参考文献/References:
[1] 廉龙颖.网络安全课程网络化教学研究[J].中国电力教育, 2013(5): 92-93. [2] 曾湘黔.网络安全技术[M].清华大学出版社,2013 [3] 丁建立.网络安全[M].武汉:武汉大学出版社,2007. [4] 李体鸿张天长.网络安全实训教学探索[J].现代计算机, 2011(9): 27-29. [5] Wikipedia.Virtualization.2014 [cited 2014; Available from: http://en.wikipedia.org/wiki/Virtualization. [6] VMWare. VMware Workstation.2014 [cited 2014; Available from: http://www.vmware.com/products/workstation/. [7] VirtualBox.org. VirtualBox. 2014 [cited 2014; Available from: https://www.virtualbox.org/. [8] G. Combs. Sniff free or die. 2014 [cited 2014; Available from: https://blog.wireshark.org/2013/07/fifteen-years/?utm_sou rce=rss&utm_medium=rss&utm_campaign=fifteen-years. [9] B. Huang, T. XieY. Ma. Anti SQL Injection with Statements Sequence Digest. in The Spring World Congress on Engineering and Technology (SCET) 2012.
相似文献/References:
[1]肖晓飞 贾 颖.NSSA 研究现状及问题分析[J].大众科技,2013,15(11):8.
[2]赵中原 杨立身.层次化校园网络的规划设计与实现[J].大众科技,2014,16(08):37.
Design and implement of campus hierarchical network[J].Popular Science & Technology,2014,16(01):37.
[3]袁 歆.DDOS 攻击防护解决方案研究[J].大众科技,2014,16(11):9.
Research on scheme of DDOS attack protection solution[J].Popular Science & Technology,2014,16(01):9.
[4]罗添耀.基于安全代理网关的高校网络安全探究[J].大众科技,2022,24(09):25.
Research on University Network Security Based on Security Proxy Gateway[J].Popular Science & Technology,2022,24(01):25.
[5]宋进文.关于5G AeroMACS网络安全的分析与探讨[J].大众科技,2023,25(10):27.
Analysis and Discussion on 5G AeroMACS Network Security[J].Popular Science & Technology,2023,25(01):27.
[6]李千川.智能化线上实训室的分析与研究[J].大众科技,2023,25(12):22.
Analysis and Research of Intelligent Online Training Room[J].Popular Science & Technology,2023,25(01):22.
[7]许志聪.基于Shell脚本的KVM虚拟化技术应用[J].大众科技,2024,26(3):9.
[8]雷雪峰.计算机网络安全问题及其对策研究[J].大众科技,2024,26(4):44.
[J].Popular Science & Technology,2024,26(01):44.