當前位置:首頁 » 網路連接 » 有哪些計算機網路安全英文文獻
擴展閱讀
樂視路由設置網路速度 2025-06-25 04:20:43
網路安全廣告徵集 2025-06-25 04:20:41

有哪些計算機網路安全英文文獻

發布時間: 2022-06-07 11:40:33

㈠ 請問有關計算機網路方面的英文文獻哪裡下載

計算機網路方面的英文書籍一般是PDF文件格式。

一般來說,下載成功率比較高的,是通過P2P軟體,我經常用的是emule,就是www.verycd.com上下載的。

使用這些下載軟體的時候,通常是利用軟體的「搜索」功能。比如,你所需要的計算機網路方面的書籍,一般是:computer network, network, computer net等,或者你到當當網、china-pub等網上書店上,看好了名字,在p2p軟體中搜索也行。

通過搜索引擎進行檢索也是另一種方式,但在搜索的時候最好加上「.pdf」的後綴名。

謝謝^_^

㈡ 誰告訴我在哪裡找與計算機相關的英文文獻

去你所在市的公共圖書館,現在公共圖書館免費開放了,有很多原版的計算機文獻。你可以辦
借書證
借。這樣的資料買,太貴了。
你可以先網路你們市的圖書館的網站,先在線查詢,然後去借。

㈢ 求計算機中英文文獻!十萬火急!

樓主要加分啊!

Computer network virus and precautions

With the new network technology and application of the continuous rapid development of the computer network should
Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human
More inseparable from the lives of the community's reliance on them will keep growing. With
With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low
Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus
The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed
Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be
Will become increasingly important.
A computer virus
The definition of computer virus computer virus (Computer Virus) in the "people's republic of China
The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or
Computer program inserted in the damage or destruction of computer data functions, affecting computer use
Self-replication and can a group of computer instructions, or code. "
Second, network virus
With the development of network and the Internet, a wider spread, the greater New harm
The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional
The virus was not classified network virus this concept, because the development of networks, the traditional virus
The network also has a number of characteristics. Today's Internet virus is a broad notion of a
As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as:
"Love the back door", "Panda burning incense."
Third, network virus and the distinction between computer virus
The original common computer virus is nothing more than the devastating formatted hard drive, delete system
With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection
Mutual of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems
The pilot virus and infected executable file virus, in addition to a network virus
These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side
Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer
Source collapse of the network server worm.
Fourth, the network against virus
Network destructive virus, will directly affect the work of the network, ranging from lowering speed video
Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed
Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan,
But this figure is constantly rising year by year. The next few years, the size of the market will reach Security
60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong
Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ
Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows
Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine
For infection, it can spread through the entire network instant, or even within a very short period of time can be infected
Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers
There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda
Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company
All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high
Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease
The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network
More on the computer network the greater the harm caused by the virus.
V. network transmission of the virus Features
1. Infection fast: single machine environment, the virus can only be passed from one computer diskette
To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement
Set against a typical PC network use in normal circumstances, once a computer workstation sick
Drugs, and will be online within 10 minutes in the several hundreds of all infected computers.
2. Proliferation of a wide range: in the network e to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬
Inter spread to thousands of miles away.
3. Dissemination in the form of complex and varied: computer viruses in general through the network "
Station server workstation "channels of communication, but in the form of complex and diverse communication.
4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents
Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work
Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal
The work of a workstation is likely to be on-line by another workstation virus infection. Therefore,
Only workstations in addition to killing viruses, and can not solve the virus harm to the network is.
6, the type of network virus
As the network increasingly developed, the type of network virus has been increasing, generally summed up as
The following categories:
1. Worm
It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network
And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex
A worm virus. The virus used Microsoft's Windows operating system, computer flu
With this virus, will continue to automatically dial-up Internet access and use information in the document or the address
Sharing network spreads, and ultimately undermine the most important user data.
2. Macro Virus
Hong virus is a Storage in the document or template in the Acer computer virus. The prefix
Macro, once open such documents, which Acer will be implemented, then the virus would Acer
Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since
The document will be kept moving "infection" that the Hong virus, and if other users opened the flu
Documents with the virus, the Hong virus will be transferred to his computer.
3. Destructive proceres virus
The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself
Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users
Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm.
Command.Killer).
4. System virus
The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses
The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file,
And through these documents for dissemination. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is Backdoor. The total of such virus through network -
Sowing, opened the back door to the system to the user and potential safety problems.
6. Bundling machine virus
Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use
Specific proceres will be bundled with a number of applications such as QQ, IE bundled up on the surface
It is normal to see the paper, when users run these bundled virus, will run these applications on the surface
Proceres, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled
Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually
Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information,
Computer user inconvenience caused.
8. Planting proceres virus virus
This virus is of the public will run from the in vivo release of one or several new
Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing
(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag).
9. Joke virus
The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation,
When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact
The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus.
10. Trojan hacking virus
Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special
Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world
User information, hackers virus there is a visual interface to the user's computer remotely
Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users
Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ
News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form
A PSW or anything like PWD general said that the virus has stolen password function,
If some hacker programs, such as network梟雄Hack.Nether.Client.
7, the mode of transmission and network anti-virus
Through the above, we can see that e-mail viruses spread Click homepage, users download,
Others implant, implant, and other loopholes through five computer transmission, so long as holding these five
A thoroughfare, we will be able to live better anti-virus network.

計算機網路病毒與防範

隨著各種新的網路技術的不斷應用和迅速發展, 計算機網路的應
用范圍變得越來越廣泛, 所起的作用越來越重要, 計算機網路與人類
的生活更加密不可分, 社會對其的依賴程度也會隨之不斷增長。而隨
著計算機技術的不斷發展, 病毒也變得越來越復雜和高級, 新一代的
計算機病毒充分利用某些常用操作系統與應用軟體的低防護性的弱
點不斷肆虐, 最近幾年隨著網際網路在全球的普及, 將含病毒文件附加
在郵件中的情況不斷增多, 通過網路傳播病毒, 使得病毒的擴散速度
也急驟提高, 受感染的范圍越來越廣。因此, 計算機網路的安全保護將
會變得越來越重要。
一、計算機病毒
計算機病毒的定義計算機病毒(Computer Virus)在《中華人民共和
國計算機信息系統安全保護條例》中被明確定義, 病毒「指編制或者在
計算機程序中插入的破壞計算機功能或者破壞數據, 影響計算機使用
並且能夠自我復制的一組計算機指令或者程序代碼」。
二、網路病毒
隨著網路和Internet 的發展,一個傳播范圍更廣,危害更大的新型
病毒應運而生.這就是網路病毒。網路病毒是一個新興的概念, 在傳統
的病毒分類里沒有網路病毒這個概念, 由於網路的發展, 傳統的病毒
也就具有了一些網路的特性。如今的網路病毒是一個廣義的概念, 一
般只要是利用網路來進行傳播、破壞的都可以被稱為網路病毒, 如:
「愛情後門」、「熊貓燒香」等。
三、網路病毒與計算機病毒的區別
原先常見的計算機病毒的破壞性無非就是格式化硬碟, 刪除系統
與用戶文件、破壞資料庫等等。而傳播途徑也無非是通過遭病毒感染
的軟體的互相拷貝, 攜帶病毒的盜版光碟的使用等, 如感染磁碟系統
區的引導型病毒和感染可執行文件的文件型病毒, 而網路病毒除了具
有普通病毒的這些特性外, 還具有遠端竊取用戶數據、遠端控制對方
計算機等破壞特性, 比如特洛伊木馬病毒和消耗網路計算機的運行資
源, 拖垮網路伺服器的蠕蟲病毒。
四、網路病毒的危害
網路上病毒破壞性大, 將直接影響網路的工作, 輕則降低速度, 影
響工作效率, 重則使網路崩潰, 破壞伺服器信息, 使多年工作毀於一
旦。每年由於病毒等網路欺詐行為導致的經濟損失高達160 億多元,
而且這個數字逐年還在不斷地攀升。未來幾年, 安防市場規模將達到
600 億元。一位殺毒軟體專家指出: 「網路病毒更甚於禽流感」。如: 「熊
貓燒香」除了通過網站帶毒感染用戶之外, 此病毒還會通過QQ 最新
漏洞傳播自身, 通過網路文件共享、默認共享、系統弱口令、U 盤及窗
體頂端窗體底端移動硬碟等多種途徑傳播。而區域網中只要有一台機
器感染, 就可以瞬間傳遍整個網路, 甚至在極短時間之內就可以感染
幾千台計算機, 嚴重時可以導致網路癱瘓。中毒症狀表現為電腦中所
有可執行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為「熊貓
燒香」, 繼而系統藍屏、頻繁重啟、硬碟數據被破壞等, 嚴重的整個公司
區域網內所有電腦會全部中毒。「熊貓燒香」僅半個多月, 變種數已高
達50 多個, 並且其感染用戶的數量不斷擴大。使得感染「熊貓燒香」病
毒的個人用戶已經高達幾百萬, 企業用戶感染數更是成倍上升。網路
上的計算機越多, 網路病毒造成的危害越大。
五、網路病毒傳播特點
1.感染速度快: 在單機環境下, 病毒只能通過軟盤從一台計算機
帶到另一台, 而在網路中則可以通過網路通訊機制迅速擴散。根據測
定, 針對一台典型的PC 網路在正常使用情況, 只要有一台工作站有病
毒, 就可在幾十分鍾內將網上的數百台計算機全部感染。
2.擴散面廣: 由於病毒在網路中擴散非常快, 擴散范圍很大, 不但能迅速傳染區域網內所有計算機, 還能通過遠程工作站將病毒在一瞬
間傳播到千里之外。
3.傳播的形式復雜多樣: 計算機病毒在網路上一般是通過「工作
站伺服器工作站」的途徑進行傳播的, 但傳播的形式復雜多樣。
4.難於徹底清除: 單機上的計算機病毒有時可通過刪除帶毒文件
或低級格式化硬碟等措施將病毒徹底清除, 而網路中只要有一台工作
站未能消毒干凈就可使整個網路重新被病毒感染, 甚至剛剛完成清除
工作的一台工作站就有可能被網上另一台帶毒工作站所感染。因此,
僅對工作站進行病毒殺除, 並不能解決病毒對網路的危害。
六、網路病毒的類型
由於網路越來越發達, 網路病毒的種類也越來越多, 大體歸納為
以下幾類:
1.蠕蟲病毒
它的傳染機理是利用網路進行復制和傳播, 傳染途徑是通過網路
和電子郵件,前綴是Worm。比如近年危害很大的「尼姆達」病毒就是蠕
蟲病毒的一種。這一病毒利用了微軟視窗操作系統的漏洞, 計算機感
染這一病毒後, 會不斷自動撥號上網, 並利用文件中的地址信息或者
網路共享進行傳播, 最終破壞用戶的大部分重要數據。
2.宏病毒
宏病毒是一種寄存在文檔或模板的宏中的計算機病毒。前綴是
Macro, 一旦打開這樣的文檔, 其中的宏就會被執行, 於是宏病毒就會
被激活, 轉移到計算機上, 並駐留在Normal 模板上。從此以後, 所有自
動保存的文檔都會「感染」上這種宏病毒, 而且如果其他用戶打開了感
染病毒的文檔, 宏病毒又會轉移到他的計算機上。
3.破壞性程序病毒
破壞性程序病毒的前綴是: Harm。這類病毒的特性是本身具有好
看的圖標來誘惑用戶點擊, 當用戶點擊病毒時, 病毒便會直接對用戶
計算機產生破壞。如格式化C 盤(Harm.formatC.f) 、殺手命令(Harm.
Command.Killer) 等。
4.系統病毒
系統病毒的前綴為:Win32、PE、Win95、W32、W95 等。這些病毒的
一般公有的特性是可以感染windows 操作系統的*.exe 和*.dll 文件,
並通過這些文件進行傳播。如CIH 病毒。
5.後門病毒
後門病毒的前綴是Backdoor。該類病毒的共有特性是通過網路傳
播, 給系統開後門, 給用戶帶來安全隱患。
6.捆綁機病毒
捆綁機病毒的前綴是: Binder。這類病毒的特性是病毒作者會使用
特定的捆綁程序將病毒與一些應用程序如QQ、IE 捆綁起來, 表面上
看是正常文件, 當用戶運行這些捆綁病毒時, 會表面上運行這些應用
程序, 然後隱藏運行捆綁在一起的病毒, 從而給用戶造成危害。如: 捆
綁QQ(Binder.QQPass.QQBin) 、系統殺手(Binder.killsys) 等。
7.腳本病毒
腳本病毒通常是JavaScript 代碼編寫的惡意代碼, 前綴是通常為
Spript, 一般帶有廣告性質, 會修改您的IE 首頁、修改注冊表等信息,
造成用戶使用計算機不方便。
8.病毒種植程序病毒
這類病毒的公有特性是運行時會從體內釋放出一個或幾個新的
病毒到系統目錄下, 由釋放出來的新病毒產生破壞。如冰河播種者
(Dropper.BingHe2.2C) 、MSN 射手(Dropper.Worm.Smibag)等。
9.玩笑病毒
玩笑病毒的前綴是: Joke。也稱惡作劇病毒。這類病毒的特性是本身具有好看的圖標來誘惑用戶點擊,
當用戶點擊這類病毒時, 病毒會做出各種破壞操作來嚇唬用戶, 其實
病毒並沒有對用戶電腦進行任何破壞。如: 女鬼( Joke.Girlghost) 病毒。
10.木馬黑客病毒
木馬病毒其前綴是: Trojan, 黑客病毒前綴名一般為Hack。公有特
性是通過網路或者系統漏洞進入用戶的系統並隱藏, 然後向外界泄露
用戶信息, 黑客病毒則有一個可視的界面, 能對用戶的電腦進行遠程
控制。木馬、黑客病毒往往是成對出現的, 木馬病毒負責侵入用戶的電
腦, 而黑客病毒則會通過該木馬病毒來進行控制。。一般的木馬如QQ
消息尾巴木馬Trojan.QQ3344, 還有大Trojan.LMir.PSW.60。病毒名中
有PSW或者什麼PWD 之類的一般表示這個病毒有盜取密碼的功能,
一些黑客程序如網路梟雄Hack.Nether.Client 等。

㈣ 哪裡有有關計算機網路安全的英文參考文獻

嗯,到這里來看看吧~

美國國家網路安全聯盟
http://www.cyberpartnership.org/

信息安全英文資料庫
http://marc.theaimsgroup.com/

關於無線網路安全問題的探討(英文資料)
http://www.infosecurity.org.cn/article/hacker/freshman/9700.html

網路安全英文文獻免費下載
http://www.wenkoo.cn/search/wendang/%CD%F8%C2%E7%B0%B2%C8%AB%D3%A2%CE%C4%CE%C4%CF%D7/1

㈤ 誰有有關計算機或者網路的英文文章啊(2000字以上)

Politics in the workplace can get vicious -- and we're not talking about the governmental kind. Rather, office politics, or how power and influence are managed in your company, will be a part of your career whether you choose to participate in them or not. 本文不是討論政府部門的那種政治,而是辦公室里的那種,或者說公司內部權力和影響力的控制。職場政治可能很殘酷,不論你參不參與它都將成為你事業的一部分。 Don't align yourself too strongly with just one group at the office because they may not hold power forever. 不要只和某一個群體緊密聯系;因為他們也許不會一直掌權。 Some workers say they don't want to get caught up in politics at work, but most experts argue that playing the game is crucial to your career success. By not getting involved, you may find your talents ignored, your success limited and you may feel left out of the loop, says Louellen Essex, co-author of "Manager's Desktop Consultant: Just-in-Time Solutions to the Top People Problems That Keep You Up at Night." 有些員工稱他們不願捲入辦公室政治中,但是多數專家認為參與到這場游戲中對你的事業成功至關重要。《經理人辦公桌顧問:讓你夜不能寐的人際問題的及時解決方法》一書作者之一Louellen Essex認為,如果不參與辦公室政治,你的才華可能會被忽略、成功受限,你也會感到被排斥在外。 "Politics get nasty when an employee is out for his or her personal gain alone," Essex says. "Think of playing office politics as a game of strategy through which you are able to get the resources and influence you need to accomplish your goals. Most often those who are diplomatic, respectful and build coalitions with effective people win." Essex說:「當員工只追求個人利益時政治就骯臟起來。可以把參與職場政治作為一個游戲策略;通過這個方式你能獲得達成目標所需要的資源和影響力。通常贏家都是那些老練的、尊重別人的、和有影響力人士聯系緊密的人。」 Here are Essex's nine tips to help you win at office politics and still gain other's respect. 下面就是Essex給出的九條建議,幫你在贏得辦公室政治的同時也獲得別人的尊重。 1. Observe how things get done in your organization. 觀察事情是怎樣進行的 Ask some key questions: What are the core values and how are they enacted? Are short- or long-term results most valued? How are decisions made? How much risk is tolerated? The answers to these questions should give you a good sense of the culture of your organization. 問些關鍵問題:公司的核心價值是什麼,是如何體現的?最看重的是短期還是長期效果?決議是如何制定的?可接受風險的程度有多大?這些問題的答案可以讓你對企業文化有個好的認識。 2. Profile powerful indivials 觀察有權力的個體 Pay attention to their communication style, network of relationships and what types of proposals they say "yes" to most often. Emulate those traits by drawing on the strengths you have. 注意他們的溝通風格、關系網路及他們常常同意什麼類型的提議。發揮你的長處,模仿這些特質。 3. Determine strategic initiatives in the company 決定公司的戰略計劃 Update your skills to be relevant to company initiatives. For example, don't lag behind in technology, quality or customer service approaches that are crucial to you and your company's success. 提升和公司發展相關的技能。例如在對你和公司成功都至關重要的技術、質量或客服方式上都別落後。 4. Develop a personal track record as someone who gets results 將自己的形象建設為「富有成果的員工」 Style without substance will not gain others' respect, especially in today's organizations that focus on outcome. 有風格沒實際內容不會讓你獲得別人的尊重,在如今注重結果的公司里尤為如此。 5. Don't be afraid to toot your own horn 別忘了「自吹自擂」 If no one knows of your good work, you may lose at the game of office politics -- when you really deserve to win. Let others know what you've accomplished whenever you get the opportunity. If you don't know the fine art of diplomatic bragging, you might get lost in the shuffle of your co-workers. 如果沒人知道你的優秀工作,你也許就會在辦公室政治中失敗,而勝利本該是屬於你的。只要有機會,就一定要讓別人知道你都做了什麼。如果你不會「自吹自擂」的話,也許會淹沒在同事中。 6. Treat everyone with respect 尊重每個人 Don't show preferential treatment or treat co-workers badly. You never know who someone might be connected to and rude behavior may come back to bite you. 不要優待或虐待同事。你不會知道誰和誰關系緊密;你的粗魯行為會反過來傷害到你。 7. Don't align too strongly with one group 不要和某一個集團聯系太緊密 While an alliance may be powerful for the moment, new leadership will often oust existing coalitions and surround themselves with a new team. Bridging across factions may be a more effective strategy for long-term success if you intend to stay in your current organization for some time. 結盟在某一刻也許是強有力的,但是新的領導階層往往會驅逐現有的「聯盟」並任用一個新團隊。如果你希望在目前的公司待上比較長的時間的話,那麼對長遠成功來說更有效的策略是「跨派系團結」。 8. Learn to communicate persuasively 學習交流口才 Develop an assertive style, backed with solid facts and examples, to focus others' attention on your ideas and proposals. Good politicians can adjust their messages for their audience and are always well-prepared. 培養一種自信的風格,並以確鑿事例為支撐,從而讓別人的注意力集中在你的想法和提議上。好的政治家們能根據觀眾來調整傳達的信息,而且總是准備充分。 9. Be true to yourself. 對自己要坦誠 After analyzing the political landscape in your company, if you decide the game is one you can't play, prepare to move on. It's not typical, but some organizations actually condone -- even promote -- dishonest, ruthless or unethical behavior. The game of office politics in this situation is not one worth winning. 在分析完公司的政治形勢後,如果你決定這是一場不能進行的游戲,那麼就做好辭職准備。 雖然不常見,但有些公司實際上是在寬恕--甚至鼓勵--不誠實、無情的或者非道德的行為。這樣的辦公室政治游戲不值得去贏。

麻煩採納,謝謝!

㈥ 求計算機網路方面的英文文獻,要有來源出處和作者,提供幾個地址,謝謝~

童鞋你好!
這個估計需要自己搜索了!
網上基本很難找到免費給你服務的!
我在這里給你點搜索國際上常用的外文資料庫:
----------------------------------------------------------
❶ISI web of knowledge Engineering Village2
❷Elsevier SDOL資料庫 IEEE/IEE(IEL)
❸EBSCOhost RSC英國皇家化學學會
❹ACM美國計算機學會 ASCE美國土木工程師學會
❺Springer電子期刊 WorldSciNet電子期刊全文庫
❻Nature周刊 NetLibrary電子圖書
❼ProQuest學位論文全文資料庫
❽國道外文專題資料庫 CALIS西文期刊目次資料庫
❾推薦使用ISI web of knowledge Engineering Village2
-----------------------------------------------------------
中文翻譯得自己做了,實在不成就谷歌翻譯。
弄完之後,自己閱讀幾遍弄順了就成啦!
學校以及老師都不會看這個東西的!
外文翻譯不是論文的主要內容!
所以,很容易過去的!
祝你好運!

