Research on Computer Wireless Network and Information Security

Article Preview

Abstract:

with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1450-1453

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] ISO/IEC 15408-1: 2009, Information Technology -Security Techniques - Evaluation Criteria for IT Security[S].

Google Scholar

[2] HUANG Song. Information on Non-traditional Security Thinking[J]. Computer Knowledge and Technology. 2012. 1(03)541-543.

Google Scholar

[3] Liu Jin-xia. Computer Network Information Security Problems and Countermeasures[J]. Information Security and Technology. 2012. 2:13-16.

Google Scholar

[4] ZHOU Huansheng,JIANG Jianhui. A multidimensional security index system and quantitative level protection model[J]. JOURNAL OF UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA. 2012. 1:67-77.

Google Scholar

[5] Yan Qiang, Chen Zhong, Duan Yunsuo, et al. Information system security metrics and evaluation model [J]. Acta Electronica Sinica, 2003, 31 (9): 1 351-1 355.

Google Scholar