[1]
Meng tanmeng, Liang Yijun. University information security system construction and practice [J]. Journal of experimental technology and management. 2011 (6): 55-57.
Google Scholar
[2]
Chen Jianrui. Software simulation of VLAN configuration under experimental study [J]. Journal of laboratory research and exploration. 2011 (2) : 79-81.
Google Scholar
[3]
Fan Junjun LuYunPing. ARP security mechanism based on switch research [J]. Computer engineering and design. 2008 (8): 80-83.
Google Scholar
[4]
Zhang Xingang Tian Yan. Digital campus information security defense system of exploration and practice [J]. Journal of experimental technology and management. 2012 (20): 73-75.
Google Scholar
[5]
Zhang Han, tan wellknown, Liu Hongyuan. Laboratory internal network terminal security management [J]. Journal of modern electronic technology. 2012 (17): 68-71.
Google Scholar
[6]
Wan Zhao, elzanaty s. Has the cognitive functions of intrusion prevention system research and design [J]. Computer engineering and design. 2013 (10): 76-78.
Google Scholar
[7]
ShenJian. Campus network routing policy analysis and application [J]. Journal of experimental technology and management. 2013 (11): 80-83.
Google Scholar
[8]
XiaoShengRen. Based on the network security of switches and routers set analysis [J]. Journal of electronics production. 2013 (21): 46-48.
Google Scholar
[9]
Wu Yangbo. Based on the switch technology of network security strategy study [J]. Computer CD software and application. 2013 (24): 59-61.
Google Scholar
[10]
Deng Jiaming. Campus network equipment intelligent diagnosis system based on fault tree design [J]. Laboratory research and exploration. 2013 (8): 67-71.
Google Scholar
[11]
FanZhanJun Zhang Hongliang. Switch technology in the application of network security research [J]. Computer CD software and application. 2013 (22) : 78-80.
Google Scholar