参考文献/References:
[1] 廉龙颖.网络安全课程网络化教学研究[J].中国电力教育, 2013(5): 92-93. [2] 曾湘黔.网络安全技术[M].清华大学出版社,2013 [3] 丁建立.网络安全[M].武汉:武汉大学出版社,2007. [4] 李体鸿张天长.网络安全实训教学探索[J].现代计算机, 2011(9): 27-29. [5] Wikipedia.Virtualization.2014 [cited 2014; Available from: http://en.wikipedia.org/wiki/Virtualization. [6] VMWare. VMware Workstation.2014 [cited 2014; Available from: http://www.vmware.com/products/workstation/. [7] VirtualBox.org. VirtualBox. 2014 [cited 2014; Available from: https://www.virtualbox.org/. [8] G. Combs. Sniff free or die. 2014 [cited 2014; Available from: https://blog.wireshark.org/2013/07/fifteen-years/?utm_sou rce=rss&utm_medium=rss&utm_campaign=fifteen-years. [9] B. Huang, T. XieY. Ma. Anti SQL Injection with Statements Sequence Digest. in The Spring World Congress on Engineering and Technology (SCET) 2012.
相似文献/References:
[1]汪艳平 韦正 蓝建京 冯建海 宁东元 张晖英.HPLC 法研究四方藤指纹图谱[J].大众科技,2018,20(06):24.
Study on the fingerprint chromatograms of Cissus pteroclada Hayata by HPLC[J].Popular Science & Technology,2018,20(01):24.
[2]李梦茜,甘国源,林 琳,等.HPLC 法测定蓖麻叶中槲皮素、绿原酸、蓖麻碱3 种活性成分的含量[J].大众科技,2020,22(02):32.
Determination of Three Active Ingredients of Quercetin, Chlorogenic Acid andRicinine in Castor Leaves by HPLC[J].Popular Science & Technology,2020,22(01):32.