首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
教育   2篇
科学研究   6篇
  2013年   1篇
  2011年   1篇
  2010年   2篇
  2009年   1篇
  2008年   1篇
  2004年   1篇
  1997年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
随着计算机技术的飞速发展,信息网络已经对社会发展产生重要影响。信息网络已涉及国家的政府、军事、科技、文教等多个领域,其中存储和加工处理的信息非常重要。  相似文献   
2.
浅析办公系统中的信息安全   总被引:1,自引:0,他引:1  
吴翔 《科技广场》2011,(11):72-74
办公自动化系统是源于上世纪六七十年代发展起来的一门综合性技术系统,该系统不但能充分利用各种信息资源,服务于办公室里的办公人员,而且能够促进办公活动的制度化和规范化。尽管办公自动化系统有操作方便、快捷等各个方面的优点,但在网络办公时,由于网络中存在着信息泄露、非授权访问、破坏数据完整性、拒绝服务攻击、病毒和木马等许多不安全的因素,这使得办公系统中的信息和文件不能得到有效的安全管理和传输,甚至会出现机密泄露、系统瘫痪、设备损坏等严重后果,造成极大的负面影响。因此,保证办公系统中的信息安全已经成为现代网络办公自动化应用中最为关注的话题。本文通过分析办公自动化系统在网络中常见的安全问题以及针对这些安全问题提出有效的解决方案。  相似文献   
3.
随着计算机技术的飞速发展,信息网络已经对社会发展产生重要影响。信息网络已涉及国家的政府、军事、科技、文教等多个领域,其中存储和加工处理的信息非常重要。  相似文献   
4.
Abstract

The dangers to life and property resulting from various toxic releases are a matter of rising concern throughout the United States. Whether the focal problem is centered on “dump sites” or the often more spectacular hazardous waste incidents involving tanker truck explosions or manufacturing plant plumes, there is an acknowledged need for an orchestrated program of information collection, processing, and analysis from which can come the products and services useful to the emergency management community. Both public and private entities have assumed action responsibilities in this realm, and are seeking ways to achieve optimum collaborative results.  相似文献   
5.
This article argues that the hacker is constructed as an information deviant and that this image is helpful in providing rules for appropriate behavior in an information society. The hacker accounts in this article are designed to give the reader an understanding of the types of things being said about hackers. What is more important, however, is how these narratives are used to support a specific notion of property ownership and government secrecy. In making this argument, this article traces the development of the narrative about the hacker from harmless computer nerd to terrorist.  相似文献   
6.
随着计算机网络的发展,网络安全问题越来越重要。信息处理能力的提高,使得网络系统的连结能力也在不断地提高,但在连结、流通能力提高的同时,基于网络连接的安全问题也日益凸显。  相似文献   
7.
黑客问题已成为网络空间中一个严重而复杂的社会问题。黑客崇尚自由精神,具有反权威意识、英雄主义和信息崇拜的特征,其价值观是多元的。黑客评价主体的多样性、行为的庞杂性、影响的多重性及其历史演变造成了对其评价的复杂性。充分认识黑客问题的复杂性,对有效解决黑客问题,确保网络安全具有重要的现实价值。确立划分黑客行为的合理标准,采取综合的手段预防和打击黑客攻击,招安黑客胜于消灭黑客。  相似文献   
8.
This paper will explore how the often illegal activities of hackers (employed in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. The paper argues that structural changes, including a growth in the number of knowledge workers, has resulted in a burgeoning community of users able to modify or hack existing products, or develop products that compete with existing suppliers. The paper will introduce the complementary concepts of Outlaw Innovation and the Outlaw User, locating them within the literature on users. The paper will explore how firms react to this activity and provide case studies of this phenomenon. The paper will argue that Outlaw Innovation represents an extension in our understanding of the way in which firms interact with users, presents a series of policy challenges, and opens a promising area for further research. A series of possible research questions will be outlined and the paper will conclude by indicating the next steps in the development of this line of enquiry.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号