Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (1-2): 104-105    DOI:
Current Issue | Archive | Adv Search |
Based on Computer Information Safety Storage and Utilization of the Related Countermeasure Analysis
Lian Huaming
General Administration of Press and Publication, Radio, Film and Television - 751 Station
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the widely used in various fields of the computer technology, computer information security also gradually got the attention of the people, this article will focus on the computer through the analysis of the status quo of information security, in order to decrease the probability of the computer information security problems, improve computer information using the theory of probability and provide reliable reference.
Key wordscomputer information      storage security      effective use of      countermeasures     
Published: 10 November 2017
ZTFLH:  TP309  

Cite this article:

Lian Huaming. Based on Computer Information Safety Storage and Utilization of the Related Countermeasure Analysis. Computer & Telecommunication, 2016, 1(1-2): 104-105.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I1-2/104

[1] FU Fang WU Pei-shan. Analysis and Thinking of the Situation of Intelligent Ambulance Dispatching[J]. 电脑与电信, 2019, 1(6): 8-9.
[2] MA Yan. Application of Fast Switching Device in Multi-Power Supply System[J]. 电脑与电信, 2018, 1(11): 91-93.
[3] Bai Lingyun. Strategy Analysis of Improving Computer Information Management Ability[J]. 电脑与电信, 2016, 1(4): 85-86.
[4] Li Xingzhon. Discussion on the Technology of Computer Information Processing under the Background of Big Data[J]. 电脑与电信, 2016, 1(1-2): 96-98.
[5] Yang Hailan. On the Host Computer Forensics Technology Secret Information[J]. 电脑与电信, 2016, 1(1-2): 109-110.
[6] Yang Ruixian, Chen Yu, Li Haoyu. Survey of Construction Status and Analysis of Development Strategy in EMR ——Taking Henan Province as an Example[J]. 电脑与电信, 2015, 1(5): 79-82.
[7] Wei Yingzhu. Research of University’s Information System in the Process of Building Problems and Countermeasures[J]. , 2011, 1(01): 0-0.
[8] Yang Xiaowei. Study of Credit Evaluation in C2C Electronic Commerce Model[J]. , 2010, 1(01): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd