检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:刘仕云[1] 宋海波[1] Liu Shiyun;Song Haibo(Department of Public Courses,Qiannan Medical College For Nationalities,Duyun 558000,China)
出 处:《无线互联科技》2019年第21期126-127,共2页Wireless Internet Technology
摘 要:自20世纪末以来,无线通信技术-无线宽带、P2P等的大范围普及和应用,推动了信息化进程的发展,人们也从简单的Web1.0时代迈进了Web2.0时代。在Web2.0时代中,每个人都是信息的发现、创造、分享者,同时也是信息的接受者。因此,数据信息规模也成指数倍增长-大数据时代自然而然地来临了。但互联网技术的发展过程中暴露出来了很多安全问题,给了不法分子可乘之机。因此,发现、分析该类问题对开发良好的网络安全管理工具、制定优化策略、提升计算机网络安全管理业务的综合质量有着不容忽视的作用。文章对此展开了分析。Since the end of the 20 th century, the wide popularization and application of wireless communication technologies, such as wireless broadband and P2P, have promoted the development of information technology. People have also moved from the simple Web1.0 era to the Web2.0 era. In the Web2.0 era, everyone is the discovery, creator and sharing of information, as well as the recipient of information. As a result, the scale of its data and information has also increased exponential-the big data era has naturally come. However, the development of Internet technology has also exposed a lot of security problems, giving lawbreakers a chance to take advantage of it. Therefore, finging and analyzing this kind of problems plays an important role in developing good network security management tools and optimizing strategies, and improving the comprehensive quality of computer network security management services. This paper analyzes this.
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3