首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4篇
  免费   0篇
教育   4篇
  2019年   1篇
  2014年   1篇
  2007年   1篇
  2003年   1篇
排序方式: 共有4条查询结果,搜索用时 15 毫秒
1
1.
校园网安全策略的探讨   总被引:5,自引:0,他引:5  
随着校园网应用的深入,各种各样的安全问题激剧增加,应引起人们高度重视。本文指出校园网安全问题的表现形式并就校园网安全管理的策略进行探讨。  相似文献   
2.
ABSTRACT

This paper explores relationships between knowledge production and academic publication and shows that the current political economy of mainstream academic publishing has resulted from a complex interplay between large academic publishers, academics, and hacker-activists. The process of publishing is a form of ‘social production’ that takes place across the economy, politics and culture, all of which are in turn accommodating both old and new technology in our postdigital age. Technologies such as software cannot be separated from human labour, academic centres cannot be looked at in isolation from their margins, and the necessity of transdisciplinary approaches does not imply the disappearance of traditional disciplines. In the postdigital age, the concept of the margins has not disappeared, but it has become somewhat marginal in its own right. We need to develop a new language of describing what we mean by ‘marginal voices’ in the social relations between knowledge production and academic publication. Universities require new strategies for cohabitation of, and collaboration between, various socio-technological actors, and new postdigital politics and practice of knowledge production and academic publishing.  相似文献   
3.
SQL注入是一种攻击安全漏洞,相比与其它攻击,SQL注入攻击可以获得一些敏感的信息或者控制整个服务器.因为攻击者将SQL语句通过Web应用程序输入域隐藏的参数来获得资源或更改数据.防御SQL注入是防止电子邮件黑客和其效率只有80%左右的有效方法.  相似文献   
4.
网络隐私权是隐私权在网络环境下的延伸。由于某些网络主体在“网络社会”中的地位或职能比较特殊,使得他们的行为与公民的网络隐私权息息相关。这类主体常见的主要有:某些政府机关、ISP、某些硬件或软件开发商、其他组织以及网络黑客等。因此我们要明确各类网络主体的权利和义务,以更好的保护公民的网络隐私权,尽可能的避免网络隐私侵权行为的发生。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号