About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Application of Big Data, Blockchain, and Internet of Things for Education Informatization. First EAI International Conference, BigIoT-EDU 2021, Virtual Event, August 1–3, 2021, Proceedings, Part II

Research Article

Application Analysis of Data Technology in Computer Information Security Education

Download(Requires a free EAI acccount)
155 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-87903-7_63,
        author={Xiaopeng Qiu},
        title={Application Analysis of Data Technology in Computer Information Security Education},
        proceedings={Application of Big Data, Blockchain, and Internet of Things for Education Informatization. First EAI International Conference, BigIoT-EDU 2021, Virtual Event, August 1--3, 2021, Proceedings, Part II},
        proceedings_a={BIGIOT-EDU PT2},
        year={2021},
        month={10},
        keywords={Big data Computer Information security},
        doi={10.1007/978-3-030-87903-7_63}
    }
    
  • Xiaopeng Qiu
    Year: 2021
    Application Analysis of Data Technology in Computer Information Security Education
    BIGIOT-EDU PT2
    Springer
    DOI: 10.1007/978-3-030-87903-7_63
Xiaopeng Qiu1
  • 1: Central South University

Abstract

With the development of information technology, big data technology is widely used to improve people’s work efficiency. At present, computers are widely used in various industries, and information security is of great practical significance for enterprises. In order to further improve security, big data technology must be effectively applied to computer information security protection. This paper discusses the big data technology in computer information security to a certain extent. On this basis, the in-depth analysis and Research on the application of big data technology provides a reliable guarantee for computer information security, and has certain reference significance for technical personnel engaged in related business.

Keywords
Big data Computer Information security
Published
2021-10-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-87903-7_63
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL