大学生信息检索报告.pdf
检索报告学院:专业:学号:姓名:检索课题:网络信息安全前言随着计算机技术的飞速发展,信息网络已经成为社会发展的重要保证。信息网络涉及到国家的政府、军事、文教等诸多领域,存储、传输和处理的许多信息是政府宏观调控决策、商业经济信息、银行资金转账、股票证券、能源资源数据、科研数据等重要的信息。其中有很多是敏感信息,甚至是国家机密,所以难免会吸引来自世界各地的各种人为攻击(例如信息泄漏、信息窃取、数据篡改、数据删添、计算机病毒等)。通常利用计算机犯罪很难留下犯罪证据,这也大大刺激了计算机高技术犯罪案件的发生。计算机犯罪率的迅速增加,使各国的计算机系统特别是网络系统面临着很大的威胁,并成为严重的社会问题之一。网络信息安全特征保证信息安全,最根本的就是保证信息安全的基本特征发挥作用。因此,下面先介绍信息安全的 5 大特征。文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X21.完整性指信息在传输、交换、存储和处理过程保持非修改、非破坏和非丢失的特性,即保持信息原样性,使信息能正确生成、存储、传输,这是最基本的安全特征。2.保密性指信息按给定要求不泄漏给非授权的个人、实体或过程,或提供其利用的特性,即杜绝有用信息泄漏给非授权个人或实体,强调有用信息只被授权对象使用的特征。3.可用性指网络信息可被授权实体正确访问,并按要求能正常使用或在非正常情况下能恢复使用的特征,即在系统运行时能正确存取所需信息,当系统遭受攻击或破坏时,能迅速恢复并能投入使用。可用性是衡量网络信息系统面向用户的一种安全性能。4.不可否认性指通信双方在信息交互过程中,确信参与者本身,以及参与者所提供的信息的真实同一性,即所有参与者文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2都不可能否认或抵赖本人的真实身份,以及提供信息的原样性和完成的操作与承诺。5.可控性指对流通在网络系统中的信息传播及具体内容能够实现有效控制的特性,即网络系统中的任何信息要在一定传输范围和存放空间内可控。除了采用常规的传播站点和传播内容监控这种形式外,最典型的如密码的托管政策,当加密算法交由第三方管理时,必须严格按规定可控执行。文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2目录网络期刊论文1.1 中文期刊全文数据库61.1.1 中国期刊全文数据库61.1.2 万方数据91.1.3 维普资讯112.网络书目 2.1书目数据库 2.1.1中国国家图书馆12 2.1.2 北京大学图书馆13 2.1.3临沂大学图书馆14 2.1.4 中国科学院科学图书馆152.1.5 清华大学图书馆2.2 数字图书馆 2.2.1 超星数字图书馆16 2.2.2 Apabi数字资源平台16 2.3 网上书店 2.3.1 当当网上书店17 2.3.2 亚马逊网上书店193 搜索引擎文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2 3.1 目录式搜索引擎 3.1.1中文雅虎20 3.1.2 搜狐213.2 机器人搜索引擎 3.2.1 百度23 3.2.2 Google241.网络期刊学术论文1.1.1 中国期刊全文数据库中国期刊全文数据库(CJFD)是目前世界上最大的连续动态更新的中国期刊全文数据库,积累全文文献800 万篇,题录1500 余万条,分九大专辑,126 个专题文献数据库。知识来源:国内公开出版的6100 种核心期刊与专业特色期刊的全文。覆盖范围:理工A(数理化天地生)、理工B(化学化工能源与材料)、理工C(工业技术)、农业、医药卫生、文史哲、经济政治与法律、教育与社会科学、电子技术与信息科学。收录年限:1994 年至今,6100 种全文期刊的数据完整性达到98%。产品形式:中国期刊全文数据库(WEB 版)、中国学术期刊(光盘版)(CAJ-CD)、中国期刊专题全文数据库光盘版。1994-2000 的专题全文数据库已出版 合订本,每个专题库1-2 张 DVD光盘。更新频率:CNKI 中心网站及数据库交换服务中心每日更新,各镜像站点通过互联网或卫星传送数据可实现每日更新,专辑光盘每月更新(文史哲专辑为双月更新),专题光盘年度更新。进入“中国知网“首页,在导航栏选择“期刊“,”高级检索“在分类栏选择“信息科技”,检索条件选择“关键词”,输入关键词“网络信息安全”,范围可以选择“核心期刊”,年代选择2000 到 2013 年,选择“模糊”,点击“检索”如图1,搜索结果如图2,共搜索到2952 个结果文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2选择其中的一篇文章:作者】彭美玲;【机构】黑龙江大学信息管理学院哈尔滨 150080;【摘要】本文通过查阅大量有关网络信息安全和网络立法的资料,对网络信息安全进行介绍分析,来强调现代网络信息社会中制定网络立法的重要性,并对我国网络立法方面的状况进行了分析,而且提出了几点建议。文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M10L8F9M6 ZB5J7S3B1X2文档编码:CP10S8T6G2M4 HH5M1