Please wait a minute...
New Technology of Library and Information Service  2005, Vol. 21 Issue (3): 82-84    DOI: 10.11925/infotech.1003-3513.2005.03.20
Current Issue | Archive | Adv Search |
Actual Combat of Hacker——The Analysis to the Hidden Trouble of the Security  of Library Data
Zhao Liping
(Wenzhou Library, Wenzhou 325000,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This article analyses the process and the character of  the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer’s security .

Key wordsNet security      Data security      Hacker      Hidden trouble     
Received: 26 August 2004      Published: 25 March 2005
: 

TP393.08 

 
     
  G250.7

 
Corresponding Authors: Zhao Liping     E-mail: zhaolp@163.net,zlp@wzlib.cn
About author:: Zhao Liping

Cite this article:

Zhao Liping. Actual Combat of Hacker——The Analysis to the Hidden Trouble of the Security  of Library Data. New Technology of Library and Information Service, 2005, 21(3): 82-84.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2005.03.20     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2005/V21/I3/82

1许榕生等编著.黑客攻击技术揭秘.北京:机械工业出版社.2002年
2于世梁.计算机信息网络中存在的安全隐患及相关对策分析.江西行政学院学报, 2003,5(2):73-75
3陈静.科凌.龙王锦.数字图书馆的网络安全与防范.情报杂志,2003(5):39-41
4保护服务器安全的热点技术.March,29,2002http://tech.zbinfo.net/72342393386434560/20020329/220728.shtml(Accessed Apr.29,2003)
5一份详尽的IPC$入侵资料.Apr.29,2003. http://home.ncust.edu.cn/~xqkz/softlife/ipc.htm(Accessed Apr.29,2003)

[1] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn