導航:首頁 > 網路連接 > 關於計算機網路文獻的外文

關於計算機網路文獻的外文

發布時間:2022-07-23 05:12:21

『壹』 計算機網路工程畢業設計,需要計算機方面的英文文獻及翻譯,5000字以上,親們發給我哦。

可加我「扣扣」細談,扣扣號碼見我的ID
附件2:外文原文
The History of the Internet
The Beginning - ARPAnet
The Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet had no idea of the possibilities of an "Internet."
By definition, an 'Internet' is four or more computers connected by a network.
ARPAnet achieved its network by using a protocol called TCP/IP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh.
By the 80's ARPAnet, just years away from becoming the more well known Internet, had 200 computers. The Defense Department, satisfied with ARPAnets results, decided to fully adopt it into service, and connected many military computers and resources into the network. ARPAnet then had 562 computers on its network. By the year 1984, it had over 1000 computers on its network.
In 1986 ARPAnet (supposedly) shut down, but only the organization shut
down, and the existing networks still existed between the more than 1000
computers. It shut down e to a failied link up with NSF, who wanted to
connect its 5 countywide super computers into ARPAnet.
With the funding of NSF, new high speed lines were successfully installed
at line speeds of 56k (a normal modem nowadays) through telephone lines
in 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were 290,000.
Another network was built to support the incredible number of people
joining. It was constructed in 1992.
Today - The Internet
Today, the Internet has become one of the most important technological advancements in the history of humanity. Everyone wants to get 'on line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will have Internet access. The Internet ha
起源——ARPAnet
Internet是被美國政府作為一項工程進行開發的。這項工程的目的,是為了建立遠距離之間點與點的通信,以便處理國家軍事范圍內的緊急事件,例如核戰爭。這項工程被命名為ARPAnet,它就是Internet的前身。建立此工程的主要應用對象就是軍事通訊,那些負責ARPAnet的工程師們當時也沒有想到它將成為「Internet」。
根據定義,一個「Internet」應該由四或者更多的計算機連接起來的網路。
ARPAnet是通過一種叫TCP/IP的協議實現連網工作的。此協議最基礎的工作原理是:如果信息在網路中的一條路徑發送失敗,那麼它將找到其他路徑進行發送,就好象建立一種語言以便一台計算機與其他計算機「交談」一樣,但不注意它是PC,或是Macintosh。
到了20世紀80年代,ARPAnet已經開始變成目前更為有名的Internet了,它擁有200台在線主機。國防部很滿意ARPAnets的成果,於是決定全力將它培養為能夠聯系很多軍事主機,資源共享的服務網路。到了1984年,它就已經超過1000台主機在線了。
在1986年ARPAnet關閉了,但僅僅是建立它的機構關閉了,而網路繼續存在與超過1000台的主機之間。由於使用NSF連接失敗,ARPAnet才被關閉。NSF是將5個國家范圍內的超級計算機連入ARPAnet。
隨著NSF的建立,新的高速的傳輸介質被成功的使用,在1988年,用戶能通過56k的電話線上網。在那個時候有28,174台主機連入Internet。到了1989年有80,000台主機連入Internet。到1989年末,就有290,000台主機連入了。
另外還有其他網路被建立,並支持用戶以驚人的數量接入。於1992年正式建立。
現狀——Internet
如今,Internet已經成為人類歷史上最先進技術的一種。每個人都想「上網」去體驗一下Internet中的信息財富。成千上百的人都用Internet。預計,到了2003年世界上的每個人,都將擁有Internet接入。Internet已經真正成為我們這個年代生活的一部分。由於計算機技術和網路技術每天都在改變,我們很難想像Internet下一步將發展成什麼樣子。
工作原理:
現在,人們用Internet是一件很平常的事。他們通過Internet進行購物、玩游戲、聊天等娛樂活動。
Internet不僅僅是一件事物。Internet也會崩潰。它的工作原理如同電話通信系統,只不過沒有專門的Internet公司來經營Internet。
Internet是成千上萬台計算機互相連接的集合。Internet就像是辦公網路一樣,不同的是,它有成千上萬台計算機相連接。
其中最主要的是Internet是如何進行通信的。位於Houston的一台計算機是如何通過瀏覽網頁而能與位於Tokyo的計算機進行數據通信的呢?
Internet信息,擁有信息的計算機連接到Internet,是基於語言。這種語言叫做TCP/IP。TCP/IP建立了一種語言,能使計算機在Internet系統中傳送數據。
但是TCP/IP的取得也必須具備兩台電腦之間的物理連接。

『貳』 求計算機中英文文獻!十萬火急!

