【正文】
工作、生活產(chǎn)生前所未有的影響,如同電力、交通一樣日益成為人們生活中不可缺少的組成部分。Source文獻(xiàn)來(lái)源:電腦知識(shí)與技術(shù)Keyword關(guān)鍵詞:計(jì)算機(jī)。:(1)《同方中國(guó)知網(wǎng)(CNKI)》SrcDatabase來(lái)源庫(kù):CJFD2010Title題名:計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)探析Author作者:龔伏廷。計(jì)算機(jī)網(wǎng)絡(luò)安全的重要性和維護(hù)方法應(yīng)該被更多的人知道。第一篇:信息檢索實(shí)習(xí)報(bào)告題目:計(jì)算機(jī)網(wǎng)絡(luò)安全:隨著計(jì)算機(jī)的普及,網(wǎng)絡(luò)應(yīng)用越來(lái)越廣泛,計(jì)算機(jī)網(wǎng)絡(luò)的有利方面越來(lái)越被大家認(rèn)可:網(wǎng)絡(luò)的開放性,即時(shí)性,國(guó)際性,自由性等。但是計(jì)算機(jī)網(wǎng)絡(luò)存在的隱患也著實(shí)令人堪憂,隨著一個(gè)個(gè)殺毒軟件的開發(fā),系統(tǒng)補(bǔ)丁的一個(gè)個(gè)發(fā)布,也可以說(shuō)明計(jì)算機(jī)網(wǎng)絡(luò)的安全問題也被越來(lái)越多的人們所關(guān)注。:《同方中國(guó)知網(wǎng)(CNKI)》、《維普中文科技期刊系統(tǒng)》、《EI Village 2》和《EBSCO》:由于此題目言簡(jiǎn)意賅,所以直接搜索主題為計(jì)算機(jī)網(wǎng)絡(luò)安全的文獻(xiàn)即可,英文數(shù)據(jù)庫(kù)則搜索:puter network security。Organ單位:湖北生物科技職業(yè)學(xué)院。網(wǎng)絡(luò)安全技術(shù)。計(jì)算機(jī)網(wǎng)絡(luò)安全即通過采用各種技術(shù)和管理措施,使網(wǎng)絡(luò)系統(tǒng)正常運(yùn)行,從而確保網(wǎng)絡(luò)數(shù)據(jù)的可用性、完整性和保密性。該文首先闡述了計(jì)算機(jī)網(wǎng)絡(luò)安全的主要威脅及隱患。同時(shí),從建立網(wǎng)絡(luò)管理平臺(tái)。限制系統(tǒng)功能。認(rèn)證:CA等方面就如何完善計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)提出了自己的建議和看法,具有一定的參考價(jià)值。Organ單位:河南省電子產(chǎn)品質(zhì)量監(jiān)督檢驗(yàn)所 河南鄭州450002Source文獻(xiàn)來(lái)源:光盤技術(shù)Keyword關(guān)鍵詞:計(jì)算機(jī)網(wǎng)絡(luò)安全。Internet防火墻Summary摘要:進(jìn)入21世紀(jì)以來(lái),網(wǎng)絡(luò)信息交流現(xiàn)已經(jīng)成為生活中必不可少的一個(gè)環(huán)節(jié),它涉及國(guó)防、電信、銀行、廣播等多個(gè)方面,其安全性是不容忽視的。本文從計(jì)算機(jī)網(wǎng)絡(luò)安全含義、網(wǎng)絡(luò)安全分析、特征、主要威脅、措施等方面進(jìn)行了探討?!揪W(wǎng) 址】HTTP://2/2【題 名】計(jì)算機(jī)網(wǎng)絡(luò)安全分析及防范對(duì)策【作 者】李晶 李燕 陳萍【機(jī) 構(gòu)】69050部隊(duì),新疆沙灣832100【刊 名】(6).383383【ISSN號(hào)】10094067【C N 號(hào)】114440/F【館藏號(hào)】81625X【關(guān)鍵詞】計(jì)算機(jī) 網(wǎng)絡(luò)安全 防范 對(duì)策【分類號(hào)】TP39【文 摘】隨著網(wǎng)絡(luò)技術(shù)的飛速發(fā)展,Internet成為人們生活中必不可少的部分,與此同時(shí),網(wǎng)絡(luò)安全問題也日益凸顯?!揪W(wǎng) 址】HTTP://(3)《EI Village 2》 number:1987040053584Title:SURVEY OF ISSUES IN COMPUTER NETWORK :Rutledge, Linda Author affiliation:1IBM, Gaithersburg, MD, USA, IBM, Gaithersburg, MD, USACorresponding author:Rutledge, Linda title:Computers and SecurityAbbreviated source title:Comput SecurVolume:5Issue:4Issue date:Dec 1986Publication year:1986Pages:296308Language:EnglishISSN:01674048CODEN:CPSEDUDocument type:Journal article(JA)Abstract:Computer networks are proliferating rapidly for a number of reasons discussed in this this boom, relatively little attention has been paid to puter network paper describes problems posed by network security and presents a survey of methods and technologies available today to enhance network methods are discussed, including information security strategy, puter security and its relation to network security, data munications security, and data from promising areas of research close the of references:47Main heading:COMPUTER NETWORKSControlled terms:CRYPTOGRAPHYUncontrolled terms:COMMUNICATIONS SECURITYCOMPUTER NETWORK SECURITYENDTOEND ENCRYPTIONLINK ENCRYPTIONClassification code:723 Computer Software, Data Handling and ApplicationsDOI:(86)900507Database:CompendexCompilation and indexing terms, 169。Hamlyn, Alexander1。Yang, Cungang1。07Large title:2007 Large Engineering Systems Conference on Power Engineering, LESCOPE39。07Conference date:October 10, 1331, Piscatawa