[2] Luo Tiejian, Xu Haizhi, Dong Zhanqiu. Network Security [J]. Computer Applications, 2000, (04).
Zhang Ting, Wang Yadong, Chen Yuhua. Web security technology and the role of firewall [J]. Journal of Heilongjiang Institute of Water Resources, 2000, (03).
[4] Eve Su. Network Security Technology [J]. Toothpaste Industry, 2003, (04).
Zhao Wei, Jia Zhuosheng. Application-level network security [J]. Railway Computer Applications, 2004, (0 1).
Tan, Shi Yan. A New Network Security and Firewall Technology [J]. Computer Age, 2002, (03).
Temple. Network security technology and firewall [J]. Journal of Chongqing University of Electric Power, 2000, (04).
[8] Liu Dayong. Network Security Threats and Security Protection [J]. Science and Technology, 2005, (06).
[9] Yang Jidong. Cryptography and Network Security Analysis [J]. Gansu Agriculture, 2005, (05).
Li Wenfeng. Research on network attack methods and security [J]. Science, Technology and Engineering, 2005, (04). [1] Bina. Network security technology and firewall [J]. Journal of Shanxi University of Finance and Economics, 2000, (S2) [1] Deng Pu.
[2], Liu, On the Safe Network Wall-Firewall [J]. applied energy technology, 2002, (04)
[3] Shen, Ruan Jieshan, Li Zhenkun, Liu Huailiang, Zhengqing Liu. Examples and Prospects of Firewall Purchase and Configuration [J]. Journal of Guangdong University of Technology, 2003, (03)
[4] Shi Xiaolong. Application of Firewall Technology in Network [J]. Journal of Public Security University (Natural Science Edition), 200 1, (03)
[5] Web application firewall menacing [J]. Electric Power Informatization, 2009, (07)
[6] Yan Baogang. Analysis of Firewall Networking Scheme [J]. Popular Standardization, 2004, (08)
[7] Penden. Analysis of Firewall Technology [J]. Journal of Zhuzhou Institute of Technology, 2004, (02)
Lujun, Ding Min. On firewall design [J]. Building Materials and Applications, 2004, (0 1)
[9] Chen Bing. The choice of enterprise computer network firewall [J]. Power supply, 2004, (04)
Xu Wenhai. Firewall technology and the establishment of virtual private network [J]. Railway Operation Technology, 2003, (04)