樓主要加分啊!

Computer network virus and precautions

With the new network technology and application of the continuous rapid development of the computer network should
Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human
More inseparable from the lives of the community's reliance on them will keep growing. With
With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low
Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus
The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed
Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be
Will become increasingly important.
A computer virus
The definition of computer virus computer virus (Computer Virus) in the "people's republic of China
The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or
Computer program inserted in the damage or destruction of computer data functions, affecting computer use
Self-replication and can a group of computer instructions, or code. "
Second, network virus
With the development of network and the Internet, a wider spread, the greater New harm
The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional
The virus was not classified network virus this concept, because the development of networks, the traditional virus
The network also has a number of characteristics. Today's Internet virus is a broad notion of a
As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as:
"Love the back door", "Panda burning incense."
Third, network virus and the distinction between computer virus
The original common computer virus is nothing more than the devastating formatted hard drive, delete system
With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection
Mutual of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems
The pilot virus and infected executable file virus, in addition to a network virus
These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side
Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer
Source collapse of the network server worm.
Fourth, the network against virus
Network destructive virus, will directly affect the work of the network, ranging from lowering speed video
Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed
Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan,
But this figure is constantly rising year by year. The next few years, the size of the market will reach Security
60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong
Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ
Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows
Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine
For infection, it can spread through the entire network instant, or even within a very short period of time can be infected
Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers
There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda
Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company
All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high
Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease
The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network
More on the computer network the greater the harm caused by the virus.
V. network transmission of the virus Features
1. Infection fast: single machine environment, the virus can only be passed from one computer diskette
To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement
Set against a typical PC network use in normal circumstances, once a computer workstation sick
Drugs, and will be online within 10 minutes in the several hundreds of all infected computers.
2. Proliferation of a wide range: in the network e to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬
Inter spread to thousands of miles away.
3. Dissemination in the form of complex and varied: computer viruses in general through the network "
Station server workstation "channels of communication, but in the form of complex and diverse communication.
4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents
Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work
Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal
The work of a workstation is likely to be on-line by another workstation virus infection. Therefore,
Only workstations in addition to killing viruses, and can not solve the virus harm to the network is.
6, the type of network virus
As the network increasingly developed, the type of network virus has been increasing, generally summed up as
The following categories:
1. Worm
It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network
And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex
A worm virus. The virus used Microsoft's Windows operating system, computer flu
With this virus, will continue to automatically dial-up Internet access and use information in the document or the address
Sharing network spreads, and ultimately undermine the most important user data.
2. Macro Virus
Hong virus is a Storage in the document or template in the Acer computer virus. The prefix
Macro, once open such documents, which Acer will be implemented, then the virus would Acer
Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since
The document will be kept moving "infection" that the Hong virus, and if other users opened the flu
Documents with the virus, the Hong virus will be transferred to his computer.
3. Destructive proceres virus
The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself
Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users
Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm.
Command.Killer).
4. System virus
The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses
The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file,
And through these documents for dissemination. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is Backdoor. The total of such virus through network -
Sowing, opened the back door to the system to the user and potential safety problems.
6. Bundling machine virus
Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use
Specific proceres will be bundled with a number of applications such as QQ, IE bundled up on the surface
It is normal to see the paper, when users run these bundled virus, will run these applications on the surface
Proceres, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled
Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually
Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information,
Computer user inconvenience caused.
8. Planting proceres virus virus
This virus is of the public will run from the in vivo release of one or several new
Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing
(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag).
9. Joke virus
The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation,
When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact
The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus.
10. Trojan hacking virus
Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special
Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world
User information, hackers virus there is a visual interface to the user's computer remotely
Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users
Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ
News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form
A PSW or anything like PWD general said that the virus has stolen password function,
If some hacker programs, such as network梟雄Hack.Nether.Client.
7, the mode of transmission and network anti-virus
Through the above, we can see that e-mail viruses spread Click homepage, users download,
Others implant, implant, and other loopholes through five computer transmission, so long as holding these five
A thoroughfare, we will be able to live better anti-virus network.

