共查询到20条相似文献,搜索用时 0 毫秒
1.
Fred Cohen 《Network Security》2002,2002(1):16-18
Networks dominate today’s computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
2.
年月日 四川省汶川发生.级大地震 其中受灾最严重的地区北川县城基本夷为平地 到目前为止已有超过万接近万人遇难.看到一幅幅前方传回的图片 真是触目惊心…….由于此次地震级别高 全国多个地区均有震感.各地群众都采取了相应的应急措施 一时间电视和网络上关于地震的常识以及震后自救措施随处可见 人们陷入恐慌之中…….面对如此突如其来的灾难 救灾的当务之急是建立高效的应急指挥方案和快速救援通道 使受困群众及时得到有效营救和安置.…… 《办公自动化》2008,(6):46-47
2008年5月12日,四川省汶川发生8.0级大地震,其中受灾最严重的地区北川县城基本夷为平地,到目前为止已有超过6万、接近7万人遇难。看到一幅幅前方传回的图片,真是触目惊心……。由于此次地震级别高,全国多个地区均有震感。各地群众都采取了相应的应急措施,一时间电视和网络上关于地震的常识以及震后自救措施随处可见,人们陷入恐慌之中……。面对如此突如其来的灾难,救灾的当务之急是建立高效的应急指挥方案和快速救援通道,使受困群众及时得到有效营救和安置。 相似文献
3.
4.
故障诊断技术的发展趋势及我们的对策 总被引:10,自引:0,他引:10
1 对研究现状的评价 近20年来,从整体上看,我国在故障诊断方面的研究一直紧跟国际学术动态,对新理论、新方法、新趋势等方面的把握和研究是及时的,逐步取得了一批有价值的研究成果,若干方面在国际学术界产生了一定的影响。故障诊断方面的工作在企业界及应用领域也进一步得到重视。 现有的故障诊断方法已呈现多流性“方法库”的特征。对各种方法的分类问题,尽管学术界不完全统一,但国内目前一般采用的三大类分类法还是较为合适的,体现了诊断过程所采用的理论方法方面的特征,它们是:基于解析模型的诊断方法、基于信号处理的诊断方… 相似文献
5.
6.
《Information Security Journal: A Global Perspective》2013,22(3):2-4
Abstract According to Symantec's March 2005 threat report, spam, usually defined as junk or unsolicited e-mail, made up over 60 percent of all e-mail traffic during the reporting period from July to December 2004. By anyone's definition, that is a lot of junk e-mail. But, as security professionals know, spam is much more than an annoyance and can adversely affect system and data integrity. Moreover, its existence can be an indicator of a much larger issue. 相似文献
7.
Mal’kovskii S. I. Sorokin A. A. Korolev S. P. Zatsarinnyi A. A. Tsoi G. I. 《Programming and Computer Software》2019,45(6):324-332
Programming and Computer Software - This paper is devoted to the performance evaluation of a hybrid computer cluster built on IBM POWER8 CPUs and NVIDIA Tesla P100 GPUs. The architecture of the... 相似文献
8.
9.
漏窗是中国造园艺术中一种独特的创造,在中国古典园林中,漏窗在组景、借景、扩大印象空间等方面,充分体现出它的独特性。从设计的形式美法则角度,从点、线、面的形式构成美、形状的对比、虚实对比、统一与变化四个方面,以中国古典园林中的漏窗设计为例,论述了中国古典园林建筑营造出的形式美感。 相似文献
10.
Berni Dwan 《Computer Fraud & Security》2001,2001(6):8
The current Cyberwar between the US and China has, not surprisingly, been receiving a lot of Web space. So, the ‘great yellow peril’ has injected a rare blend of excitement, speculation, theorising and general banter on many security related sites who were probably just about ready for it. It is interesting to see how different sites have dealt with the issue — including the news and print media who have online sites. 相似文献
11.
What's the state of the art in the tools we use to build software? To answer this question, I let a powerful server build from source code about 7,000 open source packages over a period of a month. The packages I built form a subset of the FreeBSD operating system ports collection, comprising a wide spectrum of application domains: from desktop utilities and biology applications to databases and development tools. The collection is representative of modern software because, unlike say a random sample of SourceForge.net projects, FreeBSD developers have found these programs useful enough to port to FreeBSD. 相似文献
12.
Code lacking comments, meaningful identifiers, and correct indentation is a nightmare. By studying 30 programs of various sizes to measure what percentage of their source code consisted of comments, meaningful identifiers, and whitespace, the author found that more than half of the code served developers rather than the compiler. The relative composition of the three elements was equally distributed and didn't appear to vary with project size. This finding substantiates the view of programming as an art form and the importance of source code in the software development process. Therefore we need to focus management's attention on code and its developers. 相似文献
13.
14.
15.
Ran Wei 《Journal of Computer-Mediated Communication》2006,12(1):155-175
High‐speed wireless Internet technologies such as Wi‐Fi and WiMAX allow users to go online at broadband speed, anywhere, anytime. Experimental projects in publicly accessible Wi‐Fi systems and citywide networks are mushrooming in the United States and elsewhere. Grounded in the diffusion of innovations research paradigm, this study examines factors that influence the adoption of Wi‐Fi in the workplace. Similar to the adoption of the Internet at home, results show that perceived advantages and compatibility of wireless Internet, larger number of fellow employees and family members already using wireless Internet, and higher frequency of communication with technicians about the wireless system—but less time spent reading newspapers—all lead to a higher likelihood of using the Wi‐Fi powered Wireless Local Area Network (WLAN). Managerial implications of the findings are discussed. 相似文献
16.
17.
投影机,一定会是个越来越令人兴奋的产品,虽然不会像手机一样和人们的生活息息相关,但却能给你带来超乎想象的视觉享受和便利。当投影机不再笨重,当投影机不再是一个操作复杂的设备,投影就会等于随身+随时+随意+随心的快乐。 相似文献
18.
Information systems project costs are characteristically tangible and apparent, whereas IS benefits are usually intangible and He in the future. Consequently, project analysts must take care when evaluating project pros and cons. If undocumented judgment is substituted for reasonable estimation of these costs and benefits, or if the project analysis contains too many gaps, projects may not be approved or managers may eventually lose faith in their “go” decision. 相似文献
19.
Information systems project costs are characteristically tangible and apparent, whereas IS benefits are usually intangible and He in the future. Consequently, project analysts must take care when evaluating project pros and cons. If undocumented judgment is substituted for reasonable estimation of these costs and benefits, or if the project analysis contains too many gaps, projects may not be approved or managers may eventually lose faith in their “go” decision. 相似文献
20.
A. Bouckaert 《International journal of parallel programming》1977,6(3):237-261
A scheme in which model construction and operation are considered as distinct processes has been designed for the differential diagnosis of goiters. The influence of classification and observation errors and of the recognition method on the diagnostic accuracy has been determined. 相似文献