A Corporate Computer Network Security System Design and Implementation

Article Preview

Abstract:

With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1044-1045)

Pages:

965-967

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yu Zhixin. Enterprise network security risk analysis and reliability of the design and implementation [D]. Jilin University, (2013).

Google Scholar

[2] Liu Min. The design and implementation of enterprise network security systems [J]. Heilongjiang Science and Technology Information, 2008 (10).

Google Scholar

[3] Han Huilian, Xu Li, Gong Qingyong, Dai Xiujiao. Design and implementation of computer network security solutions based on enterprise [J]. North China Institute of Technology, 2005 (03).

Google Scholar

[4] Song Guohua. Certain corporate computer network security system design and implementation [D] University of Electronic Science and Technology, (2012).

Google Scholar