期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
TINA网络资源信息模型
1
作者 侯清富 熊思民 《数字通信》 1999年第1期24-26,共3页
电信信息联网体系结构(TINA)是一种异构环境下面向业务的开放体系结构。其网络资源信息模型是一种面向业务的、独立于网络传输和交换技术的信息模型,是各种专门技术网络资源信息建模的通用模型。介绍了TINA的管理分层与现有标准的关... 电信信息联网体系结构(TINA)是一种异构环境下面向业务的开放体系结构。其网络资源信息模型是一种面向业务的、独立于网络传输和交换技术的信息模型,是各种专门技术网络资源信息建模的通用模型。介绍了TINA的管理分层与现有标准的关系及网络资源信息模型。 展开更多
关键词 电信信息联网 体系结构 信息模型 网络资源
下载PDF
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
2
作者 Robert Brumnik Sergii Kavun 《Computer Technology and Application》 2015年第1期45-56,共12页
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in... Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. Thus, the intelligence services in the future created an electronic database in which to their being classified intelligence products, users could choose between the latter themselves relevant information. The EU (European Union) that activities are carried out from at least in year 1996, terrorist attacks in year 200l is only accelerating. Proposals to increase surveillance and international cooperation in this field have been drawn up before September 11 2011. On the Web you can fmd a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service--NSA (National Security Agency). United States of America in year 1994 enacted a law for telephone communication--Digital Telephony Act, which would require manufacturers of telecommunications equipment, leaving some security holes for control. In addition, we monitor the Internet and large corporations. The example of the United States of America in this action reveals the organization for electronic freedoms against a telecom company that the NSA illegally gains access to data on information technology users and Internet telephony. 展开更多
关键词 Intelligence and counterintelligence activities electronic spy devices detection methods netwar counterterrorism.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部