Based on the principle of new barrel theory, this paper probed into the digital library, strengthen the network security protection measures.
文章根据新木桶理论的原理,探讨了加强数字图书馆网络安全防护的措施。
In the field of network security communications, the applications of chaos theory have already stridden forward to the practical stage.
混沌理论在网络保密通信领域中的应用已经向着实用化阶段迈进。
Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.
主要研究方向:计算机网络与信息安全理论与技术、并行计算等。
The authors used the comparatively mature evaluating theory of Delphi to carefully screen out the security evaluating indexes and established a comprehensive network security evaluating index system.
采用评价理论中较为成熟的德尔非法对安全评价指标进行了仔细筛选,建立了网络安全综合评价指标体系。
The traditional passive defense can not meet the current security situation, so proactive network security test and evaluation theory emerges as The Times require.
传统的被动防护已不能适应当前的安全形势,主动性网络安全检测评估理论应运而生。
As one of the backbone courses for Network and Information security major, the course of database and security comprises database theory and technology, database security.
《数据库与安全》是计算机学院网络与信息安全专业的主干课之一,由数据库理论与技术和数据库安全两个方面构成。
In this paper, the basic concept and theory of access-list is detailedly discussed. Finally, the solution of network security is given.
文章就访问表的基本概念及工作原理进行了探讨,最后给出了基于访问表的各种安全控制策略及实现方案。
This paper works out with a new method of network security assessment based on Bayesian privilege graph which is a combination of graph theory and probability.
本文在上述几类网络安全评估方法的基础之上,结合图论以及概率学的知识,提出了基于贝叶斯网权限图的网络安全评估方法。
This paper works out with a new method of network security assessment based on Bayesian privilege graph which is a combination of graph theory and probability.
本文在上述几类网络安全评估方法的基础之上,结合图论以及概率学的知识,提出了基于贝叶斯网权限图的网络安全评估方法。
应用推荐