[1] Wei Si Company.Several key points in deploying physical isolation technology in confidential network [J].Secrecy Works, 2002, 7(5):34-35.(in Chinese)
[2] Zhao Zheliang, Huang Qingfang.Several understandings about network physical isolation [J].Technology and Application of Network Security, 2002, 4(2):14-16.(in Chinese)
[3] Wu Gan.The current status and development of physical isolation technology [EB/OL].Http://www.ccw.ccw.com.cn/htm/net/seminar/01-8-31-2.asp.2003/2004-04.(in Chinese)
[4] Wei Wei.The development trend of network security [EB/OL].Http://www.ict.ac.cn/inf/safety.htm.2003/2004-03.(in Chinese)
[5] Li Haiming, Li Zhipeng.Analysis on physical isolation technology of Chinese [J].Network World, 2002(3):30.(in Chinese)
[6] Northcutt S, Zeltzer L, Winters S, et al.Inside network perimeter security [M].New Riders, 2003.4.
[7] Carlisle A, Steve L.Understanding public key infrastructure: concepts, standards, and deployment considerations [M].Indiana:Macmillan Technical Publishing, 1999.
[8] Yi Fasheng, Peng Mei.The structure of Windows and the design of network driver [J].Computer Application, 1999, 11(10):61-63.(in Chinese)
[9] Cant C.Introduction to design of WDM device driver [M].Translated by Ma Li.Beijing:China Machine Press, 2000.(in Chinese)