Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2002 Issue 4
Introduction to the international authoritative information security organization
li xiao lin ; xiong song zuo
..............
page:79-80
FOUND Secuway Firewall
..............
page:78
Huasheng's tianli.info-security products series:CyberGate 2.0
..............
page:77
Watching out for colonialism of cyber-culture
hua ling
..............
page:74-76
Cheese of IT
chen zhi long
..............
page:73-74
Network informationservices and its value ofcyber-culture
yang yu qin
..............
page:72
Strengthening quality management of security products for computer information system
..............
page:71
Info-security structure and info-security procedure
ma bing xing
..............
page:21-23
The info-security development strategy of national 863 projects
li jian hua
..............
page:16-20
The analysis of China Intemet security state
..............
page:14-15
Analysis on the great effect of“9.11” events to American info-security
cui guang yao
..............
page:7-13
The answer to qualification administrative measures for computer information system integration involving national secret
..............
page:5
Products identified by National Security Bureau
..............
page:69-70
Research of foreign info-security testing and evaluation system
li he tian
..............
page:67-68
Can't be conviction by fingerprint certification
wang yuan
..............
page:66
Welcome to the period of telecom legislation
ma zhi gang
..............
page:64-65
How long can infringing the copyright in cyberspace continue
zhang hong xia
..............
page:62-63
CAS ACCESS CO: The professional team in network security field
wei hong ru
..............
page:60-61
Bright star in CIS space
wang ya fei
..............
page:56-59
The solution of enterprise web security system
peng tao
..............
page:54-55
ChinaNet: hacher- worried TM beacon-fire series
..............
page:51-53
A new mode to build E-goverment
shuai qing hong ; zhu nan
..............
page:47-50
Proxy signcryption applied to E-commerce in mobile communications
ji wen feng ; wu xiu xian ; jin xian zhu ; yuan dong hao
..............
page:42-46
An information security technology based on recombinable logic system
..............
page:40-41
Analysis and application of the proposed standard for RBAC
liu hong yue ; ma jian feng ; fan jiu lun
..............
page:36-39
The Square attack on Camellia cipher
he ye ping ; qing si han
..............
page:33-35
Implementation of PN code time tracking algorithm in DS-CDMA system
ni hai feng ; zhao chun ming ; you xiao hu
..............
page:31-33
An interview with Mr. Zhou Yigang, general manager of Jia Long High Technology Coporation
cui guang yao
..............
page:28-30
The AI anti-hacker tools come into birth
..............
page:27
The sum of info-security market breakthrough 10 billion in 2001
..............
page:26
The heyday of 30info,the starting of Sheng'an
..............
page:25
Investigation announcement on national info-security industry issued
..............
page:24