Page 12 - 计算机应用软件开发技术研究
P. 12
目录 CONTENTS
第四节 聚类的研究 ·································································· 159
第五节 智能信息处理 ······························································· 163
第六章 计算机网络安全动态评估关键技术研究 ··································· 167
第一节 网络安全动态风险评估框架············································· 167
第二节 基于深度学习的风险识别模型研究···································· 175
第三节 基于漏洞类型的层次化漏洞修复研究································· 184
第七章 企业网络安全风险的解决方案研究 ········································· 191
第一节 相关理论与策略 ···························································· 191
第二节 企业网络和安全需求分析················································ 201
第三节 企业网络安全解决方案研究与设计···································· 207
第四节 企业的云安全 ······························································· 220
第八章 大数据下博物馆信息化研究 ·················································· 233
第一节 相关理论 ····································································· 233
第二节 文物藏品的信息化与博物馆的发展···································· 240
第三节 数字博物馆资源的分类 ··················································· 248
第四节 数字博物馆体系结构研究················································ 254
参考文献······················································································· 257

