Please wait a minute...
New Technology of Library and Information Service  2001, Vol. 17 Issue (1): 60-61    DOI: 10.11925/infotech.1003-3513.2001.01.16
article Current Issue | Archive | Adv Search |
Research of Information Network Security
Xu Jinjun1   Ni Bo2
1(Department of Information Management Nanjing University, Nanjing)
2(Institute of Information Industry Nanjing University, Nanjing)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

With the development of information network, the information security became more important. But we had not attach much importance to it, then this paper study a lot.

Key wordsInformation security      Network security     
Received: 05 June 2000      Published: 25 February 2001
: 

TP393.08

 
Corresponding Authors: Xu Jinjun,Ni Bo   
About author:: Xu Jinjun,Ni Bo

Cite this article:

Xu Jinjun,Ni Bo. Research of Information Network Security. New Technology of Library and Information Service, 2001, 17(1): 60-61.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2001.01.16     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2001/V17/I1/60

1 徐进鸿.信息网络系统建设必须重视信息安全.情报学报,1998,(6),127-130
2 沈昌祥.构筑信息与网络安全防线刻不容缓.科技日报(京),1998,8.4,5版

[1] Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[3] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[4] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[5] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[6] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[7] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[8] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[9] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[10] Niu Zhendong,Shi Xuelin,Ye Chenglin. Status and Trend of Research on Standards Involved in Digital Libraries[J]. 现代图书情报技术, 2004, 20(7): 1-5.
[11] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[12] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[13] Zhang Jiping,Xu Quanli,Mu Ming. The Security Techniques for Library Networks[J]. 现代图书情报技术, 2004, 20(3): 56-59.
[14] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[15] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn