人人范文网 范文大全

信息检索实习报告

发布时间:2020-03-02 16:31:51 来源:范文大全 收藏本文 下载本文 手机版

题目:计算机网络安全

1.课题分析:

随着计算机的普及,网络应用越来越广泛,计算机网络的有利方面越来越被大家认可:网络的开放性,即时性,国际性,自由性等。但是计算机网络存在的隐患也着实令人堪忧,随着一个个杀毒软件的开发,系统补丁的一个个发布,也可以说明计算机网络的安全问题也被越来越多的人们所关注。计算机网络安全的重要性和维护方法应该被更多的人知道。

2.选择数据库:

《同方中国知网(CNKI)》、《维普中文科技期刊系统》、《EI Village 2》和《EBSCO》

3.检索途径:

由于此题目言简意赅,所以直接搜索主题为计算机网络安全的文献即可,英文数据库则搜索:computer network security。

4.检索内容:

(1)《同方中国知网(CNKI)》

SrcDatabase-来源库:CJFD2010

Title-题名:计算机网络安全技术探析

Author-作者:龚伏廷;

Organ-单位:湖北生物科技职业学院;

Source-文献来源:电脑知识与技术

Keyword-关键词:计算机;;网络安全技术;;探析

Summary-摘要:如今,计算机网络的应用已延伸到全球的各个角落和领域,正在对人们的工作、生活产生前所未有的影响,如同电力、交通一样日益成为人们生活中不可缺少的组成部分。计算机网络安全即通过采用各种技术和管理措施,使网络系统正常运行,从而确保网络数据的可用性、完整性和保密性。所以,建立网络安全保护措施的目的是确保经过网络传输和交换的数据,不会发生增加、修改、丢失和泄露等。该文首先阐述了计算机网络安全的主要威胁及隐患。其次,分析了计算机网络安全的特性。同时,从建立网络管理平台;使用高安全级别的操作系统;限制系统功能;身份认证;认证:CA等方面就如何完善计算机网络安全技术提出了自己的建议和看法,具有一定的参考价值。

PubTime-发表时间:2010-05-25

Year-年:2010

Period-期:15

PageCount-页码:3922-392

5SrcDatabase-来源库:CJFD2008

Title-题名:计算机网络安全探讨

Author-作者:马桂云;

Organ-单位:河南省电子产品质量监督检验所 河南郑州450002

Source-文献来源:光盘技术

Keyword-关键词:计算机网络安全;;网络安全分析;;Internet防火墙

Summary-摘要:进入21世纪以来,网络信息交流现已经成为生活中必不可少的一个环节,它涉及国防、电信、银行、广播等多个方面,其安全性是不容忽视的。如果安全性不好,会给人们带来很多麻烦,所以我们要认识网络安全,增强网络安全意识。本文从计算机网络安全含义、网络安全分析、特征、主要威胁、措施等方面进行了探讨。

PubTime-发表时间:2008-01-08

Year-年:2008

Period-期:01

PageCount-页码:30-32

(2)《维普中文科技期刊系统》

1/2

【题 名】计算机网络安全研究

【作 者】金晓倩 王军

【机 构】四川建筑职业技术学院宣传部保卫处,618000

【刊 名】科学与财富.2010(8).-17-17

【ISSN号】1671-2226

【C N 号】51-1627/N

【馆藏号】84137X

【关键词】计算机 网络安全 防火墙 数据保密

【分类号】TP393.08

【文 摘】计算机网络的安全是当前计算机网络的主要话题之一,本文笔者首先分析了计算网络容易受到的威胁,然后详细的阐述了保证计算机网络安全所应采用的措施。

【网 址】HTTP://WWW.CQVIP.COM/QK/84137X/201008/35016003.html

2/2

【题 名】计算机网络安全分析及防范对策

【作 者】李晶 李燕 陈萍

【机 构】69050部队,新疆沙湾832100

【刊 名】中国电子商务.2010(6).-383-383

【ISSN号】1009-4067

【C N 号】11-4440/F

【馆藏号】81625X

【关键词】计算机 网络安全 防范 对策

【分类号】TP39

【文 摘】随着网络技术的飞速发展,Internet成为人们生活中必不可少的部分,与此同时,网络安全问题也日益凸显。本文分析了当前影响计算机网络安全的主要因素,并对网络安全提出了一些有效的防范措施。

【网 址】HTTP://WWW.CQVIP.COM/QK/81625X/201006/34762524.html

(3)《EI Village 2》

1.

Acceion number:1987040053584

Title:SURVEY OF ISSUES IN COMPUTER NETWORK SECURITY.

Authors:Rutledge, Linda S.1

Author affiliation:1IBM, Gaithersburg, MD, USA, IBM, Gaithersburg, MD, USACorresponding author:Rutledge, Linda S.

Source title:Computers and Security

Abbreviated source title:Comput Secur

Volume:5

Iue:4

Iue date:Dec 1986

Publication year:1986

Pages:296-308

Language:English

ISSN:01674048

CODEN:CPSEDU

Document type:Journal article (JA)

Abstract:Computer networks are proliferating rapidly for a number of reasons discued in this paper.During this boom, relatively little attention has been paid to computer network security.This paper describes problems posed by network security and presents a survey of methods and technologies available today to enhance network security.Current methods are discued, including information security strategy, computer security and its relation to network security, data communications security, and data encryption.Ideas from promising areas of research close the paper.