計算機網路病毒與防範

隨著各種新的網路技術的不斷應用和迅速發展, 計算機網路的應
用范圍變得越來越廣泛, 所起的作用越來越重要, 計算機網路與人類
的生活更加密不可分, 社會對其的依賴程度也會隨之不斷增長。而隨
著計算機技術的不斷發展, 病毒也變得越來越復雜和高級, 新一代的
計算機病毒充分利用某些常用操作系統與應用軟體的低防護性的弱
點不斷肆虐, 最近幾年隨著網際網路在全球的普及, 將含病毒文件附加
在郵件中的情況不斷增多, 通過網路傳播病毒, 使得病毒的擴散速度
也急驟提高, 受感染的范圍越來越廣。因此, 計算機網路的安全保護將
會變得越來越重要。
一、計算機病毒
計算機病毒的定義計算機病毒(Computer Virus)在《中華人民共和
國計算機信息系統安全保護條例》中被明確定義, 病毒「指編制或者在
計算機程序中插入的破壞計算機功能或者破壞數據, 影響計算機使用
並且能夠自我復制的一組計算機指令或者程序代碼」。
二、網路病毒
隨著網路和Internet 的發展,一個傳播范圍更廣,危害更大的新型
病毒應運而生.這就是網路病毒。網路病毒是一個新興的概念, 在傳統
的病毒分類里沒有網路病毒這個概念, 由於網路的發展, 傳統的病毒
也就具有了一些網路的特性。如今的網路病毒是一個廣義的概念, 一
般只要是利用網路來進行傳播、破壞的都可以被稱為網路病毒, 如:
「愛情後門」、「熊貓燒香」等。
三、網路病毒與計算機病毒的區別
原先常見的計算機病毒的破壞性無非就是格式化硬碟, 刪除系統
與用戶文件、破壞資料庫等等。而傳播途徑也無非是通過遭病毒感染
的軟體的互相拷貝, 攜帶病毒的盜版光碟的使用等, 如感染磁碟系統
區的引導型病毒和感染可執行文件的文件型病毒, 而網路病毒除了具
有普通病毒的這些特性外, 還具有遠端竊取用戶數據、遠端控制對方
計算機等破壞特性, 比如特洛伊木馬病毒和消耗網路計算機的運行資
源, 拖垮網路伺服器的蠕蟲病毒。
四、網路病毒的危害
網路上病毒破壞性大, 將直接影響網路的工作, 輕則降低速度, 影
響工作效率, 重則使網路崩潰, 破壞伺服器信息, 使多年工作毀於一
旦。每年由於病毒等網路欺詐行為導致的經濟損失高達160 億多元,
而且這個數字逐年還在不斷地攀升。未來幾年, 安防市場規模將達到
600 億元。一位殺毒軟體專家指出: 「網路病毒更甚於禽流感」。如: 「熊
貓燒香」除了通過網站帶毒感染用戶之外, 此病毒還會通過QQ 最新
漏洞傳播自身, 通過網路文件共享、默認共享、系統弱口令、U 盤及窗
體頂端窗體底端移動硬碟等多種途徑傳播。而區域網中只要有一台機
器感染, 就可以瞬間傳遍整個網路, 甚至在極短時間之內就可以感染
幾千台計算機, 嚴重時可以導致網路癱瘓。中毒症狀表現為電腦中所
有可執行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為「熊貓
燒香」, 繼而系統藍屏、頻繁重啟、硬碟數據被破壞等, 嚴重的整個公司
區域網內所有電腦會全部中毒。「熊貓燒香」僅半個多月, 變種數已高
達50 多個, 並且其感染用戶的數量不斷擴大。使得感染「熊貓燒香」病
毒的個人用戶已經高達幾百萬, 企業用戶感染數更是成倍上升。網路
上的計算機越多, 網路病毒造成的危害越大。
五、網路病毒傳播特點
1.感染速度快: 在單機環境下, 病毒只能通過軟盤從一台計算機
帶到另一台, 而在網路中則可以通過網路通訊機制迅速擴散。根據測
定, 針對一台典型的PC 網路在正常使用情況, 只要有一台工作站有病
毒, 就可在幾十分鍾內將網上的數百台計算機全部感染。
2.擴散面廣: 由於病毒在網路中擴散非常快, 擴散范圍很大, 不但能迅速傳染區域網內所有計算機, 還能通過遠程工作站將病毒在一瞬
間傳播到千里之外。
3.傳播的形式復雜多樣: 計算機病毒在網路上一般是通過「工作
站伺服器工作站」的途徑進行傳播的, 但傳播的形式復雜多樣。
