您当前的位置:
首页 >
文章列表页 >
Research on business security evaluation technology
更新时间:2026-04-20
    • Research on business security evaluation technology

    • Vol. 30, Issue 3, Pages: 77-82(2017)
    • DOI:10.13992/j.cnki.tetas.2017.03.019    

      CLC: F626;TP309
    • Published:2017

    移动端阅览

  • 冀文. Research on business security evaluation technology[J]. 2017, 30(3): 77-82. DOI: 10.13992/j.cnki.tetas.2017.03.019.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

35

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Data center infrastructure maintenance risk management technology
Study of flow-based business security risk assessment methods

Related Author

毛文杰
徐引进
张彤
陈文佳

Related Institution

中国联合网络通信有限公司上海市分公司
中国移动通信集团贵州有限公司
0