期刊文献+

计算机系统信息的安全保护方法 被引量:4

Safe Protection Method of Computer System Information
下载PDF
导出
摘要 信息系统是以计算机及外部设备为基础,进行信息的收集、传输、存储、加工处理的系统,它的大量应用给人类创造了巨大的财富,同时也成为威胁、攻击和破坏的目标和对象。为了保证计算机系统的安全,必须系统深入地学习和研究计算机系统安全技术与方法。本文给出了一种计算机系统信息的安全保护方法。 With rapid development and extensive application of computer science technology, The security of the computer system has already become the important subject that people very much care about. Nowadays the society is a information society of scientific and technical high development, All human activities are related to information. The information system is based on the computer and outside equipment, carry on the collection , transmission , stored , processed of information, the using in a large amount of it creates the enormous wealth for the mankind, become target threatened , attacked and destroyed at the same time. In order to guarantee the security of the computer system, must study the safe technology and method of the computer system systematically and deeply . This text provides a kind of safe protection method of computer system information.
作者 高永仁
出处 《微计算机应用》 2006年第4期415-418,共4页 Microcomputer Applications
关键词 系统实体 系统信息 信息泄漏 信息破坏 安全保护 System entity, System information, Information let out, Information destroyed, Safe proteetion
  • 相关文献

参考文献4

  • 1Steven Armbrust,Ted Forgeron,王宇译.DOS/BIOS使用详解.北京:电子工业出版社,1989. 被引量:1
  • 2求伯君.深入DOS编程.北京:北京大学出版社,1990. 被引量:1
  • 3沈永耀,陶铮正编著..IBM PC/XT AT长城0520,长城-286磁盘文件管理与加密原理[M],1990:268.
  • 4张焕国等编著..计算机安全保密技术[M].北京:机械工业出版社,1995:235.

同被引文献14

  • 1吉增瑞.如何理解和确定信息系统的安全等级[J].信息网络安全,2005(5):39-40. 被引量:5
  • 2AndreaSTanenbau.计算机网络(第4版)[M].北京:清华大学出版社.2004. 被引量:1
  • 3Lee Byung-Gil,et al. Concatenated wireless roaming security association and authentication protocol using ID-based cryptography. IEEE Vehicular Technology Conference, 57(3):2003,1507-1511. 被引量:1
  • 4Russell Selwyn 等. Virtual Certificates And Synthetic Certificates:New Paradigms for Improving Public Key Validation. Computer Communications, v 26, n 16 SPEC, Oct 15,2003,1826-1838. 被引量:1
  • 5Forne,Jordi等. Web-based Authorization based on X. 509 Privilege Management Infrastructure. IEEE Pacific RIM Conference on Communications, computers, and Signal Processing-Proceedings, v Ⅱ , 2003,565-568. 被引量:1
  • 6Qi ming,Wen ya-min,The Design And Aplication of Credit CA Certificate, Proceedings of the third international conference on E-commerce engineering, 2003,623-626. 被引量:1
  • 7Zhang chang-you, Zhang li-qun, The Security Policy f Ebusiness Based on PKI,Proceedings of the third international conference on E-commerce engineering, 2003,655-659 被引量:1
  • 8方小苹.杀毒软件真能带给我们安全吗[J].科技信息,2011(16):236-236. 被引量:2
  • 9史达伟.十款免费杀毒软件推荐[J].电脑入门,2011(11):55-58. 被引量:1
  • 10彭政,罗永健,雷红霞.内网信息安全策略与技术研究[J].电信快报(网络与通信),2012(2):15-17. 被引量:5

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部