freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

c基于局域網(wǎng)linux環(huán)境下的心跳檢測系統(tǒng)實(shí)現(xiàn)(doc畢業(yè)設(shè)計(jì)論文)-資料下載頁

2025-06-28 07:57本頁面
  

【正文】 不僅浪費(fèi)了網(wǎng)絡(luò)和主機(jī)資源,而且協(xié)議也缺乏健壯性,需要進(jìn)一步改進(jìn)。 我相信,在深入學(xué)習(xí)心跳檢測相關(guān)的技術(shù)之后,我可以完成一個(gè)功能更強(qiáng)大,程序更健壯的心跳檢測系統(tǒng)。 致 謝 至此,我的畢業(yè)設(shè)計(jì)結(jié)束了,在這一個(gè)多月里,我得到了很多人的關(guān)懷,在這里我要意義表示感謝。 首先,我要感謝我的畢業(yè)設(shè)計(jì)指導(dǎo)老師——易芝老師,我之前并沒有接觸過心跳檢測系統(tǒng),是她給我介紹了相關(guān)的理論并給我詳細(xì)的講解,我才能著手開始做這個(gè)設(shè)計(jì)。在后期論文的撰寫中,她也是細(xì)心給我指導(dǎo),詳細(xì)給我指出了論文中的不足,并指導(dǎo)我修改,付出了大量的心血。 其次,我要感謝我的父母,我在設(shè)計(jì)過程中有過灰心,是他們打電話鼓勵(lì)我,給我戰(zhàn)勝困難的勇氣,讓我跌倒了重新站起來,一步步走向最后。 再次,要感謝林業(yè)貴,章祥,陳龍等同學(xué),他們給我介紹了Linux下的網(wǎng)絡(luò)編程,并幫我調(diào)試程序。寫論文中,又給我介紹ROSE、VISIO等工具的使用。 最后,還要向參加論文審閱、答辯的專家和老師表示感謝!你們辛苦了!向所有關(guān)心我和幫助我的人表示誠摯的謝意! 參考文獻(xiàn)[1]陳虎, 吳濤. 嵌入式系統(tǒng)課程設(shè)計(jì) [M]. 北京: 機(jī)械工業(yè)出版社, 2005.[2] 謝長生;胡慶平;譚志虎.“ HeartbeatGear:一種新型的實(shí)時(shí)心跳檢測技術(shù)[J]”. 計(jì)算機(jī)工程與科學(xué),2004年 26期 :6265頁.[3]GCC百科 . [4] Neil Matthew,Richard Stones. Beginning Linux Programming [M]. 北京:人民郵電出版社, 2007.[5]TCP檢測 . [6] Peter Baer Galvin, Greg Gagne. Operating System Concepts[M]. 北京: 高等教育出版社2008.[7] Stevens. Unix環(huán)境高級編程(第二版) [M]. 北京: 人民郵電出版社, 2004.[8] 葉樹華, 高志紅. 網(wǎng)絡(luò)編程實(shí)用教程 [M]. 北京: 人民郵電出版社, 2006.[9] Alan Wood.Availability Modeling[J].IEEE Circuits and DevicesMagazine,1994。10(3):22—27.[10] Stevens. Unix網(wǎng)絡(luò)編程(第一卷) [J]. 北京:機(jī)械工業(yè)出版社,2007.[11] Stevens. Tcp/Ip詳解(第一卷) [D]. 北京:機(jī)械工業(yè)出版社, 2007.[12] Stevens. Tcp/Ip詳解(第二卷) [D]. 北京:機(jī)械工業(yè)出版社, 2007.[13] 吳書華 . KylinOS 可靠心跳協(xié)議研究 . 長沙:國防科學(xué)技術(shù)大學(xué),2008.[14] 謝長生;胡慶平;譚志虎.“ HeartbeatGear:一種新型的實(shí)時(shí)心跳檢測技術(shù)[J]”. 計(jì)算機(jī)工程與科學(xué),2004年 26期 :6265頁.[15] 熊盛武。 王魯。 楊婕。“構(gòu)建高性能集群計(jì)算機(jī)系統(tǒng)的關(guān)鍵技術(shù)”. 微計(jì)算機(jī)信息,2006年 03期:8688頁. 附 錄一、英文原文Computer network security and to guard againstIn the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the position of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both plement each other, are indispensable. First, the concept of puter network security International Organization for Standardization of puter security is defined as: To establish a data processing system and the adoption of technology and management of security protection, the protection of puter hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage. The above definition of puter security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user39。s point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery。 and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network munications, and maintain the continuity of network munications. In essence, the network security, including the position of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides plement each other, are indispensable. Manmade network intrusion and attacks makes network security is facing new challenges. Second, puter network security status quo Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the plexity and diversity, makes puter and network security has bee a need to continue to update and improve the area. At present, hackers method has been more than the type of puter virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack puter systems and resulting in network paralysis. Worms, backdoor (Backdoors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today bee worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internetbased protocols and operating system level. From the Web process control procedures to the kernellevel Rootlets. Hackers practices escalating renovation, to the user39。s ability to guard against information security challenge. Third, puter network security precautions to strengthen the internal network management and the use of safety awareness among staff, many puter systems monly used passwords to control access to system resources, which is antivirus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources. On the network, software installa
點(diǎn)擊復(fù)制文檔內(nèi)容
電大資料相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1