AbstractDiscussed the establishment of the computer network from the account is now experiencing rapid development of the four stages, It also showed the advantages and disadvantages of each period, the computer network of interpretation of some terms, such as : Computer networks are used communication lines and communications equipment, will be scattered in different locations and have a number of independent functional computer systems connectivity, In accordance with international standards for data network protocol communications, the network hardware, software, database resource sharing computer Principle computer network through different network operating systems and network protocol support has been functioning, as well as computer network system components, and how computer networks with the gradual deepening, Cyber Crime is becoming a common form of crime, the paper from the world of cyber-crime status, causes and the solutions to areas such as countermeasures discussed with a view to arouse social concern and hope that the legislative and judicial areas to further improve our existing network management system, thus the network to achieve effective crime prevention and On the future development made their viewsKeyword Network;Three stages;Hacker;Information superhighway
翻译成英文:Discuss with variable span and the constraints of X pattern matching problem, which extends therange of variable span effect of wildcards, X condition defines a matching number of textcharacters, forming a large and sparse candidate solution Description through the form, the input text, patterns and variable span is transformed into a directed acyclic graph structure, and prove that the graph structure in the path from the top layer to the bottom layer which is a collection of candidate solution space, the path subset independent of each other as the matching solution Then we give a graph structure of the path search Algorithm alternately pruning and search, use the preorder traversal delete redundant nodes, and according to the node's locationinformation and share information to choose the The experimental part adopts the matchingloss rate metrics of the completeness of the solution set of the solution, the results show that the algorithm with the heuristic algorithm can be complementary, effectively reduce the matching solution loss
On my position,the network security is facing many problems,not only on technical but also on people's Almost all people on the world think that the enviroment of the internet is worse and For the application of the new technology and the being worse network security, this paper will take the important factors of the network security as the key point to analyze the methods to against all kinds of factors which will affect the normal running of the network ,and let people know more about the net work security on every we should solve the problem when they are still in the blossom, so that we can ensure the running and management of the network securitykey words: Internet, information security, rights of the internet, crime by computer