• 回答数

    6

  • 浏览数

    288

啊呜咖啡
首页 > 论文问答 > 计算机相关的英文文献

6个回答 默认排序
  • 默认排序
  • 按时间排序

昵称真是醉了

已采纳
朋友你好,是关于JAVA开发J2EE™+server+with+dynamic方面的文献,英文文献+翻译,PDF格式的,你可以自己转化下,里面内容也可以复制粘贴选你需要的,已经发到你邮箱了,记得采纳哦,谢谢。
138 评论

牛奶荡糕

1、文献类型选择在文献查询页面,“文献类型选择”列出了本系统中可提供用户查询的各类型文献数据库。这是一个必选项目,可以单选,也可以多选或全选。系统具有跨库检索功能,可同时在多个数据库中查寻文献。2、查询范围选择这是一个单选项目。可在作者、标题、文摘、关键词、分类号或全文检索等项目中任选一项,确定系统对数据库中相应字段进行检索。其中“全文检索”选项可对数据库中的所有字段进行查找。3、查询年限选择用于选择欲查文献的出版年份。所选择的年份相当于当年的1月1日至12月31日,默认时间为全部年。4、输入检索词可以输入与查询主题密切相关的单个词进行检索,也可以通过 “and”(与)、“or ”(或)、“not”(非)进行组配,构成比较复杂的逻辑检索式。例如,欲查找有关计算机辅助设计的论文,可以用中文词组“计算机辅助设计”或英文缩写“CAD”来表达,通过“或”的关系连缀起来,可以构成这样一个检索式:计算机辅助设计 or CAD 输入完检索条件后,按“查询”按钮,就可查询到相关文献的题录列表。

251 评论

一一欧巴桑

给我邮箱随便发个邮件,我给你发过去

303 评论

美丽依然张

网络游戏有客户端和服务端之分就网页游戏来讲 客户端技术有flex 和 javascript服务端技术有c++,java,c#,php,python 等选用什么技术一般是看游戏的设计要求和团队人员的技术组成如果你想做网页游戏开发建议你学习flex 网页游戏客户端现在的主流技术就是flex 服务端语言因为项目的不同选用的语言也会有所差别,所以很难说哪个技术是服务端主流技术

236 评论

立志做渔婆

德国施普林格(Springer-Verlag)是世界上著名的科技出版集团。目前Springer LINK所提供的全文电子期刊共包含439种学术期刊(其中近400种为英文期刊),按学科分为以下11个“在线图书馆”:生命科学、医学、数学、化学、计算机科学、经济、法律、工程学、环境科学地球科学、物理学与天文学,是科研人员的重要信息源。这个数据库高校图书馆收录的情况不一样,如果你登不了学校图书馆,你可以通过seek68文献馆进入Springer数据库下载你需要的文献,seek68文献馆有免费试用和低付费两种途径。除了这个数据库,还涵盖了许多其他的知名外文数据库。

185 评论

dapangduola

Computer network virus and precautions With the new network technology and application of the continuous rapid development of the computer network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human More inseparable from the lives of the community's reliance on them will keep With With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed Sharp also increased, by an ever-increasing scope of the Therefore, the protection of the security of computer networks will be Will become increasingly A computer virus The definition of computer virus computer virus (Computer Virus) in the "people's republic of China The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of computer instructions, or " Second, network virus With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the Internet The virus is an emerging concept in the traditional The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as: "Love the back door", "Panda burning " Third, network virus and the distinction between computer virus The original common computer virus is nothing more than the devastating formatted hard drive, delete system With the users documents, databases, The mode of transmission is through nothing but also by virus infection Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems The pilot virus and infected executable file virus, in addition to a network virus These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer Source collapse of the network server Fourth, the network against virus Network destructive virus, will directly affect the work of the network, ranging from lowering speed video Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed D Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by The next few years, the size of the market will reach Security 60 billion One antivirus software experts pointed out: "Network avian flu virus even " Such as: "Xiong Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows Forms bottom of the top mobile hard drives, and other means of While LAN once a computer machine For infection, it can spread through the entire network instant, or even within a very short period of time can be infected Thousands of computers, can lead to serious Symptoms of poisoning in the performance of computers There are Exe files have become a strange pattern, the pattern shown as "Panda Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company All computer LAN will all "Panda burning incense," only more than half a month, a few varieties have high Of more than 50, and the number of its users infected constantly Makes infected, "Panda burn incense" disease The personal drug users has been as high as several million people infected with a few more corporate users is rising Network More on the computer network the greater the harm caused by the V network transmission of the virus Features Infection fast: single machine environment, the virus can only be passed from one computer diskette To another, and in the network can be adopted by the rapid spread of network communication According to measurement Set against a typical PC network use in normal circumstances, once a computer workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬 Inter spread to thousands of miles Dissemination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation virus Therefore, Only workstations in addition to killing viruses, and can not solve the virus harm to the network 6, the type of network virus As the network increasingly developed, the type of network virus has been increasing, generally summed up as The following categories: Worm It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network And e-mail, the prefix is W For example, in recent years the great harm "Nimda" virus is Demodex A worm The virus used Microsoft's Windows operating system, computer flu With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most important user Macro Virus Hong virus is a Storage in the document or template in the Acer computer The prefix Macro, once open such documents, which Acer will be implemented, then the virus would Acer Been enabled transferred to the computer, and in the presence of the Normal From then on, all since The document will be kept moving "infection" that the Hong virus, and if other users opened the flu Documents with the virus, the Hong virus will be transferred to his Destructive procedures virus The prefix destructive virus program is: H The characteristics of this virus is a good in itself Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users Computer generated If C formatted disk (HformatCf), the killer orders (H CKiller) System virus The prefix system for the virus: Win32, PE, Win95, W32, W95, and so These viruses The characteristics of the general public can be infected with the windows operating system * exe and * dll file, And through these documents for If the CIH Backdoor virus Backdoor virus prefix is B The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety Bundling machine virus Bundled-virus prefix is: B The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface It is normal to see the paper, when users run these bundled virus, will run these applications on the surface Procedures, and then tied to the operation of hidden virus, which caused harm to the Such as: baled Tied QQ (BQQPQQBin), the system killer (Bkillsys) Script virus The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience Planting procedures virus virus This virus is of the public will run from the in vivo release of one or several new Under the virus to the system directory, by the release of a new virus If the glaciers are sowing (DBingH2C), MSN striker (DWSmibag) Joke virus The prefix is the virus joke: J Also called prank The characteristics of this virus is itself a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact The virus did not destroy any computer Such as: ghost (JGirlghost) Trojan hacking virus Trojan its prefix is: Trojan, hackers virus prefix General for H Public special Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world User information, hackers virus there is a visual interface to the user's computer remotely C Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users Brain, and hackers virus will be passed to the Trojan horse virus General Trojan such as QQ News tail Trojan TQQ3344, there are big TLMPSW Virus Form A PSW or anything like PWD general said that the virus has stolen password function, If some hacker programs, such as network枭雄HNC 7, the mode of transmission and network anti-virus Through the above, we can see that e-mail viruses spread Click homepage, users download, Others implant, implant, and other loopholes through five computer transmission, so long as holding these five A thoroughfare, we will be able to live better anti-virus

137 评论

相关问答

  • 计算机相关的英文文献

    Computer network virus and precautions With the new network technology and appli

    五月mother 5人参与回答 2024-05-11
  • 计算机相关英文文献

    给我邮箱随便发个邮件,我给你发过去

    安妮果果33 4人参与回答 2024-05-12
  • 计算机相关文献

    《计算机网络工程基础》本书是"21世纪高职高专规划教材"《计算机网络应用基础》的姊妹篇。在《计算机网络应用基础》中作者提出并回答了一个问题:远在异国他乡的服务器

    钟玉婷是好孩纸 2人参与回答 2024-05-14
  • 计算机相关英语论文

    Information literacy Knowing how to find data from several sources, select relev

    无敌小猪猪侠 3人参与回答 2024-05-11
  • 计算机网络相关文献

    直接百度这么方面的教程- -一般售书的都有详细作品资料比如-/这个网站就有很多书类似淘宝上面也有详细需要什么书子去找下吧

    时空归宿 3人参与回答 2024-05-14