4.難於徹底清除: 單機上的計算機病毒有時可通過刪除帶毒文件
或低級格式化硬碟等措施將病毒徹底清除, 而網路中只要有一台工作
站未能消毒干凈就可使整個網路重新被病毒感染, 甚至剛剛完成清除
工作的一台工作站就有可能被網上另一台帶毒工作站所感染。因此,
僅對工作站進行病毒殺除, 並不能解決病毒對網路的危害。
六、網路病毒的類型
由於網路越來越發達, 網路病毒的種類也越來越多, 大體歸納為
以下幾類:
1.蠕蟲病毒
它的傳染機理是利用網路進行復制和傳播, 傳染途徑是通過網路
和電子郵件,前綴是Worm。比如近年危害很大的「尼姆達」病毒就是蠕
蟲病毒的一種。這一病毒利用了微軟視窗操作系統的漏洞, 計算機感
染這一病毒後, 會不斷自動撥號上網, 並利用文件中的地址信息或者
網路共享進行傳播, 最終破壞用戶的大部分重要數據。
2.宏病毒
宏病毒是一種寄存在文檔或模板的宏中的計算機病毒。前綴是
Macro, 一旦打開這樣的文檔, 其中的宏就會被執行, 於是宏病毒就會
被激活, 轉移到計算機上, 並駐留在Normal 模板上。從此以後, 所有自
動保存的文檔都會「感染」上這種宏病毒, 而且如果其他用戶打開了感
染病毒的文檔, 宏病毒又會轉移到他的計算機上。
3.破壞性程序病毒
破壞性程序病毒的前綴是: Harm。這類病毒的特性是本身具有好
看的圖標來誘惑用戶點擊, 當用戶點擊病毒時, 病毒便會直接對用戶
計算機產生破壞。如格式化C 盤(Harm.formatC.f) 、殺手命令(Harm.
Command.Killer) 等。
4.系統病毒
系統病毒的前綴為:Win32、PE、Win95、W32、W95 等。這些病毒的
一般公有的特性是可以感染windows 操作系統的*.exe 和*.dll 文件,
並通過這些文件進行傳播。如CIH 病毒。
5.後門病毒
後門病毒的前綴是Backdoor。該類病毒的共有特性是通過網路傳
播, 給系統開後門, 給用戶帶來安全隱患。
6.捆綁機病毒
捆綁機病毒的前綴是: Binder。這類病毒的特性是病毒作者會使用
特定的捆綁程序將病毒與一些應用程序如QQ、IE 捆綁起來, 表面上
看是正常文件, 當用戶運行這些捆綁病毒時, 會表面上運行這些應用
程序, 然後隱藏運行捆綁在一起的病毒, 從而給用戶造成危害。如: 捆
綁QQ(Binder.QQPass.QQBin) 、系統殺手(Binder.killsys) 等。
7.腳本病毒
腳本病毒通常是JavaScript 代碼編寫的惡意代碼, 前綴是通常為
Spript, 一般帶有廣告性質, 會修改您的IE 首頁、修改注冊表等信息,
造成用戶使用計算機不方便。
8.病毒種植程序病毒
這類病毒的公有特性是運行時會從體內釋放出一個或幾個新的
病毒到系統目錄下, 由釋放出來的新病毒產生破壞。如冰河播種者
(Dropper.BingHe2.2C) 、MSN 射手(Dropper.Worm.Smibag)等。
9.玩笑病毒
玩笑病毒的前綴是: Joke。也稱惡作劇病毒。這類病毒的特性是本身具有好看的圖標來誘惑用戶點擊,
當用戶點擊這類病毒時, 病毒會做出各種破壞操作來嚇唬用戶, 其實
病毒並沒有對用戶電腦進行任何破壞。如: 女鬼( Joke.Girlghost) 病毒。
10.木馬黑客病毒
木馬病毒其前綴是: Trojan, 黑客病毒前綴名一般為Hack。公有特
性是通過網路或者系統漏洞進入用戶的系統並隱藏, 然後向外界泄露
用戶信息, 黑客病毒則有一個可視的界面, 能對用戶的電腦進行遠程
控制。木馬、黑客病毒往往是成對出現的, 木馬病毒負責侵入用戶的電
腦, 而黑客病毒則會通過該木馬病毒來進行控制。。一般的木馬如QQ
消息尾巴木馬Trojan.QQ3344, 還有大Trojan.LMir.PSW.60。病毒名中
有PSW或者什麼PWD 之類的一般表示這個病毒有盜取密碼的功能,
一些黑客程序如網路梟雄Hack.Nether.Client 等。

