1 / 27
文档名称:

计算机病毒的正确防御探讨 毕业论文.doc

格式:doc   页数:27页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

计算机病毒的正确防御探讨 毕业论文.doc

上传人:酒酿小樱桃 2016/7/21 文件大小:0 KB

下载得到文件列表

计算机病毒的正确防御探讨 毕业论文.doc

文档介绍

文档介绍:1 广西科技大学毕业设计( 论文) 任务书课题名称计算机病毒的正确防御探讨系别电气与信息工程学院专业电子信息科学与技术班级学号姓名指导教师( 签字) 教研室主任( 签字)系主任( 签字) 2013 年 12月 20日 2 摘要计算机的日益普及,网络技术也在飞快的发展,计算机病毒的传播也越来越快, 范围越来越广,病毒带来的危害越越来越严重,如何才能有效的防御住病毒攻击,早发现, 早清除,减少损失,成了用户最为关切的问题。计算机病毒其实是一种人为编写的计算机运行代码或者说是计算机运行程序,某些人在掌握了一定的计算机知识,计算机硬件软件知识的基础上编写出来,通常是用于攻击其他计算机软硬件,照成故障或信息泄露。在一定意义上来说, 计算机病毒就是指可以破坏计算机的数据,影响计算机正常使用,可以造成计算机损坏的计算机程序。为了普及计算机防御的知识探讨,我收集了各种计算机病毒的研究资料,包括了计算机病的的历史,发展,入侵技术,防御技术等等,我收集的途径主要是通过网络,和书籍查阅,然后将资料整合编写。看过本论文的,都可以在一定程度上了解计算机病毒防御的大致内容。关键词:危害;计算机病毒;防治。 Abstract With the popularization puter, network technology has been rapid development, the spread of puter virus is ing more and more quickly, more and more widely, the harm caused by puter virus es more and more serious, how can effective defense against virus attack? early discovery, early removal, reduce the loss, has e the most concerned problems for users. In fact,puter virus isa human puter code ora program running on puter, some people written itby that they has learned puter knowledge, or base of hardware and software knowledge, it is often used to attack puter hardware and software, and then,it would lead toa failure or information leakage. So, ina broad sense, as long as they are able to cause puter failure, the destruction puter data, cause puter puter program can not run normally, can be called puter virus. In order to investigate the popularization puter defense knowledge, I collected data on all kinds puter viruses, puter virus history, development, intrusion technology, defense technology and soon, the way I collected mainly through work, and access to books, and then write the data integration. The effect is objective, and it can influence the perceptions puter virus defense ina certain extent. 3 目录摘要..................................................................................................................................................... 1 1 绪论...............................................................................................................