• 回答数

    4

  • 浏览数

    135

nana鬼鬼
首页 > 职称论文 > 信息系统安全论文外文文献

4个回答 默认排序
  • 默认排序
  • 按时间排序

花花only

已采纳

外文文献各类外文文献的文后参考文献格式与中文示例相同;为了计算机检索方便,建议题名的首字母及各个实词的首字母大写,期刊的刊名等可用全称或按ISO 4规定的缩写格式。为了减少外文刊名引用不规范所造成的引文统计及链接误差,建议以(SXXXX-XXXX)格式在刊名后加ISSN号。例:[24]JONES R of Composite Materials[M].New York:McGraw Hill Book Company,1975.[25]Marcel des Relations Internationales[M]. 4th ed. Paris: Dalloz,1988.[26]CHERNIK B E. Introduction to Library Services for Library Technicians[M]. Littleton,Colo.:Libraries Unlimited,Inc,1982.[27]International Federation of Library Association and Institutions.Names of Persons:National Usages for Entry in Catalogues[M]. 3rd International Office for UBC,1977[28]Klaus Drite Reich[M].Müchen:Bund-Verlag GmbH,1979.[29]ГригорянСВ.РудничнаяГеохимия[M].Москва: Недра,1992.

275 评论

后知后觉付

Needs analysis System Target Library management information system is a typical management information system (MIS), including the development of the main background of the establishment and maintenance of database and application development front-end aspects. The former requirement for data consistency and integrity to build strong. Good library of data security. For applications which require full-featured and easy to use and so on. System development to achieve the overall task is to systematize all kinds of information, standardization and automation. Requirements definition As a student of library management system requirements are: 1. According to a variety of ways (such as title, number, author) for the situation of the library collection. 2. The ability to easily borrow books, renew books, the return of books. 3. Be able to query their own data, the situation to borrow books. 4. To familiarize themselves with the use of library management system. As librarians, their library management system requirements are: 1. To facilitate the entry of the registration books, write-off old books. 2. To facilitate the registration of new students, or students who have graduated write-off information (basic information, loan information). 3. Can be released at any time such as the extended college students to borrow books, the Museum's collection, the use of information, etc., so that college students can be kept informed of some of our library information. Function Description System analysis is the overall development of the system based on the completion of tasks. The system needs to be done mainly in the function of Part 5: A basic book of the entry, modify, delete and other basic operations. 1. Standard categories of books, types of information input, including the type of number, category name, keyword, Remarks information. 2. Type of information query book, modify, including the type of number, category name, keyword, Remarks information. 3. Importation of books information, including the book number, book title, book type, author name, publishing the name, date of publication, book pages, keyword, date of registration, information, etc. Note. B for a library card module. 1. New Life for a library card. 2. For the loss of library card. C library functions to achieve. 1. Enter the library information, including library information number, study number, the reader name, book number, book name, date library, information, etc. Note. 2. Library information inquiries, changes of information, including library code, the reader ID, the reader name, book number, book name, date library, information, etc. Note. D realization of the book also features. 1. Enter the book information, including information code book, the reader ID, the reader name, book number, book name, date library, Date Book, Note information. 2. Book of the query and modify information, including information on book number, study number, the reader name, book number, book name, date library, Date Book, Note information. E can make it easier to carry out inquiries on the books. The case of extended automatically given message. Performance requirements The accuracy, reliability, efficiency, integrity, easy to use, maintainability, test line, reusability, security, confidentiality, understandable, and portability, connectivity. Operational flow chart (as follows:) Database design 1. Database Needs Analysis A concrete manifestation of the needs of users in a variety of information, storage, update and query, which requires the database structure to fully meet a variety of output and input information. Basic data collection, data structure to deal with the process, the composition of a detailed data dictionary for the specific design of the back to lay the groundwork. Books for the general demand for management information systems, library management through the contents of the working process and data flow analysis, design as shown in the following data items and data structures: ● the type of information the reader, Attributes: the type of number, type the name of the number of library, library period, the expiry date Remarks. Primary key: the type of number ● reader information Attributes: ID readers, and readers the names of the types of readers, readers of gender, work unit, home address, telephone number, e-mail address, date processing, Remarks. Primary key: the reader code ● books categories information Attributes: type of number, category name, keyword, Remarks information. Primary Key: Type Number ● book information, Attributes: number of books, book title, book type, author name, publishing the name, date of publication, book pages, keyword, date of registration, Remarks information. Primary key: number of books ● loan information, Attribute: Lending information ID, the reader ID, the reader name, book number, book name, date library, Date Book, Note information. Primary Key: Loan Information Number First, the system through the investigation and feasibility analysis, data flow diagram to draw the system: Basic information input basic information input D1 D2 Basic information input basic information input D3 D4 D5 Lending Information Entry Information the reader to return information back to books Data Dictionary (Data Dictionary). 1, data flow, for example the DD table is as follows: Data Flow System name: library management code: Entry Name: readers alias information: Source: reader registration place: D3 Data flow structure: Reader registration number + = (readers readers readers name + gender + work + ... ...) A brief description: Amend the record: the preparation of the date of Audit Date 2, data elements, for example the DD table is as follows: Data elements System name: library management code Entry name: reader ID alias Data streams are: Registration of Storage readers Office: D3 readers information table Data element value: Code type: Character Width: 10 The scope and meaning of values: A brief description: Every reader has a unique ID Amend the record: the preparation of the date of Audit Date 3, data storage, for example the DD table is as follows: Data Storage System name: library management code: D4 Entry Name: Books table alias: Storage organizations: the number of records: about 3000 the main keyword: number of books The amount of data: about 500KB Des keywords: Main Index by Number Record consists of: Field Name: ID books books books the author name ... ... Keywords ... Width: 8 ... 14 32 ... 10 ... A brief description: Amend the record: the preparation of: Date: Audit: Date: 4, data processing, for example the DD table is as follows: Data processing System name: library management code: Entry Name: Loan information alias entry: Input: loan number, the reader ID ... Output: borrow the basic attributes of information table Processing logic: dabase loan information is stored in a database table borrowinfo A brief description: enter a reader's borrowing record books Amend the record: the preparation of: Date: Audit: Date: 2. The concept of the structural design of the database This procedure, including the entities are as follows: Type of information entities readers, and readers of information entities, information entities, categories of books, books of information entities, information entities borrow. The relationship between entities E-R diagram 3. Logical structure of the database design ⑴ basic information table books Book: Field Name Data Type Field Description ISBN bookid save text Save the text of the title bookname booktype text book type of preservation Save the text save bookauthor author of the book Save the text of the book bookpub Press bookpubdate date / time to preserve the book's publication date Digital Preservation bookpages book pages text keyword bookkeyword bookindate date / time storage time whether the loan putup text Remarks Remarks bookmemo ⑵ library card information form (the reader information table) reader: Field Name Data Type Field Description Save the text readers readerno No. readername text) to preserve the names of the readers readersex text) to preserve the reader sex Save the text readers readertype categories Save the text readers readerdep department address preservation of the text addresses the reader Phone text readers readertel Save email text to preserve the reader's e-mail address checkdate Date / Time Loan Date Remarks Remarks readermemo ⑶ Lending Information Table borrowinfo: Field Name Data Type Field Description Loan No. borrowno save text text reader readerid Save ID Save the text readername borrow names borrowdate Date / Time Save Loan Date returndate date / time to preserve the date book memo Remarks Remarks Category ⑷ table books booktype: Field Name Data Type Field Description Save the text books booktypeno words Type the name of the text preserved typename texdisk should be used RAID (RAID 01) 4. In order to preveaddress. Second, the server should be equipped with software a) Operating System: Microsoft Windows 2000 server or Microsoft Windows 2000 Advanced server b) Database: Microsoft SQL Server 2000 (Simplified Chinese) c) the server must use a specialized firewall and anti-virus software. d) In addition to running the procedure must be equipped with outside the recommendations of the server has nothing to do as much as possible not to install additional procedures, procedures to reduce the confusion or conflict in the accident process. e) each department as far as possible a unified operating system. (Windows 9x series, or Windows 2000 series). Management software to avoid them because of the inconsistent versions of the operating system overhead caused by too much. f) each department must also install the machine anti-virus software and firewalls. To prevent the worm on the network throughout the network within the scope of the spread. g) if you want to print more involved in field reports, should be

