Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2004 Issue 9
News
..............
page:78-79
Exhibition
..............
page:76-77
Production Show
..............
page:74-75
Human Training
..............
page:73-73
Market Scan about Network Security Manager Platform
zhang zhen guo ; han jia
..............
page:71-72
Book Shelfs
..............
page:19-19,21
Application of Parallel Computing to Network Security
zhao xiao guang
..............
page:48-50
A Introduce of Electronic Payment System and Safe Technology
liu feng ; zhu jin wei ; xiao ji yi
..............
page:46-47,45
Application of PKI Technology in Governmental Office Automatization System
hu qing hui ; zhao zheng wen ; li li ping
..............
page:43-45
The Detection and Strategy Aims at Scattered Attack in A Scattered Campus Network
lu jin jun ; zhu zhen zhen
..............
page:40-42
A Case Analyse of Security Architecture
tan an fen ; jiang jian guo
..............
page:37-39
The Information Security Assurance Engineering of Information System
chen guang ; kuang xing hua
..............
page:34-36,39
Emphasizing Disaster Recovery Protecting,Protecting National Essential Information System
xiong si zuo
..............
page:13-13
E-Governments and Information Security Forum in Beijing
zhan ying
..............
page:10-12
E-Government Conferences in Beijing
zhan ying
..............
page:5-5
The Case Analyze for Stolen and Spread other's Net Account
liu li kai ; zhang chu
..............
page:69-70,72
The Application of WanFa Fax Server for CITS
..............
page:68-68
Wang Yu IDS Run in Taxi System
wang yu
..............
page:66-67
The Analyze of Safeguard Technology Apply in JingDun Net
wang xiang xin
..............
page:63-65
The Application of CTI Technology in E-Government
lv shi jun ; hao xiao yan ; wang yong hui
..............
page:61-62
The Concept Model and Assessment Model of Information System Security Risk
zuo jing hua ; wang xiao dong ; shao zhong kui ; zhu wei guo
..............
page:58-60
Security Analysis and Management of Police Information Network System
tian ye ; xie yong zhong
..............
page:55-57
Based Cross-certified Mesh Model Optimizing Design of PKI Certificate Validation
chou yu ; xia ling
..............
page:51-54
Main Problems and Countermeasures of The Computer Network Security
ren hong wei ; deng fei qi
..............
page:31-33,27
Network Information Security Study Based on Microsoft ISAPI
wang xin li ; jiang ji zuo ; shen xiao jing
..............
page:28-30
Application of Network Packet Intercept Technology Based on Linux and Windows Operating System
qiu hao ; xiong wen can ; li xiang
..............
page:24-27
The First Troy Virtue in the Mobile
..............
page:23-23
Trojan Horse Techniques and Defense
wu qi ze
..............
page:22-23
The Worm's Yesterday and Tomorrow
liang hong
..............
page:20-21
Overview of Disaster Recovery Technology
hou hai bo ; yang jun
..............
page:15-18
Discuss Disaster Recovery
meng ya ping
..............
page:14-14