Page 7 - 大数据时代信息安全及保护
P. 7
CONTENTS
目录
第一章 绪论···················································································· 1
第一节 大数据概述 ····································································· 1
第二节 信息安全的特点 ······························································14
第三节 计算机网络技术的发展 ·····················································18
第二章 大数据时代个人信息安全保护 ·················································41
第一节 网络技术与个人信息安全概述············································41
第二节 大数据时代个人信息安全保护现状······································53
第三节 个人信息安全控制策略 ·····················································66
第三章 计算机信息安全管理 ·····························································77
第一节 计算机网络信息安全问题··················································77
第二节 计算机网络信息安全管理策略············································81
第三节 虚拟专用网络技术的应用··················································85
第四节 大数据技术的应用 ···························································90
第四章 网络安全发展·······································································97
第一节 网络安全技术路径理念发展历程·········································97
第二节 网络安全发展现状及趋势················································ 104
第三节 未来网络信息安全威胁与需求·········································· 110
第五章 大数据背景下的网络安全技术研究 ········································· 115
第一节 网络安全与隐私保护技术研究现状···································· 115
第二节 入侵检测技术 ······························································· 120