133 评论

妞妞们要健康

是写在参考文献那的吗?问格式怎么写?

322 评论

江河装饰

小木虫上可以论文求助。

344 评论

相关问答

  • 信息系统安全论文外文文献

    14.4.2 外文文献各类外文文献的文后参考文献格式与中文示例相同;为了计算机检索方便,建议题名的首字母及各个实词的首字母大写,期刊的刊名等可用全称或按ISO

    nana鬼鬼 4人参与回答 2023-12-06
  • 软考信息系统安全管理论文

    信息系统项目管理师属于软考高级资格考试,信息系统项目管理师论文科目安排在下午考试,论文考试为写作题,满分为75分,论文科目的合格标准基本上稳定在45分。软考高级

    来一块钱包子 3人参与回答 2023-12-10
  • 免费信息系统安全毕业论文

    随着当今计算机科技的快速发展,人们也越来越重视计算机网络的安全问题。下面是我为大家推荐的计算机网络安全 毕业 论文,供大家参考。计算机网络安全毕业论文篇一:

    唐伯兔吃小白兔 5人参与回答 2023-12-07
  • 计算机信息系统安全概论论文题目

    学术堂整理了二十条计算机方面的毕业论文题目,供大家参考:1、星连通圈网络和三角塔网络的若干性质研究2、中职《计算机应用基础》分层次教学研究3、基于MSP430单

    edward1015 4人参与回答 2023-12-09
  • 信息安全论文文献

    方面很广,关键是你会写什么方面的 计算机软件及计算机应用(2452) 互联网技术(1558) 信息经济与邮政经济(1514) 工业经济(736) 电信技术(32

    美眉要加油 4人参与回答 2023-12-06