Page 8 - 大数据技术及安全研究
P. 8

目录

                     CONTENTS






                第三节  数字鸿沟 ············································································143

                第四节  数据依赖 ············································································149
            第五章  大数据安全预警 ········································································151

                第一节  大数据安全风险预警 ·····························································151
                第二节  大数据安全预警 ···································································156

            第六章  大数据安全治理 ········································································157
                第一节  大数据安全治理体系 ·····························································157

                第二节  大数据安全防护技术 ·····························································161
                第三节  大数据安全保障规划 ·····························································168

            参考文献······························································································179
   3   4   5   6   7   8   9   10   11   12   13