campus Network Resource Management System to design a grid system of NS2-based denial of service attack and defense simulation system cloud computing and computer security a malicious Web page detection system with malicious code detection technology designed to combat computer crime Reflections of Mobile Agent Transaction entity of the trust and reputation research question biometric encryption technology status and development trend of electronic evidence of probative force of the Win32 e.
ISBN 10: 731202159X ISBN 13: 9787312021596
Seller: liu xing, Nanjing, JS, China
US$ 174.50
Convert currencyQuantity: 1 available
Add to basketpaperback. Condition: New. Paperback. Pub Date: 2007 07 Pages: 358 Language: Chinese in Publisher: China Science and Technology University Press. 2007 information security of our country. will be the scientific outlook on development as guidance. strengthening information security work conscientiously implement the views and National Information Security Eleventh Five-Year Plan. focuses on improving the level of protection and information security information network. and comprehensively promote the level of security p.