Cite

Shen Qingni, Qingsi. Operating system security design. Beijing: Machinery Industry Press, 2013. Shen Qingni Qingsi Operating system security design Beijing Machinery Industry Press 2013 Search in Google Scholar

Yu Chaohui, Wang Changzheng, Zhao Yicheng. Practical Treasure Book of Network Security System Protection and Hacker Attack and Defense. Beijing: China Railway Publishing House, 2013. Author. Thesis Title [D]. Journal of Tsinghua University, 2016, 27 (1): 1-8. Yu Chaohui Wang Changzheng Zhao Yicheng Practical Treasure Book of Network Security System Protection and Hacker Attack and Defense. Beijing: China Railway Publishing House, 2013. Author. Thesis Title [D] Journal of Tsinghua University 2016 27 (1): 1 8 Search in Google Scholar

Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley. UNIX and Linux System Administration Handbook (4th Edition) Nemeth Evi Snyder Garth Hein Trent R. Whaley Ben UNIX and Linux System Administration Handbook (4th Edition) Search in Google Scholar

Tianhe Culture. Hacker attack and defense from entry to proficiency (attack and defense and script programming). Beijing: Machinery Industry Press, 2015. Tianhe Culture Hacker attack and defense from entry to proficiency (attack and defense and script programming) Beijing Machinery Industry Press 2015 Search in Google Scholar

Cao Hanming. Hacker Attack and Defense. Nanjing: Southeast University Press, 2014. Cao Hanming Hacker Attack and Defense Nanjing Southeast University Press 2014 Search in Google Scholar

Jiang Youxu, Guo Quanshui, Ma Juan, et al. Classification and community characteristics of forest communities in China [M]. Beijing: Science Press, 1998. Jiang Youxu Guo Quanshui Ma Juan Classification and community characteristics of forest communities in China [M] Beijing Science Press 1998 Search in Google Scholar

Songhua Luo Jianzhen Jiang Yuexia. Study on the Security Strategy of Electronic Document Filing in the Environment of Government Cloud [D]. Zhejiang Archives, 2018. Songhua Luo Yuexia Jianzhen Jiang Study on the Security Strategy of Electronic Document Filing in the Environment of Government Cloud [D] Zhejiang Archives 2018 Search in Google Scholar

Dong Zhenliang. Application of cryptographic algorithms and international standardization [D]. Financial Information Center of the People’s Bank of China, 2018. Dong Zhenliang Application of cryptographic algorithms and international standardization [D] Financial Information Center of the People’s Bank of China 2018 Search in Google Scholar

Zhou Yinqing, Ouyang Zichun. Brief discussion on the implementation and management of information system security level protection evaluation [D]. Digital Communication World, 2018. Zhou Yinqing Ouyang Zichun Brief discussion on the implementation and management of information system security level protection evaluation [D] Digital Communication World 2018 Search in Google Scholar

Liang Lixin and Li Jun. Information Security Level Protection Evaluation Based on Virtualization [D]. Police Technology, 2014 Liang Lixin Li Jun Information Security Level Protection Evaluation Based on Virtualization [D] Police Technology 2014 Search in Google Scholar

Ma Limei, Wang Fangwei. Computer Network Security and Experimental Course, tsinghua university press, ISBN:9787302439332 Ma Limei Wang Fangwei Computer Network Security and Experimental Course tsinghua university press ISBN:9787302439332 Search in Google Scholar

Ma Limei, Guo Qing, Zhang Linwei Ubuntu Linux operating system and Experimental Course, tsinghua university press, ISBN:9787302438236 Ma Limei Guo Qing Zhang Linwei Ubuntu Linux operating system and Experimental Course tsinghua university press ISBN: 9787302438236 Search in Google Scholar

eISSN:
2470-8038
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, other