Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Financial Computer of China
1001-0734
2011 Issue 2
Exploration on data base encryption tactic of commercial banks
ma yao
..............
page:59-62
11th Five-Year plan and 12th Five-Year plan: summarize up the past and look forward the future
..............
page:9-11
Datawarehouse and related technology: the financial institutions to creat new competitive
..............
page:20-21
Practice and thinking of construction of financial management informationization
zhang tian ping
..............
page:39-40,52
Mobile financial :The thumb on the financial competition is becoming increasingly fierce
..............
page:16-17
The application on video intelligent analysis technology in banks
zuo ning
..............
page:80-82
Practice and ideas of primary central bank information security working
dai rong
..............
page:41-42
Ⅰ-banking: decades of development going to interconnection and communication
..............
page:14-15
The significance of centralized management of ATM equipment maintenance service provider
tan ying feng
..............
page:35-38
HDS help the ABC to build a hard dependable filed data platform
..............
page:88
Exploration on the classified risk management application of commercial bank business operation
..............
page:66-69
Simple analysis on the security of ATM
guo ya
..............
page:87
xin xi dong tai
..............
page:7,90-96
Information technology security on the world expo Shanghai and 2010 GZ AG of financial services;present financial and technological strength,improve the finacial service level
..............
page:18-19
Financial self-service: comprehensive development and constant innovation
..............
page:22-23
Finance Standardized:Development thought gradually clearly
..............
page:26-27
Cloud Computing:Steadily stalking
..............
page:28-29
Commercial draft:realization of electronically
..............
page:24-25
Analysis and prevention of soft keyboard technology risk
jiang jia tang
..............
page:74-77
Implementation method of foreign exchange business search platform integrated system
li qiong
..............
page:53-54
Home economy birth "home banking" business, boost banks to channel innovation
pan lei
..............
page:83-86
Analysis on the process of IT system service availability management
xu ze zhong
..............
page:70-73
An overseas individual account remit money without limit reexchange settlement business risk aversion
wang qing ming
..............
page:78-79
Design and implementation of counter quantitative assessment system
chen hong yan
..............
page:46-52
Concentrate their attention on e-payment,LANDI attain the triple jump successfully
..............
page:89
Information technology risk management:Steadily stalking by the promoting of Basel II
..............
page:12-13
Service globalwide,support multiple and leading innovation
yu tong
..............
page:30-34
Established a uniform performance monitoring and optimize system
liu xiang min
..............
page:43-45
Exploration on hardware encryption system of commercial mainframe
wang bing kun
..............
page:55-58
Exploration on the establishment of post-risk assessment and warning system at the primary level of PBOC
..............
page:63-65