Page 9 - 大数据背景下计算机信息安全及防护
P. 9
目 录 CONTENTS
第一章 数据资源整合与开发利用 ························································ 1
第一节 数据资源整合理论概述 ······················································ 1
第二节 数据资源体系建设 ···························································· 2
第三节 数据资源开发利用的立法完善············································13
第四节 数据资源开发与利用的发展···············································18
第二章 数据要素治理和应用 ·····························································23
第一节 数据要素政策发展 ···························································23
第二节 数据要素治理现状 ···························································31
第三节 数据要素市场的治理机制··················································42
第四节 数据要素创新发展路径 ·····················································50
第五节 数据要素的应用 ······························································55
第三章 网络信息安全及防护 ·····························································59
第一节 网络信息安全概述 ···························································59
第二节 计算机网络信息特征与安全问题·········································64
第三节 网络信息安全风险预警现状···············································70
第四节 网络信息安全监管的优化··················································81
第四章 大数据安全防护技术 ·····························································89
第一节 大数据安全防护存在的问题与防护策略································89
第二节 大数据安全开放问题与安全保障技术································· 103
第三节 大数据背景下的数据安全治理技术应用······························ 113
第五章 物联网安全防护 ································································· 129
第一节 物联网发展现状与趋势 ··················································· 129
第二节 物联网安全防护需求 ······················································ 137

