Although “We-media” appeared earlier in foreign countries, its emergence in our country is relatively recent. It has the characteristics of commonality, low registration cost and fast information dissemination, which is favored by people of all ages, especially young people. The rise of “We-media” not only brings development opportunities to network security, but also can expand the scope of influence for publicizing network security credibility to a certain extent. However, at the same time, it also brings new challenges to network security. As a college educator, the author tries to analyze network security dialectically from the perspective of “We-media”, so as to further explain its influence on ideological and political education in co...
Since the 90s of last century, due to the rapid development of network technology, human society has...
With the growth of hacking, denial of service (DoS) attacks, virus/worm propagation, and other modes...
While the number of the people and even the instutitions using computer and computer components were...
Network ideological security education is a realistic issue that universities must pay attention to....
Abstract—The rapid development and wide application of computer network effectively promoted the dev...
With the development and progress of science and technology, the Internet is widely used in every as...
The network has become an important channel for current college and university students to exchange ...
In this paper, we described the Computer network security because it has become more important to pe...
Cyber Security is a combination of processes, technologies and practices. The objective of Cyber Sec...
Distance education has been an important development tendency and learning platform with the emphasi...
The growing use of eLearning systems has been documented by numerous studies and with enormous growt...
From the viewpoint of cybercrime, young people represent a particularly vulnerable category of Inter...
Abstract. Along with the rapid development of network technology, as an important position in the di...
Network security has become a growing challenge in industry and education. With the increase of viru...
With the rapid development of China’s science and technology, today’s Internet communication technol...
Since the 90s of last century, due to the rapid development of network technology, human society has...
With the growth of hacking, denial of service (DoS) attacks, virus/worm propagation, and other modes...
While the number of the people and even the instutitions using computer and computer components were...
Network ideological security education is a realistic issue that universities must pay attention to....
Abstract—The rapid development and wide application of computer network effectively promoted the dev...
With the development and progress of science and technology, the Internet is widely used in every as...
The network has become an important channel for current college and university students to exchange ...
In this paper, we described the Computer network security because it has become more important to pe...
Cyber Security is a combination of processes, technologies and practices. The objective of Cyber Sec...
Distance education has been an important development tendency and learning platform with the emphasi...
The growing use of eLearning systems has been documented by numerous studies and with enormous growt...
From the viewpoint of cybercrime, young people represent a particularly vulnerable category of Inter...
Abstract. Along with the rapid development of network technology, as an important position in the di...
Network security has become a growing challenge in industry and education. With the increase of viru...
With the rapid development of China’s science and technology, today’s Internet communication technol...
Since the 90s of last century, due to the rapid development of network technology, human society has...
With the growth of hacking, denial of service (DoS) attacks, virus/worm propagation, and other modes...
While the number of the people and even the instutitions using computer and computer components were...