1Stevens W R. TCP/IP Illustrated, Vol. 1:The Protocols Addison - Wesley, 1994.
2Comer. Computer Networks and Internets. Prentice - Hall,1997.
3张斌 高波.Linux网络编程[M].北京:清华大学出版社,2003..
4Global Payments cops to 1.5 million total on credit card breach [EB/OL]. http://www.infosecurity-magazine.comlview/24914/ globalpayments-cops-to-15-million-total-on-credit-card-breachl ,2012.
5Atwal, Maya, Edwin Bacon. The youth movement Nashi , contentious politics, civil society, and party politics [J]. East European Politics ,2012 ,28(3) :256-266.
6Goel, Sanjay. Cyberwarfare , connecting the dots in cyber intelligence[J]. Communications of the ACM,2011 ,54(8) : 132-140.
7Interpretation of " 12th Five-Year" development plan for the information security industry[EB/OL]. http://www.cena.com.cn/a/2012-03-05/133091744165518. shtml,2012.
8Wang Pei-guo,Fan Jiong. Network information system security risk analysis and countermeasures [J]. Communications and Information Technology 3,2011 (3) :86-88.
9Analysis and prevention of network and information security prob lems [EB/OL]. http://www.studa.net/network/100521/1116389. html,2010.
10Tanimoto S,et al. VLAN control system and method[P]. U. S. Patent:6075776,2000.