共 50 条
- [31] Computer Science Technology and Network Technology in the Application of the Computer Room Security PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1404 - 1406
- [32] Security Protocol Deployment Risk (Transcript of Discussion) SECURITY PROTOCOLS XVI, 2011, 6615 : 21 - 24
- [33] Communication protocol analysis of computer networks Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering & Electronics, 1995, 17 (10):
- [34] Analysis and Discussion on Computer Network Security Issues PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 169 - 172
- [35] Computer Database Security Management Analysis and Discussion PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 54 - 57
- [36] Discussion on the Protection and Problem of Computer Network Security PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, ARTS, ECONOMICS AND SOCIAL SCIENCE, 2016, 49 : 344 - 347
- [37] A Novel Approach Privacy Security Protocol Based SUPM Method in Near Field Communication Technology ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 633 - 643
- [38] Research on Computer Security and Firewall Technology PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 257 - 260
- [39] Analysis of Computer Network Security Technology 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
- [40] Design and development of computer-based discussion support tool for science and technology communication exercise HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 356 - +