期刊文献+

ASP+Access动态网站的安全及对策分析 被引量:1

According to ASP+Access Dynamic State Website Safety and Counterplan Analysis
下载PDF
导出
摘要 文章对Access动态网站数据库文件常见的几种不安全现状进行了分析,并针对这些情况,归纳整理了目前一些通用的解决方案,逐一分析这些解决方案的不足之处和可能存在的安全隐患。最后,为大家提供并讲解了切实有效的解决方法,这些方法是笔者通过多年的网络编程和网络管理的经验总结出来的,通过实际检测,是行之有效的,可以最大限度的解决Access数据库动态网站的数据库文件的安全问题。 This article analyzes the status of several common insecurity about the access dynamic state website. In light of these circumstances are summarized some of solution, and analyze the shortcomings and possible safety hazards about these solution. Finally, author to provide a practical and effective solution, which is the author through the years of network programming and network management summed up the experience, it is effective, the solution can solving the database files security problems of the access dynamic state website.
作者 王江为 熊斌
出处 《电脑知识与技术》 2006年第11期145-146,175,共3页 Computer Knowledge and Technology
关键词 数据库文件 ASP 安全对策 Database Files ASP Safety and Counterplan
  • 相关文献

参考文献1

二级参考文献21

  • 1CERT/CC.CERT/CC Statistics 1988-2003.http://www.cert.org/stats/ cert_stats.html#vulnerabilities[EB/OL].2004.
  • 2FARMER D,SPAFFORD E H.The Cops Security Checker System[R].Technical Report CSD-TR-993.Department of Computer Sciences,Purdue University.1991.
  • 3NMAP.http://www.insecure.org/nmap/index.html[EB/OL].2003.
  • 4Renaud Deraison.Nessus Scanner.http://www.nessus.org[EB/OL].2004.
  • 5.[EB/OL].ISS.http://www.iss.com/[EB/OL],2004.
  • 6MOORE A P,ELLISON R J,LINGER R C.Attack Modeling for Information Security and Survivability[R].Technical Note,CMU,2001.
  • 7ORTALO R,DESWARTE Y.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650.
  • 8PHILLIPS C A,SWILER L P.A graph-based system for network vulnerability analysis[A].New Security Paradigms Workshop[C].1998.71-79.
  • 9SWILER L P,PHILLIPS C,ELLIS D.Chakerian.Computer-attack graph generation tool[A].Proceedings of the DARPA Information Survivability Conference and Exposition[C].Anaheim,California,2000.307-321.
  • 10RAMAKRISHNAN C,SEKAR R.Model-based analysis of configuration vulnerabilities[J].Journal of Computer Security,2002,10(1/2):189-209.

共引文献40

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部