The Research and Application of Network Security Technology in the University Network

Article Preview

Abstract:

The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information is transferred security, which is the problem that various network information systems must face, and also a difficult and hot issue to be researched. In this paper, a variety of effective network security technologies are studied and corresponding implementations are provided for the information network system in the university.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

791-795

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Richards K. Network based intrusion detection: a review of technologies . Computer &Security, 1999, 188, 18(8): 671-682.

Google Scholar

[2] Schneier B. Managed Security Monitoring: Network Security for the 21st Century . Computer & Security, 2001, 206, 20(6) : 491-503.

DOI: 10.1016/s0167-4048(01)00607-1

Google Scholar

[3] James Goodwill. Mastering Jakarta Struts. Willey Publishing, (2002).

Google Scholar

[4] W. Timothy Coombs. Ongoing Crisis Communication Planning, Managing and Responding London: Sage Publieations Ine. , (1999).

Google Scholar

[5] Liu Dongping, Chen Li, ChenRui, JinJie. Design and Implementation of technology Data sharing platform with Web services [J]. ISBIM 2010(451).

Google Scholar