Gastos de envío:
EUR 13,95
De China a Estados Unidos de America
Descripción paperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: November 2012 Pages: 232 Language: Chinese in Publisher: Wuhan University Press. College information security professional 12th Five-Year Plan textbooks: Information Content Security overview of information security Chung the branch subject. _- the basic content of the information content security. support technology. various media. content security. content security posture assessment. content security and confrontation. as well as the content security practices. Information also applies to the colleges information security professional 12th Five-Year Plan textbooks: information content security applies to the information security professional graduate and advanced undergraduate elective use of computing science. communications professional. computer professional class students . Book about the knowledge and methods for the study of information science and computer science. many other issues will be helpful. Contents: Chapter 1 Introduction 1.1 Information Content Security Concepts 1.1.1 information content security definitions and connotations 1.1.2 Information security threats 1.1.3 Information Content Security cause of 1.2 information content security and information security relationship 1.2.1 disciplines Epitaxy and connotation relations 1.2.2 disciplinary scientific research method to distinguish the the 1.2.3-disciplinary professional norms difference 1.3 Information Content Security Management System 1.3.1 Information Content Security Management System based on the Deming cycle information content security management framework 1.3.2 build 1.4 Information Content Security and Legal 1.4. 1 to promote the development of information content security regulations 1.4.2 crack down on Internet information content security crime related laws 1.4.3 Internet content security management penalties 1.5 Chapter Summary Reference Chapter 2 network information content of the literature in this chapter exercises to get 2.1 Network Information Content Get model 2.2 search engine technology 2.2.1 online acquisition data mining algorithm 2.2.2 row-level algorithm 2.2.3 search engine spam relations of 2.3 Technology 2.3.1 Data Mining 2.3.3 Web text mining techniques History 2.3.2 Web mining 2.4 Recommendation 2.4.1 Information Recommended concept and the formal definition 2.4.2 recommended algorithm 2.5 Information to restore your computer to restore technology 2.5.1 Technical 2.5.2 Web restore technology 2.5.3 Multimedia reduction technology 2.6 Chapter Summary References in this chapter exercises Chapter 3 of the text content security 3.1 text preprocessing techniques 3.1.1 word technology 3.1.2 text 3.1.3 text feature extraction with shrink-dimensional analysis the 3.2.1 text parsing method 3.2.2 text semantic analysis method 3.2 3.2 text content. 3 text Pragmatic analysis method the 3.3 text content security applications 3.3.1 content-based web filtering 3.3.2 content-based network monitor 3.4 Chapter Summary References This chapter Exercises Chapter 4 network multimedia content security 4.1 Overview 4.2 Network undesirable image content identification 4.2 .1 skin detection 4.2.2 Texture Analysis 4.2.3 Other characteristics 4.2.4 bad image recognition 4.3 Bad video content identification 4.3.1 Network Video stream found 4.3.2 network video streaming traffic to 4.3.3 video when domain Segmentation 4.3.4 video key frame extraction the 4.4 Bad audio content identification the 4.4.1 audio data preprocessing 4.4.2 short time audio characteristics 4.4.3 . Chapter 5 e-mail content security bad audio recognition based on hidden Markov model Chapter 7 Chapter 6 mobile phone SMS content security network content security posture assessment information content security and confrontation Chapter 9. Chapter 8 information content security real Postscript ReferencesFour Satisfaction guaranteed,or money back. Nº de ref. del artículo: NE048858