Number of references:47

Main heading:COMPUTER NETWORKS

Controlled terms:CRYPTOGRAPHY

Uncontrolled terms:COMMUNICATIONS SECURITY-COMPUTER NETWORK SECURITY-END-TO-END ENCRYPTION-LINK ENCRYPTION

Claification code:723 Computer Software, Data Handling and Applications

DOI:10.1016/0167-4048(86)90050-7

Database:Compendex

Compilation and indexing terms, © 2010 Elsevier Inc.

2.

Acceion number:2008321143973

Title:Computer network security strategy for coordinated distribution system operations

Authors:Cheung, Helen1 ; Hamlyn, Alexander1 ; Wang, Lin1 ; Yang, Cungang1 ; Cheung, Richard1

Author affiliation:1Ryerson University, Canada

Corresponding author:Cheung, H.(hcheung@eeryerson.ca)

Source title:LESCOPE\'07Large Eng.Syst.Conf.Power Eng.

Monograph title:2007 Large Engineering Systems Conference on Power Engineering, LESCOPE\'07

Iue date:2007

Publication year:2007

Pages:279-283

Article number:4437393

Language:English

ISBN-13:9781424415830

Document type:Conference article (CA)

Conference name:2007 Large Engineering Systems Conference on Power Engineering, LESCOPE\'07

Conference date:October 10, 2007P.O.Box 1331, Piscataway, NJ 08855-1331, United States

Abstract:Cyber-security for computer networks has become a fairly serious concern for electricity utilities due to recent deregulations and distributed generations (DGs) launched in the power system.This paper proposes a new computer network security strategy for coordinated distribution system operations with open acce electricity generations.A novel utility computer network security management and authentication for action or command requests in power-grid operations is presented.It covers security management for multiple security domains in the recently developed power-grid network security architecture.This paper illustrates the significance of the proposed strategy and procedure of security checks and authentications for action or command requests for operations in both host area electric power system (AEPS) and interconnected multiple foreign AEPS.

Number of references:7

Main heading:Network management

Controlled terms:Acce control-Administrative data proceing-Authentication-Computer networks-Computers-Electric generators-Electric inverters-Electric power distribution-Electric power systems-Electric power transmiion networks-Industrial management-Internet-Local area networks-Management information systems-Metropolitan area networks-Network security-Power generation-Power transmiion-Security of data-Sound recording

Uncontrolled terms:Computer network management-Computer network security-Coordination-Microgrids-Power grids security-Power system communication-Power system security

Claification code:716 Telecommunication; Radar, Radio and Television-717 Optical Communication-717.1 Optical Communication Systems-718 Telephone Systems and Related Technologies; Line Communications-912.2 Management-722 Computer Systems and Equipment-723 Computer Software, Data Handling and Applications-723.2 Data Proceing and Image Proceing-752.2 Sound Recording-722.3 Data Communication, Equipment and Techniques-713.5 Electronic Circuits Other Than Amplifiers, Oscillators, Modulators, Limiters, Discriminators or Mixers-706.1.2 Electric Power Distribution-402.2 Public Buildings-602.2 Mechanical Transmiions-703.1 Electric Networks-704.2 Electric Equipment-705.2 Electric Generators-706

Electric Transmiion and Distribution-706.1 Electric Power Systems-706.1.1 Electric Power Transmiion

DOI:10.1109/LESCPE.2007.4437393

Database:Compendex

Compilation and indexing terms, © 2010 Elsevier Inc.

(4)《EBSCO》

记录: 1

标题:Computer Network Security and Cyber Ethics.

作者:Cervone, H.Frank1 f-cervone@northwestern.edu

来源:portal: Libraries & the Academy; Apr2007, Vol.7 Iue 2, p249-250, 2p

文献类型:Book Review

主题语:*BOOKS -- Reviews

*COMPUTER security

*NONFICTION

评论和产品:COMPUTER Network Security & Cyber Ethics (Book)

人物:KIZZA, Joseph Migga

摘要:The article reviews the book \"Computer Network Security and Cyber Ethics,\" by Joseph Migga Kizza.

作者单位:1Northwestern UniversityISSN:15312542

入藏编号:24812218

记录: 2

标题:Computer Network Security for Schools.

作者:King, Larry

来源:Media & Methods; Mar/Apr2004, Vol.40 Iue 5, p13-13, 1p, 1 Black and White Photograph

文献类型:Article

主题语:*COMPUTER security

*SCHOOLS

*COMPUTER viruses

*COMPUTER networks -- Security measures

*COMPUTERS -- Acce control -- PawordsNAICS/Industry Codes611699 All Other Miscellaneous Schools and Instruction

611110 Elementary and Secondary Schools

摘要:The article offers ideas on addreing computer security iues in schools.School network administrators deal with computer virus problems and numerous other computer attacks on a daily basis.When a computer is infected by a backdoor Trojan Horse, a hacker has acce to the computer from somewhere else on the Internet.There are numerous software and hardware options to protect the network.Network routers and switches can be configured to filter out unwanted communications.Most Acceptable Use Policies contain a statement addreing

educational use of district-owned computers.Create secure pawords that include keyboard characters such as &, numbers and letters.Paword is very important and must be treated as if it were the personal identification number of the automated teller machine card.Remember to log off.If one is logged onto a computer or network using a personal user identification and paword, log off prior to walking away.If one failed to log off, the next user on that computer can acce the previous user\'s files.

全文字数:480ISSN:00256897

入藏编号:13466614

信息检索实习报告

信息检索实习报告

信息检索实习报告

信息检索实习

信息检索实习

信息检索综合实习报告

文献信息检索实习报告

信息检索综合实习报告

信息检索课程实习报告

文献信息检索实习报告

信息检索实习报告
《信息检索实习报告.doc》
将本文的Word文档下载到电脑,方便编辑。
推荐度:
点击下载文档
点击下载本文文档