Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (5): 71-74    DOI: 10.11925/infotech.1003-3513.2004.05.18
Current Issue | Archive | Adv Search |
A Brief Analysis of Some Methods of Web Site Security Based on ASP Technique
Gong Linli
(Library of Northwest Normal University, Lanzhou 730070, China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

According to security question of Web sites, this paper discusses some methods of Web sites security by Web server security, ASP script program and SQL Server database security accessing.

Key wordsASP technique      Web site      Security     
Received: 24 October 2003      Published: 25 May 2004
ZTFLH: 

G250.76

 
Corresponding Authors: Gong Linli     E-mail: gll7600@163.com
About author:: Gong Linli

Cite this article:

Gong Linli. A Brief Analysis of Some Methods of Web Site Security Based on ASP Technique. New Technology of Library and Information Service, 2004, 20(5): 71-74.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.05.18     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I5/71

1 朱艳辉,黄烟波.基于ASP技术的Web网站多级安全机制.微型电脑应用,2000(6):31-33
2 巩林立.刍议图书馆数字资源服务器操作系统的安全设置.图书情报工作,2003(9):102-103
3 丁振凡.如何实现ASP应用系统中的用户认证.微型机与应用, 1999(11)
4 姜祖鹏.图书馆动态网站安全措施分析.情报科学,2003(3):30-31
5 彭建,黄家林.基于ASP技术的Web网站安全措施分析.电脑与信息技术,2002(2):31-32

[1] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[2] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[3] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[4] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[5] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[6] Liu Honglian,Zhang Pengyi,Wang Jun. Multi-session Product Information Seeking Behaviors, Motivation, and Influencing Factors[J]. 现代图书情报技术, 2016, 32(4): 1-7.
[7] Hu Tao, Wei Tao, Xu Haijun. Design and Implement Security Gateway System Based on Open Source Software Used in Electronic Reading Room[J]. 现代图书情报技术, 2012, 28(2): 92-97.
[8] Udhyan Timilsina, Leah Riungu-Kalliosaari, Ossi Taipale, Kari Smolander, Wang Weijun. Security Issues on Testing of Public Cloud Applications[J]. 现代图书情报技术, 2012, (11): 22-33.
[9] Zhu Yuqiang. Design and Implementation of Unattended Library Security Program Based on Camera Images[J]. 现代图书情报技术, 2011, 27(6): 95-100.
[10] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[11] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[12] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[13] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[14] Yao Fei,Chen Wu,Zhao Yang. Architecture Design and Implementation of English Website of Tsinghua University Library[J]. 现代图书情报技术, 2009, 3(3): 91-95.
[15] Wei Chengfu,Wu Xu,Zhang Hua. Design and Realization of Web Application in Network Behavior Security Auditing System[J]. 现代图书情报技术, 2009, 3(2): 96-101.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn