相似文献/References:
[1]张伟,解争龙. 基于私有云泄漏的攻击方法研究[J].计算机技术与发展,2015,25(06):124.
ZHANG Wei,XIE Zheng-long. Research on Attack Method Based on Private Cloud Leak[J].,2015,25(02):124.
[2]姜 文,刘立康.基于云环境的大型应用软件联调[J].计算机技术与发展,2018,28(02):14.[doi:10.3969/j.issn.1673-629X.2018.02.004]
JIANG Wen,LIU Likang.Joint Debugging of Large Application Software Based on Cloud Environment[J].,2018,28(02):14.[doi:10.3969/j.issn.1673-629X.2018.02.004]
[3]谭天,袁嵩,肖洁. 云计算安全问题研究[J].计算机技术与发展,2016,26(09):124.
TAN Tian,YUAN Song,XIAO Jie. Research on Security Issues of Cloud Computing[J].,2016,26(02):124.
[4]姜 文,刘立康.基于云环境的持续集成[J].计算机技术与发展,2018,28(01):11.[doi:10.3969/ j. issn.1673-629X.2018.01.003]
JIANG Wen,LIU Li-kang.Continuous Integration Based on Cloud Environment[J].,2018,28(02):11.[doi:10.3969/ j. issn.1673-629X.2018.01.003]
[5]鲍陈,王海涛,汪千松,等.基于 vSphere 私有云的高校数据中心构建模式[J].计算机技术与发展,2019,29(05):182.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 038]
BAO Chen,WANG Hai-tao,WANG Qian-song,et al.Campus Internet Data Center Deployment Mode Based on vSphere Private Cloud[J].,2019,29(02):182.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 038]