References
- Shen Qingni, Qingsi. Operating system security design. Beijing: Machinery Industry Press, 2013.
- Yu Chaohui, Wang Changzheng, Zhao Yicheng. Practical Treasure Book of Network Security System Protection and Hacker Attack and Defense. Beijing: China Railway Publishing House, 2013. Author. Thesis Title [D]. Journal of Tsinghua University, 2016, 27 (1): 1-8.
- Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley. UNIX and Linux System Administration Handbook (4th Edition)
- Tianhe Culture. Hacker attack and defense from entry to proficiency (attack and defense and script programming). Beijing: Machinery Industry Press, 2015.
- Cao Hanming. Hacker Attack and Defense. Nanjing: Southeast University Press, 2014.
- Jiang Youxu, Guo Quanshui, Ma Juan, et al. Classification and community characteristics of forest communities in China [M]. Beijing: Science Press, 1998.
- Songhua Luo Jianzhen Jiang Yuexia. Study on the Security Strategy of Electronic Document Filing in the Environment of Government Cloud [D]. Zhejiang Archives, 2018.
- Dong Zhenliang. Application of cryptographic algorithms and international standardization [D]. Financial Information Center of the People’s Bank of China, 2018.
- Zhou Yinqing, Ouyang Zichun. Brief discussion on the implementation and management of information system security level protection evaluation [D]. Digital Communication World, 2018.
- Liang Lixin and Li Jun. Information Security Level Protection Evaluation Based on Virtualization [D]. Police Technology, 2014
- Ma Limei, Wang Fangwei. Computer Network Security and Experimental Course, tsinghua university press, ISBN:9787302439332
- Ma Limei, Guo Qing, Zhang Linwei Ubuntu Linux operating system and Experimental Course, tsinghua university press, ISBN:9787302438236