Construction of Information Security System of Power Generation Enterprise
In order to meet the current demands of building information security, while ensuring existing business systems available, based on information technology to achieve the goal of building security system, the existing network deployment structure system access mode, user habits of Guodian Chengdu Jin...
Saved in:
Main Author: | Ying Yu |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-01-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.01.023/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Mobile office system oriented to intelligent terminal
by: Boxuan LV, et al.
Published: (2018-02-01) -
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
by: XU Shujiang, et al.
Published: (2024-04-01) -
Secure software development: leveraging application call graphs to detect security vulnerabilities
by: Lei Yan, et al.
Published: (2025-01-01) -
IBEXSec:a universal security framework for industrial internet terminal access
by: Yuan CHEN, et al.
Published: (2020-03-01) -
Perception technology of virtual threat for large enterprise's information security construction
by: Ying XU, et al.
Published: (2016-12-01)