{"title":"网络安全基础设施管理","authors":"Kittichote Rojanakul, Hu Liang","doi":"10.1109/ICCSIT.2009.5234673","DOIUrl":null,"url":null,"abstract":"IT Infrastructure is a core asset to many organizations Internet is a global communication medium. The stability and security of network is very important. A well establish a secure infrastructure would help your network safe from intrusion from any source any place. Protection of resources is an important aspect of any computer system. Harnessing and configuring security policy is an important role to safeguard network infrastructure.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network security infrastructure management\",\"authors\":\"Kittichote Rojanakul, Hu Liang\",\"doi\":\"10.1109/ICCSIT.2009.5234673\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IT Infrastructure is a core asset to many organizations Internet is a global communication medium. The stability and security of network is very important. A well establish a secure infrastructure would help your network safe from intrusion from any source any place. Protection of resources is an important aspect of any computer system. Harnessing and configuring security policy is an important role to safeguard network infrastructure.\",\"PeriodicalId\":342396,\"journal\":{\"name\":\"2009 2nd IEEE International Conference on Computer Science and Information Technology\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 2nd IEEE International Conference on Computer Science and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSIT.2009.5234673\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 2nd IEEE International Conference on Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSIT.2009.5234673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IT Infrastructure is a core asset to many organizations Internet is a global communication medium. The stability and security of network is very important. A well establish a secure infrastructure would help your network safe from intrusion from any source any place. Protection of resources is an important aspect of any computer system. Harnessing and configuring security policy is an important role to safeguard network infrastructure.