Please wait a minute...
New Technology of Library and Information Service  2003, Vol. 19 Issue (6): 85-87    DOI: 10.11925/infotech.1003-3513.2003.06.27
Current Issue | Archive | Adv Search |
NT服务器的安全维护与故障排除
Liu Xing
(The Library of Hefei Union University, Hefei 230022, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

From applied point of NT server, the author analyzes datas security and the security network hidden trouble of NT operating system,gives the reference opinion of resolving this problems,and gives some methods to resolve NT server s familiar fault.

Key wordsWindows NT      Data protecting      Network security     
Received: 17 March 2003      Published: 25 December 2003
ZTFLH: 

G258.94

 
Corresponding Authors: Liu Xing   
About author:: Liu Xing

Cite this article:

Liu Xing. NT服务器的安全维护与故障排除. New Technology of Library and Information Service, 2003, 19(6): 85-87.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2003.06.27     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2003/V19/I6/85


[1]Robert Wright.IP Routing Primer(影印版)
[M].北京:清华大学出版社,1999

[2]陈明.网络的安全维护与故障排除.微型电脑机应用,2001,(3)

[3]齐占杰.谈谈Internet上Windows NT的安全措施.电脑知识与技能,2001,(2)

[4]张心明.Windows NT引导错误的修复.现代图书情报技术,2002,(1)

[1] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[2] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[3] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[4] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[5] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[6] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
[7] Jiang Chuanju. The Function of Log Analysis in Network Security[J]. 现代图书情报技术, 2004, 20(12): 58-60.
[8] Zhou Huai. The Analysis and Advices of Security Holes in ASP Web Sites[J]. 现代图书情报技术, 2004, 20(11): 90-92.
[9] Jiang Jihong. The Network s Encryption and Authentication Technique[J]. 现代图书情报技术, 2003, 19(4): 78-80.
[10] Shen Wenyu,Liu Zongren. Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002, 18(2): 92-93.
[11] Song Xiaowen. The Network Information Security in China[J]. 现代图书情报技术, 2002, 18(1): 53-55.
[12] Zhang Xinming. Restore of Window NT Bootstrap Error[J]. 现代图书情报技术, 2002, 18(1): 80-81.
[13] Wang Huawei. The NAT Solution of Computer Network of Library[J]. 现代图书情报技术, 2001, 17(5): 27-28.
[14] Xu Jinjun,Ni Bo. Research of Information Network Security[J]. 现代图书情报技术, 2001, 17(1): 60-61.
[15] Wang Yong,Ni Bo,Yuan Qinjian, Zhu Weiyong,Liang Wei. Advances of Computer Network Technology in 20 Century[J]. 现代图书情报技术, 2000, 16(6): 14-17.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn