Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2004 Issue 2
Discussion on virus protection under groupware environment
ou gang ping
..............
page:73-75
World's three public appraisals on crypto algorithms
wang qiu li
..............
page:76-78
Two techniques for file hiding
wang shu qin
..............
page:79-79
Yanxiang brought forth two kinds of ETX structural main board
..............
page:80-80
Magic key escorting data security
..............
page:72-72
Products technically appraised (accepted) or tested by State Secrets Bureau
..............
page:70-71
WonicWall:popular products of "noble descent"
li xue
..............
page:69-69
Content-management's future prospect-Content Networks
..............
page:68-68
Research on implementations of SSO under EAI environment
ma hua xing ; chen jian bo
..............
page:41-43
A new port-scanning technology-Idle scanning
chen ; dai zu feng
..............
page:38-40
Policy-based security-intelligence-bound model
liang lin ; shi yi juan ; tie ling
..............
page:35-37
Research on chaotic-sequence-based DES algorithm
zuo tao ; jiang guo ping
..............
page:33-34
Review on embedding technologies for Trojan horse
pan mian ; xue zhi ; li jian hua ; li sheng hong
..............
page:30-32
During time for dash thriving from growing up to surpassing--An interview with Beijing Jinnuoda Tianze Sci & Tech Corp.
xiang yong yang
..............
page:27-29
Ceremony for public appraisal and prize of first-selection qualified product-brand from sincere enterprises held in Beijing
..............
page:26-26
NetScreen meeting clients' high-grade netsec requirements
..............
page:26-26
Legend repeatedly won big prizes at year-end products well received
..............
page:25-25
ICCC 2004 to be held in Beijing
..............
page:25-25
Vigorously developing infosec technologies and industry ensuring building-up of infosec hierarchical protection system
jing qian yuan
..............
page:22-24
Brooking no delay for establishment (or revision) of professional standards of database
feng yu cai
..............
page:19-21
Inspecting new features of emergency processing through network-worm disaster
du yue jin
..............
page:17-18
Netsec affecting state destiny
wang qing dong
..............
page:1-1
Energetically strengthening inspection of security technologies vigorously promoting development of secrets work under new situation
cai hong
..............
page:6-8
2003's annual report on network and information security both at home and abroad (Part Ⅱ)
wu shi zhong
..............
page:9-12
How to break through personnel bottle-neck of infosec
cui guang yao
..............
page:13-16
Security:acquiring triumph through 4~7-level protection
xiang yong yang
..............
page:66-67
Network security and Asian enterprises
Peter Thorne
..............
page:64-65
Shaanxi Secrets Bureau conscientiously doing secrets management well in e-government
..............
page:62-63
LAN extending solution giving support to Lanzhow Bureau of Public Security
..............
page:60-61
Application of network monitoring system in LAN
wang jin lin ; zhao man sheng
..............
page:58-59
Infosec-from service to management
wang ya fei
..............
page:54-57
Big Legend big security
cui guang yao
..............
page:51-53
Be prudent in using China's remainder theorem for raising RSA efficiency
yang zuo ; sun yu
..............
page:49-50
Building up of circulation pattern for DRM-based e-book
yang xiao peng ; li jia bin
..............
page:46-48
Network-based host security and key technologies
ying wei ping
..............
page:44-45