Page 9 - 大数据背景下计算机信息安全及防护
P. 9

目 录           CONTENTS








                第一章 数据资源整合与开发利用 ························································ 1
                    第一节 数据资源整合理论概述 ······················································ 1

                    第二节 数据资源体系建设 ···························································· 2
                    第三节 数据资源开发利用的立法完善············································13

                    第四节 数据资源开发与利用的发展···············································18
                第二章 数据要素治理和应用 ·····························································23

                    第一节 数据要素政策发展 ···························································23

                    第二节 数据要素治理现状 ···························································31
                    第三节 数据要素市场的治理机制··················································42

                    第四节 数据要素创新发展路径 ·····················································50
                    第五节 数据要素的应用 ······························································55

                第三章 网络信息安全及防护 ·····························································59
                    第一节 网络信息安全概述 ···························································59

                    第二节 计算机网络信息特征与安全问题·········································64
                    第三节 网络信息安全风险预警现状···············································70

                    第四节 网络信息安全监管的优化··················································81
                第四章 大数据安全防护技术 ·····························································89

                    第一节 大数据安全防护存在的问题与防护策略································89

                    第二节 大数据安全开放问题与安全保障技术································· 103
                    第三节 大数据背景下的数据安全治理技术应用······························ 113

                第五章 物联网安全防护 ································································· 129
                    第一节 物联网发展现状与趋势 ··················································· 129

                    第二节 物联网安全防护需求 ······················································ 137
   4   5   6   7   8   9   10   11   12   13   14