In the computer field, network security is a crucial integrant. It is necessary to pay attention on the application of virtual network technology, so as to raise the standard of computer network security to a new level [2]. In view of this, this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
Ni H, 2021, Application of Computer Network Technology and Analysis of Security Defense Measures. Papermaking Equipment and Materials, 50(12): 88–89.
Yang L, 2021, Application of Data Encryption Technology in Computer Network Security. Wireless Interconnection Technology, 18(23): 20–21.
Li N, 2021, Application of Virtualization Technology in Computer Network Teaching. Fujian Computer, 37(12): 129–132. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16707/j.cnki.fjpc.2021.12.030
Ou W, Yang Y, 2021, Application of Data Encryption technology in Computer Network Security. Science and Technology Innovation and Application, 11(35): 106–109 + 113. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.19981/j.CN23-1581/G3.2021.35.027
Zhang Z, 2021, Application Analysis of Virtual Machine Technology in Higher Vocational Computer Network Security Teaching. Computer Knowledge and Technology, 17(34): 209–210 + 222. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.14004/j.cnki.ckt.2021.3689
Liu Z, 2021, Application of Firewall Technology in Computer Network Security. Electronic Technology and Software Engineering, 2021(23): 238–239.
He W, Wang H, He J, et al., 2021, Discussion on the Application of Computer Network Security Technology in E-Commerce. Information Recording Materials, 22(12): 123–124. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16009/j.cnki.cn13-1295/tq.2021.12.031
Wang T, 2021, Application of Computer Network Information Security Technology in the Era of Big Data. Information Recording Materials, 22(12): 86–87. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16009/j.cnki.cn13-1295/tq.2021.12.101
Wong F, Qiu Y, 2021, Application of Cloud Computing Technology in Secure Storage of Computer Network. Modern Industrial Economy and Informatization, 11(11): 132–133. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16525/j.cnki.14-1362/n.2021.11.052
Liang Y, 2021, Application of Data Encryption Technology in Computer Network Security. Electrical Technology, 2021(22): 169–170 + 175. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.19768/j.cnki.dgjs.2021.22.057
Wang J, 2021, Construction and Analysis of University Computer Network Security Training Laboratory based on “Cloud Computing” Virtualization Technology. Information Technology and Informatization, 2021(11): 222–224.
He L, 2021, Application of Data Encryption Technology in Computer Network Security. Computer Programming Skills & Maintenance, 2021(10): 155–157. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16184/j.cnki.comprg.2021.10.060
Lin Y, 2021, Application of Data Mining Technology in Computer Network Security Maintenance. Changjiang Information Communication, 34(10): 143–145.
He Z, 2021, Application of Computer Network Security Technology in the Era of Big Data. Software, 42(10): 87–89.
Zhou P, 2021, Application Value of Data Encryption Technology in Computer Network Security. Software, 42(10): 168–170.
Zhong Y, 2021, Application of Computer Network Security Technology in Network Security Maintenance. Wireless Interconnection Technology, 18(19): 10–11.
Sun Y, 2021, Research on Strategy of Applying Computer Network Security Technology in Network Maintenance. Information Record Materials, 22(10): 82–83. https://kns.cnki.net/kcms/detail/detail.aspx?doi=10.16009/j.cnki.cn13-1295/tq.2021.10.038
Liu Y, 2021, Computer Network Information Security and Its Application of Firewall Technology. Internet Weekly, 2021(19): 43–45.
Han D, 2021, Application of Data Encryption Technology in Computer Network Security. China New Communication, 23(19): 120–121.
Zhong Y, 2021, Application of Data Encryption Technology in Computer Network Security. Industry and Science Forum, 20(19): 35–36.