This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Shen Qingni, Qingsi. Operating system security design. Beijing: Machinery Industry Press, 2013.ShenQingniQingsiOperating system security designBeijingMachinery Industry Press2013Search in Google Scholar
Yu Chaohui, Wang Changzheng, Zhao Yicheng. Practical Treasure Book of Network Security System Protection and Hacker Attack and Defense. Beijing: China Railway Publishing House, 2013. Author. Thesis Title [D]. Journal of Tsinghua University, 2016, 27 (1): 1-8.YuChaohuiWangChangzhengZhaoYichengPractical Treasure Book of Network Security System Protection and Hacker Attack and Defense. Beijing: China Railway Publishing House, 2013. Author. Thesis Title [D]Journal of Tsinghua University201627(1):18Search in Google Scholar
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley. UNIX and Linux System Administration Handbook (4th Edition)NemethEviSnyderGarthHeinTrent R.WhaleyBenUNIX and Linux System Administration Handbook(4th Edition)Search in Google Scholar
Tianhe Culture. Hacker attack and defense from entry to proficiency (attack and defense and script programming). Beijing: Machinery Industry Press, 2015.Tianhe CultureHacker attack and defense from entry to proficiency (attack and defense and script programming)BeijingMachinery Industry Press2015Search in Google Scholar
Cao Hanming. Hacker Attack and Defense. Nanjing: Southeast University Press, 2014.CaoHanmingHacker Attack and DefenseNanjingSoutheast University Press2014Search in Google Scholar
Jiang Youxu, Guo Quanshui, Ma Juan, et al. Classification and community characteristics of forest communities in China [M]. Beijing: Science Press, 1998.JiangYouxuGuoQuanshuiMaJuanClassification and community characteristics of forest communities in China [M]BeijingScience Press1998Search in Google Scholar
Songhua Luo Jianzhen Jiang Yuexia. Study on the Security Strategy of Electronic Document Filing in the Environment of Government Cloud [D]. Zhejiang Archives, 2018.SonghuaLuoYuexiaJianzhen JiangStudy on the Security Strategy of Electronic Document Filing in the Environment of Government Cloud [D]Zhejiang Archives2018Search in Google Scholar
Dong Zhenliang. Application of cryptographic algorithms and international standardization [D]. Financial Information Center of the People’s Bank of China, 2018.DongZhenliangApplication of cryptographic algorithms and international standardization [D]Financial Information Center of the People’s Bank of China2018Search in Google Scholar
Zhou Yinqing, Ouyang Zichun. Brief discussion on the implementation and management of information system security level protection evaluation [D]. Digital Communication World, 2018.ZhouYinqingOuyangZichunBrief discussion on the implementation and management of information system security level protection evaluation [D]Digital Communication World2018Search in Google Scholar
Liang Lixin and Li Jun. Information Security Level Protection Evaluation Based on Virtualization [D]. Police Technology, 2014LiangLixinLiJunInformation Security Level Protection Evaluation Based on Virtualization [D]Police Technology2014Search in Google Scholar
Ma Limei, Wang Fangwei. Computer Network Security and Experimental Course, tsinghua university press, ISBN:9787302439332MaLimeiWangFangweiComputer Network Security and Experimental Coursetsinghua university pressISBN:9787302439332Search in Google Scholar
Ma Limei, Guo Qing, Zhang Linwei Ubuntu Linux operating system and Experimental Course, tsinghua university press, ISBN:9787302438236MaLimeiGuoQingZhangLinweiUbuntu Linux operating system and Experimental Coursetsinghua university pressISBN:9787302438236Search in Google Scholar