Skip to main content

Explore and Analyse of Computer Network Security Technique and Defence Tactics

  • Conference paper
Innovative Computing and Information (ICCIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 231))

Included in the following conference series:

  • 1977 Accesses

Abstract

The paper analyzes the mainly problems of current network information security, and proposed and explained my own strategies to these problems, from the implications, defects and  producing causes of the computer network security, the main techniques of network security, and common network attacking methods and countermeasures, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li junyu, M.: Information security technology infrastructure, pp. 158–178. The publishing house of metallurgical industry, Beijing (2004)

    Google Scholar 

  2. Wang lihui, J.: The network security and the related technical. The Journal Science and Technology Institute of Agriculture 19(2), 120–122 (2005)

    Google Scholar 

  3. He wanmin, J.: The network information safety and prevention technique. Gansu Agriculture (1), 97–99 (2005)

    Google Scholar 

  4. Zhang jian, D.: Network security system design and implementation of defensive. University of science and technology the master’s degree the paper, Chengdu (2001)

    Google Scholar 

  5. Huang hu, J.: To hacker attack precautions. Computer Security (9), 76–78 (2005)

    Google Scholar 

  6. Zhang xiaolei, M.: The diagnosis and the fight against computer viruses, pp. 60–100. China the environmental sciences press, Beijing (2003)

    Google Scholar 

  7. Zhu lisen, M., Zhang, s.: Computer network application technology, pp. 180–200. Patent document press, Beijing

    Google Scholar 

  8. EricMaiwald, M.: Willi Education, Security Planning & Disaster Recovery, pp. 86–94. Posts & Telecommunications Press, Beijing (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fengling, W., Zhiqiang, W. (2011). Explore and Analyse of Computer Network Security Technique and Defence Tactics. In: Dai, M. (eds) Innovative Computing and Information. ICCIC 2011. Communications in Computer and Information Science, vol 231. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23993-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23993-9_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23992-2

  • Online ISBN: 978-3-642-23993-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics