Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2004 Issue 9
News
..............page:78-79
Exhibition
..............page:76-77
Production Show
..............page:74-75
Human Training
..............page:73-73
Market Scan about Network Security Manager Platform
zhang zhen guo ; han jia
..............page:71-72
Book Shelfs
..............page:19-19,21
Application of Parallel Computing to Network Security
zhao xiao guang
..............page:48-50
A Introduce of Electronic Payment System and Safe Technology
liu feng ; zhu jin wei ; xiao ji yi
..............page:46-47,45
Application of PKI Technology in Governmental Office Automatization System
hu qing hui ; zhao zheng wen ; li li ping
..............page:43-45
The Detection and Strategy Aims at Scattered Attack in A Scattered Campus Network
lu jin jun ; zhu zhen zhen
..............page:40-42
A Case Analyse of Security Architecture
tan an fen ; jiang jian guo
..............page:37-39
The Information Security Assurance Engineering of Information System
chen guang ; kuang xing hua
..............page:34-36,39
E-Governments and Information Security Forum in Beijing
zhan ying
..............page:10-12
E-Government Conferences in Beijing
zhan ying
..............page:5-5
The Case Analyze for Stolen and Spread other's Net Account
liu li kai ; zhang chu
..............page:69-70,72
Wang Yu IDS Run in Taxi System
wang yu
..............page:66-67
The Analyze of Safeguard Technology Apply in JingDun Net
wang xiang xin
..............page:63-65
The Application of CTI Technology in E-Government
lv shi jun ; hao xiao yan ; wang yong hui
..............page:61-62
The Concept Model and Assessment Model of Information System Security Risk
zuo jing hua ; wang xiao dong ; shao zhong kui ; zhu wei guo
..............page:58-60
Security Analysis and Management of Police Information Network System
tian ye ; xie yong zhong
..............page:55-57
Main Problems and Countermeasures of The Computer Network Security
ren hong wei ; deng fei qi
..............page:31-33,27
Network Information Security Study Based on Microsoft ISAPI
wang xin li ; jiang ji zuo ; shen xiao jing
..............page:28-30
The First Troy Virtue in the Mobile
..............page:23-23
Trojan Horse Techniques and Defense
wu qi ze
..............page:22-23
The Worm's Yesterday and Tomorrow
liang hong
..............page:20-21
Overview of Disaster Recovery Technology
hou hai bo ; yang jun
..............page:15-18
Discuss Disaster Recovery
meng ya ping
..............page:14-14