『叄』 哪裡有有關計算機網路安全的英文參考文獻

嗯,到這里來看看吧~

美國國家網路安全聯盟
http://www.cyberpartnership.org/

信息安全英文資料庫
http://marc.theaimsgroup.com/

關於無線網路安全問題的探討(英文資料)
http://www.infosecurity.org.cn/article/hacker/freshman/9700.html

網路安全英文文獻免費下載
http://www.wenkoo.cn/search/wendang/%CD%F8%C2%E7%B0%B2%C8%AB%D3%A2%CE%C4%CE%C4%CF%D7/1

『肆』 請問有關計算機網路方面的英文文獻哪裡下載

計算機網路方面的英文書籍一般是PDF文件格式。

一般來說,下載成功率比較高的,是通過P2P軟體,我經常用的是emule,就是www.verycd.com上下載的。

使用這些下載軟體的時候,通常是利用軟體的「搜索」功能。比如,你所需要的計算機網路方面的書籍,一般是:computer network, network, computer net等,或者你到當當網、china-pub等網上書店上,看好了名字,在p2p軟體中搜索也行。

通過搜索引擎進行檢索也是另一種方式,但在搜索的時候最好加上「.pdf」的後綴名。

謝謝^_^

『伍』 在計算機網路方面,IEEE的英文全稱是什麼

電氣與電子工程師協會(IEEE)
IEEE——美國電氣與電子工程師學會,英文全稱是:The
Institute
of
Electrical
and
Electronics
Engineers,國際上通常簡稱IEEE。
IEEE是美國一個較大的科學技術團體,由美國電氣工程師學會(AIEE)和美國無線電工程師學會(IRE)合並而成。
IEEE現已逐漸發展成一個國際性的學術機構,其學術活動已伸展到世界各地。
IEEE每年均有大量的出版物,在國際上頗有影響,在電子學文獻中佔有相當重要的地位。IEEE收錄的文獻有期刊、會議錄、圖書、論文等。目前,IEEE出版物在我國高等院校和科技部門的利用率較高。
據悉,外國報刊目錄刊載IEEE期刊共有112種,我館訂購了其中的95種。為了提高外文期刊的利用率,2000年10月新館402(西文過刊)室對讀者做了一項調查,調查結果顯示:IEEE期刊利用率在56%,共有53種IEEE期刊被讀者多次利用。現將利用率排名在前十名的IEEE期刊作一介紹,提供過刊排架號、期刊原版號、刊名、期刊內容的中文簡介。

