Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2004 Issue 1
Patriot mobile memory:building up strong data security fortress
..............
page:71-71
SOBIG-F raking first on 2003 virus list
..............
page:72-73
Tapped while in power-on, also compromising while in power-off
wei qing
..............
page:74-74
Be careful! Automatic memory in WPS Office may also compromise
jin ying yun
..............
page:75-75
New cavalry for Internet management
..............
page:76-76
Mail security information gate SMG
..............
page:77-77
Legend's CISP cultivation:let security service brilliant
cui guang yao
..............
page:78-79
Maipu sincerely inviting elites
..............
page:80-80
Products publication by China Testing and Certification Centre for Infosec Products
..............
page:69-70
Xiameng Customs:Cope with new security challenge
..............
page:68-68
Overall raising of tele-industry's "immunity"
..............
page:66-67
Solutions for banking security
zhang jian
..............
page:64-65
Perfect incorporation of cooperation, competition, channel and service
xiang yong yang
..............
page:62-63
A new star in network security field
zhang jing
..............
page:60-61
No.706 Institute:devote itself to developing computer security techniques and products with independent intellectual property right
zhang jing
..............
page:59-60
Implementation of network management system event mechanism based on CIM event model
zhou bin ; tie ling ; li ping
..............
page:37-39
GSM operator adopting new steps to prohibit cell phone from being stolen
xu ming jie ; li zuo
..............
page:35-36
IDA-based key distribution scheme
zhang zhi hui ; fan xiao zuo ; yang yi xian
..............
page:33-34
Research on identity certification system of LDAP directory service
zheng xiao guang ; tie ling ; zhu hong wen
..............
page:30-32
Pay attention to subtleness so as to soar high
xiang yong yang
..............
page:28-29
Chongqing two centers passed technical appraisal
..............
page:27-27
NetScreen successfully purchased Neoteris
..............
page:26-26
Grasp new opportunity, initiate new situation
luo tian wen
..............
page:1-1
Academician specialists' New Year words
wang ya fei
..............
page:6-7
Strengthen infosec assurance
..............
page:8-11
2003's annual report on network and information security both at home and abroad (PartⅠ)
wu shi zhong
..............
page:12-14
Listen to waves:seas in turbulence' powerful enterprises fighting for supremacyface to face with presidents of China's inforsec enterprises
wang ya fei
..............
page:15-18
With 9 security visions to annotate communication network security architecture
yang lin
..............
page:19-23
30 Sheng'an adding impressive brilliance to Sichuan's e-government building
..............
page:24-24
8th World's Computer Fair shall be held in April this year
..............
page:25-25
A new generation of ECM:New Interwoven
li xue
..............
page:57-58
IPv6 application approaching near
li xue
..............
page:56-57
Perfect management so as to yield "gains"
xiang yong yang
..............
page:54-55
How to do well infosec management of e-government
zheng qi shu
..............
page:52-53
Never to "lay stress only on hardware and neglect software" for e-government infosec
chen peng
..............
page:51-51
Zhang Yong:let Nokia even more outstanding
ai xin
..............
page:48-50
A key escrow scheme with functionality of deception identification
shen liang ; tie ling ; li jian hua
..............
page:45-47
Techniques to raise firewall performance
liu zuo ; li zhi tang
..............
page:43-44
Research on UMTS access security
li zuo ; liu zheng jun ; tan shui ying
..............
page:40-42