Research on computer information processing and security technology based on big data technology

Ting Zou, Baoyi Zhang, Ruixue Liu

Abstract


with the continuous development of China’s Internet industry, computer information processing and security technology has
ushered in new development opportunities. In this process, there are also some challenges that we need to pay full attention to, so as to help the
further development of computer information processing and security technology. In order to further improve the comprehensive level of China’s
computer information processing and security technology, we should continue to deepen the research on big data technology and better integrate it
with computer information processing and security technology, so as to promote the further development of computer information processing and
security technology and highlight the practical application advantages of big data technology. In view of this, this paper will analyze the computer
information processing and security technology based on big data technology, and put forward some strategies for your reference.

Keywords


Big data technology; Computer information processing and security technology; exploration

Full Text:

PDF

Included Database


References


[1] Cheng Zhang Application analysis of big data technology in computer information security [j]Journal of Yellow River Institute of science and technology,

2022,24 (11): 49-54

[2] Yan Long Application of big data technology in computer information security [j]Integrated circuit applications, 2022,39 (10): 138-139

[3] Haiyan Li Application of big data technology in computer information security [j]Wireless Internet technology, 2022,19 (13): 141-143+162

[4] Chunyi Li Research on the application of big data technology in computer information security [j]Computer knowledge and technology, 2022,18 (14): 19-21

[5] Guojuan Wang,Anno Liu,Fuliang Huang On the application of big data technology in computer data information processing [j]Network security

technology and application, 2022 (05): 68-69

[6] Chunwang Lin Research on the application of big data technology in the fi eld of modern computer information security [j]Network security technology

and application, 2022 (05): 170-171

[7] Junhai Xue,Jintai Li,Cheng Zhang,Zhixin Li Research on the application of big data technology in computer information security [j]Network security

technology and application, 2022 (02): 70-71

[8] Wenjie Han,Yan Shan Discussion on the application of big data technology in computer information security [j]Information system engineering, 2021 (12):

109-112

[9] Hanyao Li Research on the application of big data technology in computer information security [j]Electronic testing, 2021 (24): 73-74+80

[10] Chen Su Analysis and discussion of computer information processing mode under big data [j]Nanfang agricultural machinery, 2020,51 (22): 195-196

[11] Muhtar ElkenApplication analysis of big data technology in computer information security [j]Network security technology and application, 2020 (10):

81-82

[12] Li Han Discussion on the development of computer information processing technology under the background of big data [j]Information system

engineering, 2020 (03): 26-27

[13] Wei Huang Discussion on computer information processing technology under big data [j]Information recording materials, 2019,20 (10): 136-137

[14] Zhimin Yang Discussion on computer information processing technology in the era of “big data” [j]Digital communication world, 2019 (08): 113-114

[15] Qiang Xie Discussion on network security big data technology and its application in computer information system [j]Computer programming skills and

maintenance, 2017 (04): 86-87




DOI: https://doi.org/10.18686/esta.v10i2.373

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Ting Zou,Baoyi Zhang,Ruixue Liu