网络防火墙
- 网络Firewall;network firewall
-
基于Linux的网络防火墙中协议栈指纹的消除
Elimination of Protocol Fingerprint in Network Firewall Based on Linux
-
基于Linux的网络防火墙中IP碎片重组算法的研究与实现
Research and Implementation of the IP Datagram Reassembly Algorithms in Network Firewall Based on Linux
-
IPV6的嵌入式校园网络防火墙设计
The Design of Embedded School Network Firewall Based on IPV6
-
结合传统的网络防火墙、入侵检测和C/S模式的黑客监控系统的优点,本系统采用多层分布式C/S体系结构。
This system introduces multi-ties C / S architecture , by combing the advantages of traditional Network Firewall , Intrusion Detection and Hacking Monitor System .
-
IPv6网络防火墙技术研究
The Research of IPv6 Network Firewall Technology
-
它具有可以指向和点击的界面,可以完成各种Linux管理任务,包括用户管理、网络防火墙和网络设备的配置。
It provides point-and-click interfaces to a variety of Linux administration tasks , including user management , network firewalling , and network device configuration .
-
高德纳研究咨询公司(Gartner)最近的一份报告将业内新生势力巴洛艾托公司列为企业网络防火墙业务的顶尖提供商。
A recent report from research firm Gartner listed relative newcomer Palo Alto networks as a leading vendor in enterprise network firewalls .
-
研究网络防火墙应用代理技术,讨论代理技术的实用性,设计并实现CFFIREWALLHTTP代理服务器和CFFIREWALLFTP代理服务器;
Researching on the proxy technology in computer network firewall , discussing the applications of proxy technology in computer network , designing and realizing CF_FIREWALL HTTP Proxy Server and CF_FIREWALL FTP Proxy Server .
-
网络防火墙安全技术的分类及其主要技术特征。
Network firewall security technology classification and its main technical features .
-
基于包过滤和代理服务的复合型网络防火墙构建
Building the Complex Network Firewall Based on Packet Filter and Proxy
-
高性能网络防火墙关键技术的研究
Research of the Critical Technology on High Function Network Firewall
-
桥式网络防火墙的设计技术
The Design Technology of Firewall Based on Net Bridge
-
网络防火墙远程控制及关键技术应用研究
On the Application of Key Technologies in the Remote Control of Net Firewall
-
网络防火墙结构
Structure of Commutative Semigroups The Construction of Network Firewall
-
Internet/Intranet网络防火墙结构分析
Structural Analysis of Internet / Intranet Network Firewall
-
网络防火墙的类型和拓扑结构
The Type and Topology Structure of Network Firewall
-
Windows2000构建单网卡网络防火墙
Construct the single-network-adaptor network firewall with windows 2000
-
车载MOST网络防火墙的设计与实现
Design and Implementation of Firewall based on MOST
-
关于网络防火墙技术的安全性分析
Analysis of the security of firewall technique
-
实际上从各个方面考虑,选择某种网络防火墙是很重要的。
On virtually every count , it is important to pick some kind of network firewall .
-
网络防火墙技术
Technique of Network Firewall
-
在这些基础上本文设计了一个网络防火墙系统,并仔细设计了各个子模块的功能和实现机制、方法。
The paper designs a network firewall system , and carefully designed features and mechanisms of the various sub-modules .
-
这样授权就必须进化成为分布式模型来支持网络防火墙外的用户。
Autho rization , therefore , must evolve to a distributed model to support users outside the network firewall .
-
文章全面论述了网络防火墙安全技术和产品的分类及主要技术特征。
This paper discussed comprehensively the safe practice of fire wall of the network and the classification of products and main technological character .
-
通过湖北省新型业务网络防火墙建设的实例,探讨了如何应用防火墙技术提高气象业务网络的安全可靠性。
The improvement of the security of the meteorological operation network is presented taking the Hubei provincial meteorological operation network firewall as an example .
-
本文介绍了网络防火墙的种类、结构和各自的特点,以及企业如何建立适合自身的防火墙系统。
The method of creating the enterprise firewalls matching themselves characters is discussed after the structures and characters of all kinds of firewalls are studied .
-
论述对网络防火墙的概念、基本类型、主要技术特征、构建配置及具体应用。
This text discusses about the concept , the basic type , the main technological characteristic , the component setup and the application of network firewall .
-
研究本题目就是为了建立一套类似于网络防火墙的设备,以高效、准确地过滤垃圾邮件,净化网络环境。
What we study the theme for is to establish a facility like firewall to filter the spam efficiently and exactly , purify the internet atmosphere .
-
系统运行时使用高级的网络防火墙,在运行过程中提高了系统的安全性,从很大程度上解决了系统的安全问题。
System operation using advanced network firewall , in the running process to improve the security of the system , from the safety of the system largely solves the problem .
-
为了保证计算机系统之间数据通信的安全性,对未知的入侵进行有效防范,通常部署网络防火墙和入侵检测系统来保障网络安全。
In order to ensure the security between network and data communication , to prevent the unknown invasion , many security products such as Firewalls and Intrusion Detection Systems are deployed .