freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

java網(wǎng)絡(luò)安全的管理信息系統(tǒng)-畢業(yè)論文(doc畢業(yè)設(shè)計(jì)論文)(已修改)

2025-07-05 15:52 本頁面
 

【正文】 摘要本論文所介紹的信息安全管理系統(tǒng)是一個(gè)有關(guān)網(wǎng)絡(luò)安全的管理信息系統(tǒng)。該系統(tǒng)面向公司的信息安全管理人員,使得他們可以從繁重而分散的操作中解脫出來,減輕勞動(dòng)強(qiáng)度,從而有足夠的時(shí)間和精力和充分的數(shù)據(jù)對業(yè)務(wù)系統(tǒng)和資產(chǎn)中的漏洞、威脅、病毒、安全事件等信息進(jìn)行收集、整理、分析、處理、保存、傳輸和發(fā)布,使得信息安全管理人員能有條不紊的開展信息安全管理工作。該系統(tǒng)的開發(fā)采用了軟件工程的理論,合理地安排人員和時(shí)間對系統(tǒng)進(jìn)行分析、設(shè)計(jì)、編碼、測試和維護(hù),項(xiàng)目小組在預(yù)定的時(shí)間內(nèi)準(zhǔn)確而高效的完成了該項(xiàng)目的開發(fā)。系統(tǒng)采用面向?qū)ο蟮能浖O(shè)計(jì)方法,模塊間松耦合而模塊內(nèi)部又保持高度一致,系統(tǒng)的可重用性和可維護(hù)性水平較高,從而提高了軟件設(shè)計(jì)的質(zhì)量。采用面向?qū)ο蟮?JAVA 作為后臺編程語言使得系統(tǒng)的代碼維護(hù)相當(dāng)方便、可擴(kuò)展性好、并支持代碼重用,在一定程度上減輕了軟件開發(fā)人員的工作強(qiáng)度。本論文在系統(tǒng)實(shí)現(xiàn)之后經(jīng)仔細(xì)斟酌而成。論文的第一部分是引言。第二部分闡述系統(tǒng)需求分析,對現(xiàn)行的系統(tǒng)進(jìn)行描述,對其中存在的問題進(jìn)行了分析,提出了解決方案,進(jìn)行了系統(tǒng)開發(fā)的可行性分析與決策。第三部分對系統(tǒng)的邏輯方案,數(shù)據(jù)流圖,數(shù)據(jù)字典進(jìn)行了描述,編寫了系統(tǒng)說明書,第四部分是系統(tǒng)總體結(jié)構(gòu)設(shè)計(jì),包括軟件模塊結(jié)構(gòu)設(shè)計(jì),如模塊結(jié)構(gòu)圖,IPO 圖,數(shù)據(jù)庫設(shè)計(jì)。第五部分是系統(tǒng)實(shí)現(xiàn),包括:代碼設(shè)計(jì),主要模塊設(shè)計(jì)。最后部分是實(shí)施概況,實(shí)施環(huán)境與工具的選擇,系統(tǒng)測試,運(yùn)行與維護(hù)概況。關(guān)鍵詞: 信息安全、管理信息系統(tǒng)、面向?qū)ο?、JDBC、B/SAbstractThis paper introduces an information security management system that is about work security. The system faces to the people who manage the information security in the pany, so as to help them escape from the hard and busy work, reduce their laboring intensity. Consequently they will have enough time and energy, and can get abundant data to collect, coordinate, analyze, dispose, save, transport and distribute the hole, threaten, virus, security and so on in the operation system and asset, thereby the information security manager can develop the information security management task in an orderly way.The exploitation of the system was adopted the theory of the software engineering, arranged the people and time to analyze, design, code, test and maintenance the system in reason. Project group achieve the development of the project in schedule well and truly.The design method of the system was adopted the way of object oriented. The coupling in the module is close and it was kept consistent within the module. The system can be used repeatedly and the maintainability of the system is very strong, so the quality of the software design was enhanced. It is convenient、expansible and sustain the use repeated of the code to use JAVA as the language of the background, in a certain extent reduced the laboring intensity of the software development people.This paper was acplished by being thought over after the system had been done.The first part of the paper is the foreword. The second part is the expatiation about the system’s requirement analyse, the description of the system, the problem in existence, and provide the solution, the feasibility and decisionmaking of the system development. The third part is the description of the logic scheme, the data stream map and the data dictionary about the system and the system explanation. The fourth part is the collectivity framework design about the system, including the software module framework design, for example, the module fabric map, the IPO map and the database design. The fifth part is the implement of the system, such as the code design, the main module design. The final part is the implement circumstances, the implement environment and the choice of the tool, the system test, the survey about the running and maintenance of the system. Keyword: information security, management information system, object oriented, JDBC, B/S目 錄摘要 ......................................................................................................................................................................IABSTRACT ......................................................................................................................................................II第 1 章 前 言 ............................................................................................................................................ 1 背景分析 .............................................................................................................................................. 1 國內(nèi)外現(xiàn)狀 .......................................................................................................................................... 1 本系統(tǒng)研究(設(shè)計(jì))內(nèi)容 ..................................................................................................................... 2 第 2 章 系統(tǒng)需求分析 .................................................................................................................................. 5 現(xiàn)行業(yè)務(wù)系統(tǒng)描述 .............................................................................................................................. 5 業(yè)務(wù)流程圖 .......................................................................................................................................... 5 現(xiàn)行系統(tǒng)存在的主要問題分析 .......................................................................................................... 7 關(guān)鍵技術(shù)及難點(diǎn) ................................................................................................................................. 7 解決方案 ............................................................................................................................................. 7 可行性分析和決策 .............................................................................................................................. 8 第 3 章 系統(tǒng)邏輯方案 ................................................................................................................................ 10 數(shù)據(jù)流圖描述 .................................................................................................................................... 10 信息安全管理系統(tǒng)數(shù)據(jù)流圖的符號說明 ............................................................................... 10 信息安全管理系統(tǒng)關(guān)聯(lián)圖 ....................................................................................................... 10 信息安全管理系統(tǒng) DFD 總體圖 ............................................................................................... 12 信息安全管理系統(tǒng) DFD 零級圖 ............................................................................................... 13 信息安全管理系統(tǒng) DFD 細(xì)節(jié)圖 ..........................................................................................
點(diǎn)擊復(fù)制文檔內(nèi)容
環(huán)評公示相關(guān)推薦
文庫吧 www.dybbs8.com
公安備案圖鄂ICP備17016276號-1