Affiliation:
1. Center for Hydrogeology and Environmetal Geology Survey,cgs
2. Center for Hydrogeology and Environmetal Geology Survey
Abstract
With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.
Publisher
Trans Tech Publications, Ltd.
Reference6 articles.
1. Tang Chenghua, Yu Shunzheng. A dynamic and self-adaptive network security policy realization mechanism, IFIP International Conference on Network and Parallel Computing, NPC2008, 2008: 88-95.
2. Kondakci, Suleyman. A composite network security assessment, The 4th International Symposium on Information Assurance and Security, IAS (2008).
3. B. Harris,R. Hunt. TCP/IP security threats and attack methods, computer communications, (1999).
4. S. Andrew, Tanenbaum. Computer Networks(Volume 3). PRENTICE HALL, 2008, 119-123.
5. Information on http: /baike. baidu. com/view/3067. htm.