Computer Network Security Strategy Research

Article Preview

Abstract:

Internet technology in the life to people bring convenient while, also is facing increasingly serious security threat from the network, many invaders one thousand ways to want to "see" to some concerned data or information, computer network information security is more and more attention. This article, from the perspective of the system vulnerability and network own existence safe hidden trouble, put forward to realize protection methods and strategies of network security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1457-1460

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Have good dreams, have good dreams. Based on the access layer of the network security solution study [J]. Microcomputer information, 2007, 10 - then 2-(2007).

Google Scholar

[2] (eds) Wu Shizhong Ma Fang. The truth of the network information security [M]. Mechanical industry publishing house, 2001-9-1.

Google Scholar

[3] (beauty) Kevin Mandia, Chris Prosise. The Incident Response: Investigating Computer Crime. The Mcgraw - Hill Press, 2002-10-1.

Google Scholar

[4] Jiang Xiaoyun. Enterprises in the construction of information network security discussion [J]. Microcomputer information, 2007, 8 - "9-71.

Google Scholar