Research on firewall technology and its application in computer network security strategy Peihong Wang




Download 234,35 Kb.
Pdf ko'rish
bet13/13
Sana28.01.2024
Hajmi234,35 Kb.
#147542
1   ...   5   6   7   8   9   10   11   12   13
Bog'liq
Research on firewall technology and its applicatio
1-mavzu, public key print, 649 20.10.2020, UZLIKSIZ TA\'L.PEDAGOGIKASI UMKA, Информ.письмо по конференции ЮФ 23 дек 2022 (полное) (1), Микропроцессор КР580, ABTADV 5та Amaliyot MK bo\'yicha, 6-амал маш.угит сол, 2mavzu qurlish texnoligiyasidan, 1 Ma\'ruza Sanoat robotlari va mexatronika faniga kirish , 15-маъруза (3), kurs loyixa ЭРТМ, bakayeva, в конце они оба умрут, FAOLIYAT VA KIRITIVLIK QOBILIYATLARINI RIVOJLANISHI
References. 
[1] Deng Shikun. Computer network engineering and planning 
design [M]. Yunnan University Press. 2014.09. 
[2] Zheng Kaiyuan. Computer network security and enterprise 
network security application research [J]. Network Security 
Technology and Application,2017(03):3-4. 
[3] Tan Xiongsheng,Huang He. Research on the application of 
firewall technology in computer network security [J]. Digital 
Technology 
and 
Applications,2019,37(01):211+213.DOI:10.19695/j.cnki.cn12
-1369.2019.01.109. 
[4] Wang J. Computer network management and security 
technology research ideas framing practice [J]. Digital 
design,2019(8):14. 
[5] He, Tonghui Xu, Dongsheng Zhang, Qi. Computer network 
security and defense research [M]. Beijing University of 
Technology Press.2019.05. 
[6] Wang Yijia. Analysis of the application of firewall technology 
in computer network security [J]. Computer products and 
circulation,2020(06):69. 
[7] Pan Ye, Liu Yuan. Research on the security protection of 
computer networks based on firewall technology [J]. Network 
security technology and application,2022(08):6-8. 

Download 234,35 Kb.
1   ...   5   6   7   8   9   10   11   12   13




Download 234,35 Kb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Research on firewall technology and its application in computer network security strategy Peihong Wang

Download 234,35 Kb.
Pdf ko'rish