2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Security Resources
 
Computer Security Institute
http://www.gocsi.com/
Information Systems Security Association (ISSA)
http://www.issa.org/
NIST Computer Security Resource Center (CSRC)
http://csrc.nist.gov/
CMU/SEI CERT Coordination Center
http://www.cert.org/nav/index.html
SANS (System Administration, Networking, and Security) Institute
http://www.sans.org/aboutsans.htm
SANS Resources
http://www.sans.org/newlook/resources/index.htm
IEEE Computer Society Technical Committee on Security and Privacy
http://www.ieee-security.org/
Internet Security Alliance (ISA)
http://www.isalliance.org
Internet Security Systems (ISS)
http://www.iss.net
The Center for Internet Security
http://www.cisecurity.org/
InfoSec Research Council (IRC)
http://www.infosec-research.org/
InfoWar
http://www.infowar.com/nav-fset.html
Internet Security Resource
http://www.securitysearch.net/
Security References and Resources
http://raven.cusys.edu/at/html/references.html
Information Security Magazine
http://www.infosecuritymag.com/
Security Management Online
http://www.securitymanagement.com/
Firewall Products
http://www.spirit.com/cgi-new/report.pl?dbase=fw&function;=view
ITtoolbox Security
http://security.ittoolbox.com/
The Java Security Website
http://www.cigital.com/javasecurity/
Cypherpunks
http://www.activism.net/cypherpunk/
PentaSafe's Library of Information Security Publications
http://www.baselinesoft.com/
Yahoo Security and Encryption
http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.