Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2009 Issue 4
Cognition of Certification Requirement from ISO 27001 Certificated Enterprises at Home
QI Fang
..............
page:18
Hidden "Secrets" under Sunshine
WU Zhen
..............
page:16
Battle of Olympic Games' Copyright Is Won and Succeeded with Ease and Verve
XUE Qian
..............
page:13
Security Essential Technique, Accomplish Ethernet's 10000 mb/s Dream
BAI Jie
..............
page:9
2009, What's the Potential for SMB Market
HU Xiaohe;WU Zhen
..............
page:5
LOU Qinjian: Sichuan Communications Industry Should Strengthen Its Resolve and Pay Attention to
..............
page:2
NPC Passed Criminal Legal Provisions for Punishment of Network "Hacker"
..............
page:2
The Security of Small-and-Medium-sized Enterprises: Seeking Common Ground While Reserving
Mu Ying
..............
page:1
Research of General Dynamic Access Control Architecture Based on Multi-Decision
CHENG Jian-hao;JIANG Xing-hao;SUN Tai-feng;ZHOU Xiao-jun
..............
page:44
Applications of Anti-virus Security Gateway Technology in Data Exchange
WANG Xiang;WANG Zhao
..............
page:41
Solutions for Trusted Access
tian rong xin gong si
..............
page:39
Leadsec's Solution for IT Internal Control
lian xiang wang yu gong si
..............
page:37
Servers' Security Protection Solutions for Power Supply Bureaus
DING Changfu
..............
page:35
3G's Arrival, Radware Raises the Management-Control and Deployment-Optimization Ability of Mobile Communication Operator
LI Xue
..............
page:34
One Year's Price, 3-year's Protection, Kaspersky and Users Join Hands to Overcome Crisis
LI Xue
..............
page:33
A kind of three-layer structure server based on multi-channel adaptive method
KANG Yao;ZHANG Xin-jia
..............
page:67
Rational Key Escrowing Scheme Based on Fair Diffie-Hellman Scheme
DU Heng;ZHANG Ai-xin
..............
page:65
Bootloader Design and Development for Security Chip Based on M*Core
TAN Yong-wei;ZHOU Yu-jie
..............
page:62
Rapid Acquisition Algorithm for UWB Signal
SUN Ning;LIU Wei-ping
..............
page:59
A Scheme of IUB Flow Control based on RLC Retransfer Ratio Observation
WANG Yu;ZHANG Yuan;SHI Ji-zhao
..............
page:56
Simulation and FPGA Implementation Scheme for the Broadband Anti-jamming Signal
HUANG Wen-zhun;WANG Yong-sheng;WANG Ding
..............
page:53
Security Evaluation of Network System based on Threat Analysis
TU Guo-yong
..............
page:50
Design of secure deception network
PAN Biao
..............
page:47
Windows Host USB Port Monitor and Audit Technique in Data Center of Surveying & Mapping
ZHAI Yong;LIU Lei
..............
page:93
The Current Status and Future Trend of Removable Storage Security Management
CHEN Shang-yi;ZHOU Bo;HUANG Yun
..............
page:97
SafeNet Provides Security Escort for Innovation Of Digital Publication Service
LI Xue
..............
page:32
Netentsec's Recruit & New-Product Release Opened
LI Xue
..............
page:32
blue coat tui chu nei qian shi e yi ruan jian fang hu
hu xiao he
..............
page:31
Experts'Prompt: Rational Cognition of e-Bank Security
HU Xiaohe
..............
page:30
Build up Network Information Platform, Construct Public Monitoring-Right Cornerstone
wang yu shen zhou gong si
..............
page:29
2009, Foreign Security Enterprises Put On A Spurt to China's Blue Sea
BAI Jie
..............
page:26
Experienced the Baptism of Olympic Games, Venustech has Become Even More Dazzling
XUE Qian
..............
page:24
Protect Data Security, Build up "Chips" Defence Line of Mobile Storage
BAI Jie
..............
page:22
3G Brings Prospects to Infosec
ZENG Yong;SHU Yanmei
..............
page:21
Permission and Management Analysis between Exchange 2003 and Exchange 2007
JIN Jing;XUE Zhi
..............
page:71
Design and Implementation of Network Intrusion Prevention System Based on High-Speed Network Processor
WENG Wen-xiang;QIU Wei-dong
..............
page:73
Test Method of Anti-Spare Equipments in Real Environment
YU Su
..............
page:76
Security Evaluation Based On Attack Graph and Ant Algorithm
JIN Jing;SUN Dong-lai;CHEN Xiu-zhen
..............
page:79
System Design of DRM Applied in the Digital Media Distribution
ZOU Yang-wen;XIONG Yun-feng;YANG Yu-hang
..............
page:82
Research on DOS Attack and Defense of SIP
XU Zhen-duan;MA Jin;LU Song-nian
..............
page:84
Realization and Defense of Redirection Attack on SIP
ZHOU Wen;CHEN Kai;ZHANG Yan
..............
page:87
Intrusion Detection Prediction Model based on Limited Rational Replicator Dynamics
LI Jun;YIN Ying;CHEN Xiao-hua
..............
page:89