Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
by
Li, Zhijie
, Suo, Hui
in
Audits
/ Network security
/ Physics
/ Technology assessment
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
by
Li, Zhijie
, Suo, Hui
in
Audits
/ Network security
/ Physics
/ Technology assessment
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
Journal Article
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
2020
Request Book From Autostore
and Choose the Collection Method
Overview
With the release of network security level protection 2.0 standard, the work of equal protection evaluation is facing unprecedented challenges. How to deal with it? This paper takes the security audit technology as an example, starting from the concept of network security audit technology, analyzes the security audit object, combines the security audit evaluation index to evaluate the network security equipment, operating system and database system, and puts forward the prospect of security audit evaluation according to the problems in the evaluation practice.
Publisher
IOP Publishing
Subject
This website uses cookies to ensure you get the best experience on our website.