Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Financial Computer of China
1001-0734
2007 Issue 2
Innovation blade server system helping data center to gain higher IT investment reward
yu ping
..............
page:87
2007 Information technology working conference of ICBC been held in Beijing
li yong
..............
page:88
jin rong dong tai 10 ze
..............
page:89-90
nong xing wan cheng shu ju da ji zhong xin xi hua jian she kai chuang xin ju mian
li qing li
..............
page:91
IT Information
..............
page:92-96
Itanium exceeding RISC and Helping user to construct new generation of data center
zhang zhi
..............
page:86
Application of Epson printer solution in postal system of Beijing
chun lei
..............
page:85
Symantec solution helping CCB to availably advance storage efficiency
hao jing
..............
page:83-84
Guarantee measures for security running of equipments in computer rooms of data center in key period
guan zhi wei ; li chong hui
..............
page:80-82
Forum of IBM 2007 been held in Beijing, Zhou Weikun explaining the method of innovation
li wen
..............
page:57
Characteristics and development trend of centralized accounting book system of PBC
huang shou cheng ; jiang shang zuo
..............
page:55-56
Taking advantage of an opportunity to advance the institutions withdraw and the reduction and redistribution depletion of numbers
zhong guo nong ye yin xing huai an shi fen xing ke ti zu
..............
page:52-54
SunGard and Kingstar helping securities industry of China to march toward internationalization
wang xiao jun
..............
page:51
Some modes of application system in insurance industry
lin shan shan
..............
page:46-50
Summarization of enterprise architecture methods(cont.)
yu hai lan
..............
page:42-45
Research on trend of IT service management
li wen
..............
page:41
ISO/IEC20000:edge tool of advancing ITSM performance ability of enterprises
zhuang li juan
..............
page:39-40
Discussion on informationization construction and running risk prevention
shao xian chang ; shan lin
..............
page:37-38
Information security maintenance require disposing reasonably products
hao jing
..............
page:36
Security management from passivity to initiative
li qing li
..............
page:35
Row and method of risk self-evaluation for information security of banks
xu chong ling
..............
page:29-34
Balances between financial liquidity and risk of capital
tong mu
..............
page:22-28
Analysis on supervision of information assets risk in banks
wu jun tao
..............
page:17-21
Important sole of the standards in advancing credit industry criterion development
tian ze
..............
page:9-10
How to effectually implement the standards of collecting credit
zhu shu guang
..............
page:11-12
Accelerating individual collecting-credit system construction, Preventing individual credit business risk
li hu ning ; you xiao ming
..............
page:13-16
Standardization constructing the high efficiency platform of credit industry
li qing li
..............
page:1-2
Characteristics of credit rating standards and the comparison between domestic credit rating standards overseas standards concerned
ma wen luo
..............
page:3-8
IGBT rectification technique of UPS
wang li jian
..............
page:77-79
Design and implementation of bank agent capturing tax system
zhao li li
..............
page:73-76
Running support systems of banks based on knowledge repository
jiang zuo zuo
..............
page:67-72,76
Using technique advantage and improving national industry
wang dong
..............
page:66
Cross off bankcards accounts revealing the pressure of client information consolidation
wu ya ming ; huang di zuo
..............
page:64-65
DataPower helping enterprises to simply dispose SOA
wang xiao jun
..............
page:63
Huawei-3Com constructing the video system of Fujian branch, PBC
wang an
..............
page:61-62
Discussion on operation management of banks network from network lifecycle
dun hong cheng
..............
page:58-60