CSRC

Results: 4036



#Item
371

<4D6963726F736F667420576F7264202D20B6ABDDB8CAD0C4CFD0CBBCD2BEDFD7B0B1B8D6C6D4ECB9C9B7DDD3D0CFDEB9ABCBBECAD7B4CEB9ABBFAAB7A2D0D0B9C9C6B1D5D0B9C9CBB5C3F7CAE9A3A8C9EAB1A8B8E532303134C4EA34D4C23137C8D5B1A8CBCDA3A92E646F63

Add to Reading List

Source URL: www.csrc.gov.cn

Language: Chinese
    372

    本次股票发行后拟在创业板市场上市,该市场具有较高的投资风险。创业板公司具有 业绩不稳定、经营风险高、退市风险大等特点,投资者面临较大的市场风险。投资

    Add to Reading List

    Source URL: www.csrc.gov.cn

    Language: Chinese - Date: 2015-04-10 15:55:34
      373Encrypting File System / Windows / NTFS / Internet Explorer / Microsoft Windows / System software / Software

      Security Administration Guidance for Windows 2000 Professional

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2006-10-17 01:00:00
      374Direct Anonymous Attestation / Internet privacy / Group signature / Digital signature / Revocation list / Cryptography / Public-key cryptography / Key management

      Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-16 09:48:14
      375

      PDF Document

      Add to Reading List

      Source URL: www.csrc.gov.cn

      Language: Chinese
        376

        <4D6963726F736F667420576F7264202D20D5D0B9C9CBB5C3F7CAE9A3A8C9EAB1A8B8E5A3A92E646F63>

        Add to Reading List

        Source URL: www.csrc.gov.cn

        Language: Chinese - Date: 2015-04-10 04:01:03
          377

          <4D6963726F736F667420576F7264202D20BABCD6DDD3C0B4B4D6C7C4DCC9E8B1B8B9C9B7DDD3D0CFDEB9ABCBBECAD7B4CEB9ABBFAAB7A2D0D0B9C9C6B1D5D0B9C9CBB5C3F7CAE9A3A8C9EAB1A8B8E532303134C4EA34D4C23233C8D5B1A8CBCDA3A92E646F63>

          Add to Reading List

          Source URL: www.csrc.gov.cn

          Language: Chinese
            378Computing / Data security / Crime prevention / National security / Computer network security / Information security / Validation / Vulnerability / Security controls / Security / Computer security / Cyberwarfare

            A. Overview The systems development lifecycle breaks the systems development process down into phases during which discrete systems products are developed. This approach to systems development leads to well documented

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2007-09-19 01:00:00
            379Auditing / Audit trail / Security / Risk / Computing / Information technology audit process / Information technology audit / Computer security / Data security

            Sample Language Describing Security Requirements Definition during the Business Process Analysis The following language is extracted from SSA’s Software Engineering Technology Manual sections related to the development

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2007-09-19 01:00:00
            380Computing / Secure Shell / OpenSSH / Comparison of SSH clients / Post Office Protocol / Port / X Window System / Tunneling protocol / Ssh-keygen / Software / Cryptographic software / System software

            Securing POP Mail on Windows Clients The Problem: POP mail, which is often the mail server for Eudora and Outlook clients, historically uses an insecure protocol. Protocol analyzers allow folks, good and bad, to see netw

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2007-09-19 01:00:00
            UPDATE