[1] |
ZHANG Wenkai.Customs Informatization: Risk Management of Information Technology Outsourcing in Operation and Maintenance[J]. China Management Informationization,2014(1):63-65.
|
|
张文凯. 海关信息化:信息化运维外包的风险管理[J].中国管理信息化,2014(1):63-65.
|
[2] |
ZHANG Hui,WANG Wei,GUO Dong.A Framework for Building Microservices-based Desktop Cloud[J]. Netinfo Security,2017(2):35-42.
|
|
张辉,王伟,郭栋.一种基于微服务范式的桌面云构建框架[J].信息网络安全,2017(2):35-42.
|
[3] |
Cloud Technology Community.DevOps Fire Best Practices from Senior Operation Engineers[M].Beijing:China Machine Press,2017: 316-326.
|
|
云技术社区.运维前线一线运维专家的运维方法、技巧与实践[M].北京:机械工业出版社,2017:316-326.
|
[4] |
ZHOU Liang.Research on Outsourcing Management Mode of Public Service Informatization Construction[D]. Beijing: Graduate School of Chinese Academy of Social Sciences,2012.
|
|
周梁. 公共服务信息化建设外包管理模式研究[D].北京:中国社会科学院研究生院,2012.
|
[5] |
LI Hui.Knowing Yourself before Knowing Others——Probing into the Informatization Outsourcing Service in Government[J]. Shanghai Informatization,2007(1):23-25.
|
|
李慧. 先知已后知彼——政府信息化服务外包探秘[J].上海信息化,2007(1):23-25.
|
[6] |
XIANG Linbo,LIU Chuanyi.Key Technology Research and Implement on Insider Threat for Controlled Cloud Computing[J].Netinfo Security,2016(3):53-58.
|
|
向林波,刘川意.针对内部威胁的可控云计算关键技术研究与实现[J].信息网络安全,2016(3):53-58.
|
[7] |
LI Bei,TIAN Yangguang,LI Qian.Discussion on Outsourcing Management of Operation and Maintenance for Government Departments in E-government Construction[J]. Heilongjiang Science and Technology Information,2014(13):137.
|
|
李蓓,田阳光,李谦.浅议政府部门在电子政务建设中的运维外包管理[J].黑龙江科技信息,2014(13):137.
|
[8] |
LIN Zefu,CHEN Dequan,WEN Ke.Risk Management Strategy in Information Technology Outsourcing[J]. Science of Science and Management of S.&.T.,2004,25(2):133-135.
|
|
林则夫,陈德泉,温珂.试论信息技术外包中的风险管理策略[J].科学学与科学技术管理,2004,25(2):133-135.
|
[9] |
HONG Bing,XIA Hui,LIU Hong.Strategy Analysis of IT Outsourcing for Enterprises[J]. Journal of Industrial Engineering and Engineering Management, 2002,16(2):38-41.
|
|
红兵,夏晖,刘洪.企业信息技术外包的策略分析[J].管理工程学报,2002,16(2):38-41.
|
[10] |
WEN Weiping,GUO Ronghua,MENG Zheng, et al.Research and Implementation on Information Security Risk Assessment Key Technology[J]. Netinfo Security,2015(2):7-14.
|
|
文伟平,郭荣华,孟正,等.信息安全风险评估关键技术研究与实现[J].信息网络安全,2015(2):7-14.
|