Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2015 Issue 1
2015 yuan zhong guo xin xi an quan jie geng jia chu cai
qing zuo ;
..............
page:6-7
zhuan jia ji yu
..............
page:10-11
yang xue shan 2014 nian zhong guo dian zi xin xi chan ye chi xu kuai su fa zhan
..............
page:12-12
duo bu men lian he zheng zhi yin xing ka wang shang fei fa mai mai
..............
page:13-13
wen hua bu zheng zhi wang luo wen hua chan pin di su zhi feng
..............
page:13-13
gong xin bu zhao kai quan guo gong ye he xin xi hua gong zuo hui
..............
page:13-13
gong shang zong ju 2015 nian kai zhan wang luo shou jia zhuan xiang yan da
..............
page:13-13
guo ji wang luo he xin xi an quan fa zhan dong tai
..............
page:14-15
hai wai shi ye
..............
page:16-16
2014 zhong guo xin xi chan ye ling xiu ren wu ming dan chu lu
..............
page:17-17
shu ju an quan zai bao zhong bang zha dan 12306 shu ju xie lu shi jian que ren wei zhuang ku gong ji
..............
page:17-17
gong tong tui dong si chuan xin xi an quan he hang kong dian zi chan ye kua yue fa zhan
..............
page:17-17
shu zi - hai wai
..............
page:18-19
re ci - hai wai
..............
page:18-18
re ci - guo nei
..............
page:19-19
hui wang shu yu wang luo an quan de 2014-- yi chan ye wei shi jiao
ben kan bian ji bu ;
..............
page:20-21
jia kuai zi zhu chuang xin tui dong chan ye zhuan xing sheng ji
an zuo peng ;
..............
page:22-24
ru he ying dui xin xi an quan chan ye mian lin de xin tiao zhan
feng wei ;
..............
page:25-27
wo guo xin xi an quan chan ye ji xu bao chi kuai su zeng chang
gong xin bu sai di xin xi an quan yan jiu suo ;
..............
page:28-28
ru wang 20 nian zhong guo zai wang luo kong jian geng xian zi xin
zhu rui ;
..............
page:29-29
wang luo re huo chao tian you gong ji you fang hu
xiao an ;
..............
page:30-30
gei wang min de an quan guan nian shang gen xian
chen tong ;
..............
page:31-31
zhong guo dian zi shang wu fa zhi shi dai lai lin
a la mu si ;
..............
page:32-35
zi zhu ke kong zhan lue xia xin xi an quan chan ye fa zhan zhuang da de si kao
zhong bo ;
..............
page:36-37
xin xi an quan qi ye kai fang he zuo shi da shi qu
li guo ;
..............
page:38-38
zhong guo shu ju an quan cheng xian wu da fa zhan qu shi
ding chao ;
..............
page:39-39
fan qi dao er xing zhi de chan ye cheng gong zhi dao
fang cheng ;
..............
page:40-40,42
xin xi ji shu zi zhu ke kong geng jia gei li
zhu jin song ;
..............
page:41-42
wang luo jing ji de dian fu shi chuang xin fa zhan si wei
fang cheng ;
..............
page:43-43
ren cai zhu meng wang luo an quan chan ye
zhu jin song ;
..............
page:44-44
gong ye kong zhi xi tong mian lin wei xie yi ran yan jun
cheng peng ;
..............
page:45-45
12306 wang zhan xin xi xie lu shi jian de fa lv dui ce tan tao
yang li ;
..............
page:46-49
2014 nian guo nei xin xi an quan re dian shi jian hui gu
zhu rui ;
..............
page:50-53
2015 nian wang luo an quan re dian zhan wang
yang xue ;, gao hong jing ;
..............
page:54-55
2014 xin xi an quan yu tong xin bao mi za zhi li shi hui wei chan ye fa zhan xun lu
zhu rui ;, yang chen ;
..............
page:56-58
zhong guo xin xi an quan chan ye fa zhan lun tan zuo 2014 xin xi an quan yu tong xin bao mi za zhi bian wei hui zhao kai
yang chen ;
..............
page:59-61
quan guo wang luo xin xi an quan gong kai sai jue sai ju xing
..............
page:61-61
zuo hao dang zheng ji guan wang zhan an quan guan li gong zuo -- zhong yang wang xin ban 1 hao wen jian jie du
zuo xiao dong ;
..............
page:62-63
chao xian zao shou wang luo gong ji hou yin fa de si kao
yang yong ;
..............
page:64-64
shi jie tao lun wang luo hu lian yin te wang zhong jiang diao bi -- chao xian duan wang shi jian hou fang lv shu wang jiao shou
yang chen ;, li chang hong ;
..............
page:65-67
2014 nian quan qiu wang luo kong jian an quan shi da shi jian
li shi xing ;
..............
page:68-70
2014 nian quan qiu wang luo kong jian an quan tai shi ji zhu yao jian she ju cuo zong shu
guo li min ;
..............
page:71-77
tan mi qi ming xing chen da shu ju an quan fen xi ping tai
luo xian ;
..............
page:78-79
li tui chan ye zhuan xing hu hang da an quan hang tian xin xi ti su sheng ji bu fa
xu shan cai ;, yang zuo ;
..............
page:80-80,81
rui jie zhu liao ning yi dong shi xian gong jiao wlan shou yi bi huan
..............
page:81-81
wang kang ims zhu li he fei kui jie wei xin ying xiao
..............
page:82-82
zhong guan cun ke xin ji suan chan ye lian meng di yi qi ke xin ji suan pei xun ban kai jiang
..............
page:83-83
hui chen zi xun fen xi da shu ju shi dai cun zai san lei wen ti
..............
page:83-83
guo xin ling tong jia meng zhong guo tong xin qi ye xie hui
..............
page:83-83
min jie ke ji da yin an quan guan li xi tong psm
..............
page:84-84
zi zhu ke kong de shang pin fang wei
..............
page:84-84
tu shu tui jian
..............
page:85-85
Exploration on Data Security under Cloud Computing
LIU Dong-sheng;,FAN Pei;,ZHANG Liang;
..............
page:87-89,94
Study on Fine Control of Network based on DPI
ZUO Wei;
..............
page:90-94
Operational Parameters Test for SSL VPN based on MITM
XU Hui;,ZHOU Zhi-hong;,LI Jian-hua;,YAO Li-hong;
..............
page:95-98
A Rainbow-Table Plain Generation Method based on Segmented Charset
ZHANG Chen-ling;
..............
page:99-102
IT Service Management System for Small and Medium-Sized Commercial bank based on ITIL
LIU Jian;,DONG Chun;
..............
page:103-108
Discuss on Integration of ISMS and BCM System
WANG Feng-jiao;,XU Ran;,WEI Jun;
..............
page:109-111
?tong xin ji shu ? zheng gao qi shi
?tong xin ji shu ? bian ji bu ;
..............
page:111-111
Analysis on Infosec Requirement of Classified Protection for Government Portal Site
YUAN Jing;,REN Wei-hong;,TAD Yuan;,WANG Li-le;,SHANG Xu-guang;,WANG Ning;,ZHANG Wei;
..............
page:112-115
Brief Introducation of the USA Network Security and Information Assurance Research Plan
WANG Yu;
..............
page:116-120