期刊文献+

Web攻击及安全防护技术研究 被引量:7

The Research of Web Attack and Security Technology
在线阅读 下载PDF
导出
摘要 对于不同的网站应用程序,构建有效的网站应用安全防护机制非常重要。在详细分析Web攻击行为的基础上,对Web安全防护技术进行了深入探讨.提出了预防为主.软硬件结合的多重Web安全防护技术。 To different web sites applications, building an effective security mechanism for web applications is very important. Based on a detailed analysis of Web attacks,Web security protection technology is In-depth discussed. The Web security technology of prevention- oriented, combining multiple hardware and software is proposed.
作者 李必云 石俊萍 LI Bi-yun, SHI Jun-ping (1.College of Mathematics and Computer ScienceJishou University Jishou 416000, China; 2.College of Physics Science & Information Engineering,Jishou UniversityJishou 416000, China)
出处 《电脑知识与技术》 2009年第11期8647-8649,共3页 Computer Knowledge and Technology
关键词 WEB攻击 安全防护 防火墙 验证技术 Web attack security firewall verification technology
  • 相关文献

参考文献5

二级参考文献20

  • 1[1]Elisa B,Barbara C.Integrating XML and Databases[J].IEEE Intemet Computing,2001.7-8
  • 2[2]Airi S,Frank W T.System Desiderata for XML Databases[C].Proceedings of the 27th VLDB Conference,Roman,Italy,2001
  • 3[3]Deutsch A,Femandez M,Florescu D el al.A query language for XML[J].Computer Networks, 1999;31:1155-1169
  • 4[4]Ronald B.XML and Databases.http://www.rpbourret.com/xmldbms
  • 5[5]Ronald B.XML Database Products.http://www.rpbourret.com/xmldbms
  • 6[6]Kimbro S.Introduction to Native XML Databases.http://www.xml.com/pub
  • 7[7]Kimbro S.Introduction to dbXML.http://www.xml.com/pub
  • 8[8]Igor D.Storing XML in Relational Databases.http://www.xml.com/pub
  • 9[9]Dongwon L,Wesky W C.CPi algorithm for mapping XML DTD to relational schema[J].Data&knownledge Engineering , 2001; 39 : 3-25
  • 10[10]Ling L,Colton P,Wei H.An XML-enabled data extraction toolkit for web sources[J].Information System,2001 ;26: 563-583

共引文献67

同被引文献27

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部