Artículos relacionados a 信息内容安全

信息内容安全 ISBN 13: 9787307102125

信息内容安全 - Tapa blanda

 
9787307102125: 信息内容安全
Ver todas las copias de esta edición ISBN.
 
 
  • ISBN 10 7307102129
  • ISBN 13 9787307102125
  • EncuadernaciónTapa blanda

Comprar nuevo

Ver este artículo

Gastos de envío: EUR 13,95
De China a Estados Unidos de America

Destinos, gastos y plazos de envío

Añadir al carrito

Los mejores resultados en AbeBooks

Imagen de archivo

ZHOU XUE GUANG . REN YAN ZHEN . SUN YAN . DENG
ISBN 10: 7307102129 ISBN 13: 9787307102125
Nuevo paperback Cantidad disponible: 1
Librería:
liu xing
(Nanjing JiangSu, JS, China)

Descripción paperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: November 2012 Pages: 232 Language: Chinese in Publisher: Wuhan University Press. College information security professional 12th Five-Year Plan textbooks: Information Content Security overview of information security Chung the branch subject. _- the basic content of the information content security. support technology. various media. content security. content security posture assessment. content security and confrontation. as well as the content security practices. Information also applies to the colleges information security professional 12th Five-Year Plan textbooks: information content security applies to the information security professional graduate and advanced undergraduate elective use of computing science. communications professional. computer professional class students . Book about the knowledge and methods for the study of information science and computer science. many other issues will be helpful. Contents: Chapter 1 Introduction 1.1 Information Content Security Concepts 1.1.1 information content security definitions and connotations 1.1.2 Information security threats 1.1.3 Information Content Security cause of 1.2 information content security and information security relationship 1.2.1 disciplines Epitaxy and connotation relations 1.2.2 disciplinary scientific research method to distinguish the the 1.2.3-disciplinary professional norms difference 1.3 Information Content Security Management System 1.3.1 Information Content Security Management System based on the Deming cycle information content security management framework 1.3.2 build 1.4 Information Content Security and Legal 1.4. 1 to promote the development of information content security regulations 1.4.2 crack down on Internet information content security crime related laws 1.4.3 Internet content security management penalties 1.5 Chapter Summary Reference Chapter 2 network information content of the literature in this chapter exercises to get 2.1 Network Information Content Get model 2.2 search engine technology 2.2.1 online acquisition data mining algorithm 2.2.2 row-level algorithm 2.2.3 search engine spam relations of 2.3 Technology 2.3.1 Data Mining 2.3.3 Web text mining techniques History 2.3.2 Web mining 2.4 Recommendation 2.4.1 Information Recommended concept and the formal definition 2.4.2 recommended algorithm 2.5 Information to restore your computer to restore technology 2.5.1 Technical 2.5.2 Web restore technology 2.5.3 Multimedia reduction technology 2.6 Chapter Summary References in this chapter exercises Chapter 3 of the text content security 3.1 text preprocessing techniques 3.1.1 word technology 3.1.2 text 3.1.3 text feature extraction with shrink-dimensional analysis the 3.2.1 text parsing method 3.2.2 text semantic analysis method 3.2 3.2 text content. 3 text Pragmatic analysis method the 3.3 text content security applications 3.3.1 content-based web filtering 3.3.2 content-based network monitor 3.4 Chapter Summary References This chapter Exercises Chapter 4 network multimedia content security 4.1 Overview 4.2 Network undesirable image content identification 4.2 .1 skin detection 4.2.2 Texture Analysis 4.2.3 Other characteristics 4.2.4 bad image recognition 4.3 Bad video content identification 4.3.1 Network Video stream found 4.3.2 network video streaming traffic to 4.3.3 video when domain Segmentation 4.3.4 video key frame extraction the 4.4 Bad audio content identification the 4.4.1 audio data preprocessing 4.4.2 short time audio characteristics 4.4.3 . Chapter 5 e-mail content security bad audio recognition based on hidden Markov model Chapter 7 Chapter 6 mobile phone SMS content security network content security posture assessment information content security and confrontation Chapter 9. Chapter 8 information content security real Postscript ReferencesFour Satisfaction guaranteed,or money back. Nº de ref. del artículo: NE048858

Más información sobre este vendedor | Contactar al vendedor

Comprar nuevo
EUR 59,00
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 13,95
De China a Estados Unidos de America
Destinos, gastos y plazos de envío