Page 12 - 计算机应用软件开发技术研究
P. 12

目录 CONTENTS





                   第四节  聚类的研究 ·································································· 159

                   第五节  智能信息处理 ······························································· 163
               第六章  计算机网络安全动态评估关键技术研究 ··································· 167

                   第一节  网络安全动态风险评估框架············································· 167
                   第二节  基于深度学习的风险识别模型研究···································· 175

                   第三节  基于漏洞类型的层次化漏洞修复研究································· 184
               第七章  企业网络安全风险的解决方案研究 ········································· 191

                   第一节  相关理论与策略 ···························································· 191

                   第二节  企业网络和安全需求分析················································ 201
                   第三节  企业网络安全解决方案研究与设计···································· 207

                   第四节  企业的云安全 ······························································· 220
               第八章  大数据下博物馆信息化研究 ·················································· 233

                   第一节  相关理论 ····································································· 233
                   第二节  文物藏品的信息化与博物馆的发展···································· 240

                   第三节  数字博物馆资源的分类 ··················································· 248

                   第四节  数字博物馆体系结构研究················································ 254
               参考文献······················································································· 257
   7   8   9   10   11   12   13   14   15   16   17