Please wait a minute...
New Technology of Library and Information Service  2000, Vol. 16 Issue (3): 50-51    DOI: 10.11925/infotech.1003-3513.2000.03.15
article Current Issue | Archive | Adv Search |
Information Security Protection Technology for the Internet
Guo Xiaomiao
(Department of Information Management, Nanjing University, Nanjing)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      

With people’s more dependence on the Internet, the information security problem on the Internet becomes more and more important. The article gives an overall description about some main information security protection technology for the Internet: firewall、 data lock、 virus protection、 invasion detection、IC cards etc.

Key wordsInformation security      Firewall      Data lock      Invasion detection      Virus      IC cards     
Received: 28 June 1999      Published: 25 June 2000
Corresponding Authors: Guo Xiaomiao   
About author:: Guo Xiaomiao

Cite this article:

Guo Xiaomiao. Information Security Protection Technology for the Internet. New Technology of Library and Information Service, 2000, 16(3): 50-51.

URL:     OR

1 高文.数字图书馆—概念与挑战1计算机世界,1999,8116
2 刘刚.几种优化网络性能的方案1计算机世界,2000,1110
3 周和平.挑战、机遇与行动1计算机世界,1999,6128

[1] Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Wang Xiaoliang, Wang Wei. Constructing Statistical Analysis System of Electronic Periodical Databases Based on the Firewall Log Mining[J]. 现代图书情报技术, 2013, 29(7/8): 122-126.
[3] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[4] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[5] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[6] Zeng Zhanwei. Construction of an Anti-virus Filter Proxy on Linux System and Its Application in Library Local Area Network[J]. 现代图书情报技术, 2007, 2(7): 92-95.
[7] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[8] Zhang Dexiang,Mu Jianbo,Wang Xiaoyan,Jia Xiaozhu . Design and Implementation of Network Security System for the Library Based on Virtual Technique[J]. 现代图书情报技术, 2006, 1(6): 73-76.
[9] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[10] Niu Zhendong,Shi Xuelin,Ye Chenglin. Status and Trend of Research on Standards Involved in Digital Libraries[J]. 现代图书情报技术, 2004, 20(7): 1-5.
[11] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[12] Zhang Jiping,Xu Quanli,Mu Ming. The Security Techniques for Library Networks[J]. 现代图书情报技术, 2004, 20(3): 56-59.
[13] Chen Wu,Wang Ping. Preventing and Curing of Computer Viruses in Library's LAN Environment[J]. 现代图书情报技术, 2002, 18(5): 67-69.
[14] Li Shuning,Ma Mingxia. The Applying of Digital Watermark in Digital Library Security[J]. 现代图书情报技术, 2002, 18(1): 17-19.
[15] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-