期刊文献+

虚拟化资源池的网络安全防护 被引量:1

下载PDF
导出
摘要 随着移动互联网的快速发展,大数据等新一代信息技术的发展速度得到一定的提升。围绕网络和数据的服务和应用逐渐变得越来越多。随着较多的应用场景的出现,越来越多的网络安全风险和问题在实际的发展过程中越来越明显,对全球范围的发展产生一定的影响。因此对基础设施资源池的网络安全防护问题进行一定的探讨和分析,是一件十分有价值的工作。文章通过对虚拟化资源池的网络安全防护尽心研究,希望能够给相关的工作人员提供一定的理论性支持和实践参考。 With the rapid development of mobile Internet,the development speed of new generation information technology such as big data has been improved to a certain extent.There are more and more services and applications around the network and data.With the emergence of more application scenarios,more and more network security risks and problems become more and more obvious in the actual development process,which have a certain impact on the global development.Therefore,it is a very valuable work to discuss and analyze the network security protection of infrastructure resource pool.Through the dedicated research on the network security protection of the virtual resource pool,this paper hopes to provide some theoretical support and practical reference for the relevant staff.
作者 牛翔宇
出处 《科技创新与应用》 2021年第9期146-148,共3页 Technology Innovation and Application
关键词 基础设施 资源池 网络安全 防护 分析 总结 infrastructure resource pool network security protection analysis summary
  • 相关文献

参考文献5

二级参考文献24

  • 1崔杰,李陶深,兰红星.基于Hadoop的海量数据存储平台设计与开发[J].计算机研究与发展,2012,49(S1):12-18. 被引量:141
  • 2郑立常,卫建东,郑俊锋,楼楠.基坑施工对临近运营地铁隧道影响监测的实践[J].测绘工程,2007,16(2):47-50. 被引量:20
  • 3桂小林.网格技术导论[M].北京:北京邮电大学出版社,2004.
  • 4SINGH H J. High scalability of HDFS using distributed namespace [J]. International Journal of Computer Applications, 2012, 52(17): 30-37.
  • 5MOHANDAS N, THAMPI S M. Improving Hadoop performance in handling small files [C]// ACC/CCIS. 2011: 187-194.
  • 6Wu W W. Developing an explorative model for SaaS adoption [J]. Expert Systems with Applications, 2011, 38(12): 15057-15064.
  • 7FADIKA Z, GOVINDARAJU M, CANON R, et al. Evaluating Hadoop for data-intensive scientific operations [C]//IEEE Fifth International Conference on Cloud Computing. 2012, 118: 67-74.
  • 8WEBBER J, PARASTATIDIS S, ROBINSON I. REST in practice [M]. Sebastopol, US: O'Reilly Media, 2011.
  • 9BALA A, CHANA I. Design and deployment of workflows in cloud environment [J]. International Journal of Computer Applications, 2012, 51(11): 9-15.
  • 10CHEN J X, TANG H. Research on layering algorithm of DAG [C]// International Conference on Computer Science and Software Engineering. 2008: 271-274.

共引文献16

同被引文献14

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部