㈦ 哪裡有有關計算機網路安全的英文參考文獻

英文的應該很多。建議查PDF文件或者DOC文件,給出關鍵詞,應該有很多的。然後按照時間排序,基本就可以找到了。

㈧ 計算機網路安全英文文獻一篇

There is no large-scale popularization of the computer before, it will lock important documents to a file cabinet or safe
Custody. With the computer, as well as the rapid development of the Internet tended to use computers and information networks
Data management. A variety of important information (such as trade secrets, patents, etc.) if not stored in the computer security measures, which just do not have access to locked file cabinet to store confidential documents. Due to the openness of the computer, such as structural characteristics and standardized so that a high degree of computer information-sharing and the spread of the characteristics of easy, resulting in the computer information (such as an important password) in the processing, storage, transmission and application of the process can easily be leaked, stolen, tampered with and destruction, or infection by computer viruses, backdoors, exploits and network hackers to bring substantial business risk. At this time, the security of your computer on to highlight the importance of it. Each computer users are more or lessviruses or Trojan horses, hackers, harassment. Brought by indivials against the loss may also not large, but for enterprises, may be drowned.

㈨ 請問到哪裡可以免費下載計算機方面的英文文獻呢

計算機網路方面的英文書籍一般是pdf文件格式。
一般來說,下載成功率比較高的,是通過p2p軟體,我經常用的是emule,就是www.verycd.com上下載的。
使用這些下載軟體的時候,通常是利用軟體的「搜索」功能。比如,你所需要的計算機網路方面的書籍,一般是:computer
network,
network,
computer
net等,或者你到當當網、china-pub等網上書店上,看好了名字,在p2p軟體中搜索也行。
通過搜索引擎進行檢索也是另一種方式,但在搜索的時候最好加上「.pdf」的後綴名。
謝謝^_^

㈩ 求關於計算機漏洞的英文文獻及翻譯!!!!

一、研究生必備四本
俗話說好記性不如爛筆頭,所以一定要首先養成做筆記的好習慣!作為研究生下面這幾個本子是必不可少的
1,實驗記錄本(包括試驗准備本),這當然首當其沖必不可少,我就不多說了;
2,Idea記錄本,每次看文獻對自己有用的東西先記下,由此產生的idea更不能放過,這可是做研究的本錢,好記性不如爛筆頭,以後翻翻會更有想法的;
3,專業概念以及理論進展記錄本,每個人不可能對自己領域的概念都了如指掌,初入門者更是如此,這時候小小一個本子的作用就大了;
4,講座記錄本,這本本子可能有些零雜,記錄聽到的內容,更要記錄瞬間的靈感,以及不懂的地方,不可小視!
這四本是你必不可少的,不過作為我們這些非英語專業的研究生來說,還有一個應該具備的本子就是英語好句記錄本。

二、論文寫作要點
1、選題要小,開掘要深;不要題目很大,內容卻很單薄。
2、寫作前要讀好書、翻閱大量資料、注意學術積累,在這個過程中,還要注重利用網路,特別是一些專業資料庫
3、「選題新、方法新、資料新」的三新原則(老闆教導的)
4、「新題新做」和「小題大做
總之,一點之見即成文。

三、如何撰寫實驗研究論文(唐朝樞)
論文發表意識:基礎研究成果的表達方式;是否急於發表(創新與嚴謹的關系);發表的論文與學位論文的區別(反映科學事實而不是反映作者水平)
論文格式:原著、快報、簡報、摘要。不同於教科書、講義,更不同於工作總結。
撰寫前的准備工作:復習和准備好相關文獻;再次審定實驗目的(學術思想,Idea);實驗資料完整並再次審核
1.Introction:
問題的提出;研究的現狀及背景;以前工作基礎;本工作的目的;思路(可提假說);對象;方法;結果。在… 模型上,觀察 … 指標, 以探討 … (目的)
2. M