『陸』 請問到哪裡可以免費下載計算機方面的英文文獻呢

計算機網路方面的英文書籍一般是pdf文件格式。
一般來說,下載成功率比較高的,是通過p2p軟體,我經常用的是emule,就是www.verycd.com上下載的。
使用這些下載軟體的時候,通常是利用軟體的「搜索」功能。比如,你所需要的計算機網路方面的書籍,一般是:computer
network,
network,
computer
net等,或者你到當當網、china-pub等網上書店上,看好了名字,在p2p軟體中搜索也行。
通過搜索引擎進行檢索也是另一種方式,但在搜索的時候最好加上「.pdf」的後綴名。
謝謝^_^

『柒』 求計算機網路方面的英文文獻,要有來源出處和作者,提供幾個地址,謝謝~

童鞋你好!
這個估計需要自己搜索了!
網上基本很難找到免費給你服務的!
我在這里給你點搜索國際上常用的外文資料庫:
----------------------------------------------------------
❶ISI web of knowledge Engineering Village2
❷Elsevier SDOL資料庫 IEEE/IEE(IEL)
❸EBSCOhost RSC英國皇家化學學會
❹ACM美國計算機學會 ASCE美國土木工程師學會
❺Springer電子期刊 WorldSciNet電子期刊全文庫
❻Nature周刊 NetLibrary電子圖書
❼ProQuest學位論文全文資料庫
❽國道外文專題資料庫 CALIS西文期刊目次資料庫
❾推薦使用ISI web of knowledge Engineering Village2
-----------------------------------------------------------
中文翻譯得自己做了,實在不成就谷歌翻譯。
弄完之後,自己閱讀幾遍弄順了就成啦!
學校以及老師都不會看這個東西的!
外文翻譯不是論文的主要內容!
所以,很容易過去的!
祝你好運!

『捌』 求一片外文的關於計算機網路方面的文獻

免費外文,推薦到OA圖書館查詢。
輸入你相查的關鍵詞的英文即可。

『玖』 計算機網路安全英文文獻一篇

There is no large-scale popularization of the computer before, it will lock important documents to a file cabinet or safe
Custody. With the computer, as well as the rapid development of the Internet tended to use computers and information networks
Data management. A variety of important information (such as trade secrets, patents, etc.) if not stored in the computer security measures, which just do not have access to locked file cabinet to store confidential documents. Due to the openness of the computer, such as structural characteristics and standardized so that a high degree of computer information-sharing and the spread of the characteristics of easy, resulting in the computer information (such as an important password) in the processing, storage, transmission and application of the process can easily be leaked, stolen, tampered with and destruction, or infection by computer viruses, backdoors, exploits and network hackers to bring substantial business risk. At this time, the security of your computer on to highlight the importance of it. Each computer users are more or lessviruses or Trojan horses, hackers, harassment. Brought by indivials against the loss may also not large, but for enterprises, may be drowned.

閱讀全文

與關於計算機網路文獻的外文相關的資料

熱點內容
花茶網路營銷 瀏覽:359
網路層和數據連接層 瀏覽:894
杭州計算機網路服務推薦咨詢 瀏覽:335
移動網路ip刷新 瀏覽:271
中興v9如何設置網路 瀏覽:667
太原手機端網路推廣價格價位 瀏覽:600
為什麼wifi滿格還顯示網路不給力 瀏覽:317
華為暢享9連著wifi和數據網路錯誤 瀏覽:33
怎麼判斷家裡網路是否為電信 瀏覽:428
佳能ts3180網路連接 瀏覽:795
網路游戲第一門戶站電腦端 瀏覽:465
蘋果沒有網路的時候wifi自動斷開 瀏覽:878
基督網路詩你在哪裡 瀏覽:120
千兆網線連接上了但是沒網路 瀏覽:214
臨沭機械行業網路營銷 瀏覽:977
蘋果網路最近不好用 瀏覽:548
網路無線橋接設置教程 瀏覽:152
小學生如何防電信網路詐騙 瀏覽:494
蘋果手機換完主板網路不好 瀏覽:555
路由器電信定製版能用廣電網路 瀏覽:380

友情鏈接