期刊文献+

基于B/S的学生就业管理系统的设计与实现 被引量:2

The Design and Implementation of Graduate Employment System Based on B/S
下载PDF
导出
摘要 随着信息化时代的加速,传统的就业管理模式面临很大的挑战,为了适应当今高校就业信息化的需求,通过ASP技术,采用SQL Server 2000作为后台数据库,结合高校就业服务的实际需求,对就业管理突出问题进行了分析,介绍了系统的总体结构和设计方案,用ASP和excel相结合的技术实现了报表统计,并给出系统的实现过程. With the speeding up of the information age, the traditional management mode of employment faces great challenges. In order to adapt to the needs of the universities employment information, through the ASP technology, using SQL Server 2000 as the backend database, combined with the university employment service demand, on employment outstanding management are analyzed, and the overall structure of the system is introduced and the design scheme, with ASP and excel techniques to realize the statement statistics, and the realization of the system are process.
作者 卢宏才
出处 《陇东学院学报》 2011年第6期39-42,共4页 Journal of Longdong University
关键词 ASP SQL SERVER 2000 就业管理系统 EXCEL ASP SQL Server 2000 employment management system excel
  • 相关文献

参考文献3

二级参考文献16

  • 1郑惠生,宋秀琴,郝长胜.基于ASP的网络学生信息管理系统[J].辽宁工程技术大学学报(自然科学版),2006,25(2):253-254. 被引量:6
  • 2罗力华,姜建国.网站后台管理系统的用户权限管理的一种实现方案[J].电子科技,2006,19(10):62-67. 被引量:15
  • 3苏朋程,曹斌.一种分级权限管理方案的实现[J].信息技术与信息化,2006(5):59-61. 被引量:2
  • 4郑淼.基于WEB的高校毕业生管理系统设计[J].常州工学院学报,2007,20(3):39-43. 被引量:9
  • 51,D. Ferraiolo, J. Cugini, and D.R.Kuhn. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conference. IEEE Computer Society Press, 1995
  • 62,D. Richard Kuhn. Mutual Exclusion of Roles As a Means of Implementing Separation of Duty in Role-Based Access Control Systems National Institute of Standards and Technology. Gaithersburg, Maryland 20899
  • 73,E. B. Fernandez and J. C. Hawkins. Determing Role Rights from Use Cases. ACM97
  • 84,J. F. Berkley. Comparing Simple Role Based Access Control Models and Access Control Lists. NIST. Gaithersburg, MD 1997
  • 95,Observations on the Real-World Implementation of Role-Based Access Control. http://www.schumannsoftware.com/.
  • 10Sandhu R.Role-based Access Control Models[J].Computer,1996,29(2):38-47.

共引文献60

同被引文献1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部