pisco_log
banner

Research on Computer Applications Based on Management of Network Information Security Technology

Xiaofeng Ma, Norriza Hussin

Abstract


With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.


Keywords


Network Information; Security Technology; Management; Computer Application

Full Text:

PDF

Included Database


References


Yu M, Cha Z, Zhan W, et al. Research on the computer applications based on management of network information security technology (in Chinese). Electronics World 2020; (13): 188–189.

Zhan P. Computer applications based on management of network information security technology (in Chinese). Electronics World 2020; (11): 5–6.

Yang S. Computer applications based on management of network information security technology (in Chinese). Computer Products and Circulation 2020; (6): 38.

Mo Z. Research on computer applications under the management of network information security technology (in Chinese). Technology Wind 2017; (11): 99.

Sun M, Cai C. Computer applications based on management of network information security technology (in Chinese). Telecom World 2017; (10): 122.

Wang Z, Chen J, Wang S. On Computer applications based on management of network information security technology (in Chinese). Network Security Technology & Application 2017; (4): 1+6.

Su X, Tang H. Computer applications based on management of network information security technology (in Chinese). PC Fan 2017; (4): 137.

Mao X. On Computer applications based on management of network information security technology (in Chinese). Keji Jingji Shichang 2017; (4): 40–41+107.




DOI: https://doi.org/10.18282/jnt.v2i3.1113

Refbacks

  • There are currently no refbacks.