Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Beijing Electronics
1006-8503
2006 Issue 1
Research on Major Courses' Resource Integration in Science of Information Security
song hong yang lu-ming wang wei-ping peng jia-yang (college of information science && engineering; central south university; changsha; hunan; 410083)
..............page:20-22
The Value Analysis of the New Time Outlook for Honors and Disgraces
li ben-song (philosophy faculty; renmin university of china; beijing 100872)
..............page:80-83
Application of Fuzzy Theory on Evaluation of Employee's Performance
wang you-qing yao ming-liang (xi an institution of technology; xi an 710032)
..............page:88-90
Career Requirement, Knowledge Architecture and Education Plan for Information-security Professional
wang wei-ping yang lu-ming (school of information science && engineer; central south university; changsha; hunan 410083; china)
..............page:47-49
Research on the System of Training Information Security Intelligence
zhao jun-ge wu xiao-ping qin yan-lin (department of information security; naval university of engineering; wuhan 430033; china)
..............page:27-29,31
Analysis of the Legal Globalization
l song-tao (institute of political science and international studies; beijing normal university; beijing 100875; china)
..............page:94-96
Analysis on Determinant Factors of Benefit of Beijing Agricultural Products Processing Enterprises
liu li-feng wu la-ping yang xin (school of economic management; china agricultural university; beijing 100094; china)
..............page:65-68,83
Exploration on the Humanized Management of Civil Servants in Our Country
xu dong-hua ge lei-lei hou si-qi (department of administration; beijing electronic science and technology institute; beijing; china.100070)
..............page:91-93
Study on Talents Cultivation of Information Security in University
yang guang-ming gao xiao-xing zhu zhi-liang chen dong-ming (software college of northeastern university; shenyang; liaoning; china; 110004)
..............page:55-57
The Research of Curriculum System Innovation for Computer-related-criminal Investigation of Public Security Universities
huo hong-tao wang ren-hua (information security department; the chinese people s public security university; beijing; 102623)
..............page:50-54,57
Study of Model-Based Integrated Network Security Protection System
liu bao-xu (computing center; institute of high energy physics; beijing 100049)
..............page:10-12,31
The Credit Risk Measurement of Farm Loan for Rural Credit Cooperatives in China
li zheng-bo gao jie cui wei-jie (school of agricultural economics and rural development; renmin university of china; beijing 100872; china)
..............page:69-74
“Information Countermeasure Techniques” Curriculum System of North-western Polytechnical University
mu de-jun dai guan-zhong (college of automation; northwestern polytechnical university; xian; 710072; china)
..............page:30-31
Research of Course Constructing about Information Security
wang xu-ren xu yuan-chao (information engineering college of capital normal university; beijing; 100037)
..............page:35-37
Discussion on Information Security-majored Curriculum Program
gu nai-jie12 huang liu-sheng12 liu xiao-hu12 (1. dept.of computer science && technology; university of science and technology of china; hefei 230027; china) (2. anhui province key laboratory of computing and communication software; hefei 230027; china)
..............page:13-16
Construction of Information Security Specialty on the basis of Features of University
li hui ma jian-feng (school of telecommunications; xidian university; key laboratory of computer networks and information security; ministry of education)
..............page:3-4,9
Research on Information Security Discipline and Talent Architecture
fan yong zhou an-min liu jia-yong dai zong-kun (dept. of information security engineer; sichuan university; chengdu sichuan 610064)
..............page:5-9
The Training of Information Security Professional
song yi-qing li yu-mei (beijing people s police college; beijing 100029; china)
..............page:41-43,46
Discussion on the Knowledge Structure and Training Means about Compound Application Talent in the Field of Computer and Law
wang yong-quan jin hui-fang liu qin (school of information science and technology; east china university of politics and low; shanghai 200042; china)
..............page:38-40
University, Enterprise and Training Organization Co-Cultivate Talents for Information Security
chen dong-ming zhu zhi-liang gao xiao-xing yang guang-ming (software college of northeastern university; shenyang; liaoning; china; 110004)
..............page:58-60,64
The Reflection of Humanistic Thoughts about “Xue Heng School”
duan yan (school of political science and international studies; beijing normal university; beijing 100875; china)
..............page:84-87,96
The Laboratorial Teaching Method of Theoretics and Technology of Cryptology Based on Component Technique
duan gui-hua yang lu-ming (college of information science and engineering; central south university; changsha 4l0083; china)
..............page:44-46
China Faces Four Challenges in Building a Harmonious Socialist Society
wu qun-fang (school of humanities and social science; university of science and technology of beijing; beijing:100083; china)
..............page:75-79
Discussion of Developing Model of Wide Scope for Information Security Professions
lin bo-gang (dept; computer science and technology; fuzhou university; fuzhou ; 350002; p.r.china)
..............page:17-19
Setting Up a Professional Laboratory for Information Security
lin hai xu yan wei xian-yong (beijing city university; computer centre; beijing 100083)
..............page:61-64