2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Security Management
 
CERT Security Improvement Modules
http://www.cert.org/security-improvement/
OCTAVE Information Security Risk Evaluation
http://www.cert.org/octave/
Survivable Systems Analysis Method
http://www.cert.org/sna/
Security Strategy
http://www.sonicwall.com/security-planning-center/security-strategy.html
Security Planning Guidelines
http://www.interaction.org/disaster/securityguidelines.html
System Security: Planning is Protection
http://www.fcw.com/vendorsolutions/nih/plan.asp
Security Consulting & Strategy Planning
http://www.camtechcorporation.com/ecommerce/security.htm
Best Practices in Network Security
http://www.networkcomputing.com/1105/1105f2.html
Computer Security Guidance
http://csrc.nist.gov/publications/index.html
Unified Information Security (INFOSEC) Architecture (UIA) Gadfly Project, The
http://www.sei.cmu.edu/publications/documents/95.reports/95.tr.015.html
Handbook for Computer Security Incident Response Teams (CSIRTs)
http://www.sei.cmu.edu/publications/documents/98.reports/98hb001/98hb001abstract.html
Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)
http://www.cert.org/advisories/CA-2002-03.html
Attack Modeling for Information Security and Survivability
http://www.sei.cmu.edu/publications/documents/01.reports/01tn001.html
Tivoli Security Management and Access Control Solutions
http://www.tivoli.com/products/solutions/security/
Internet Security Certificates
http://www.thawte.com/
Linux Security
http://www.linuxsecurity.com/
Unix Security Checklist v2.0
http://www.cert.org/tech_tips/unix_security_checklist2.0.html
IOpenBSD Security
http://www.openbsd.org/security.html
Java Security FAQs
http://java.sun.com/sfaq/
NIST IPsec Project
http://csrc.nist.gov/ipsec/
Secure Mobile Networking (SMN) Project
http://www.cs.pdx.edu/research/SMN/
International Security Management Association (ISMA)
http://www.ismanet.com/
DOT IT Security Website for CIO
http://cio.ost.dot.gov/it_security/
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.