Please wait a minute...
New Technology of Library and Information Service  2002, Vol. 18 Issue (1): 53-55    DOI: 10.11925/infotech.1003-3513.2002.01.15
Current Issue | Archive | Adv Search |
The Network Information Security in China
Song Xiaowen
(Department of Information Science, East China Normal University, Shanghai 200062, China)
Download: PDF (0 KB)  
Export: BibTeX | EndNote (RIS)      
Abstract  

This article makes compare between the information security development home and abroad, researches how to improve our information security level, and presents some proposals according to the problems laying in our information security development.

Key wordsInformation security      Network security      Informatization     
Received: 08 April 2001      Published: 25 February 2002
ZTFLH: 

TP309

 
Corresponding Authors: Song Xiaowen   
About author:: Song Xiaowen

Cite this article:

Song Xiaowen. The Network Information Security in China. New Technology of Library and Information Service, 2002, 18(1): 53-55.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2002.01.15     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2002/V18/I1/53


[1]第七次中国互联网络发展状况统计报告.中国互联网络信息中心(CNNIC),2001,1,17

[2]孙中国.加强网络安全建设,为构筑面向21世纪信息安全体系而努力.网络安全技术与应用,2001,(1):6-7

[3]段云所等.信息网络安全的目标、技术和方法.网络安全技术与应用,2001,(1):60-64

[4]赵战生等.我国信息安全及其技术研究迫在眉睫.中国信息导报,1999,(8):5-7

[5]冯登国.国内外信息安全研究现状及其发展趋势.网络安全技术与应用,2001,(1):8-13

[6]张金峰.对当前计算机信息网络安全问题的几点思考.网络安全技术与应用,2001,(1):47-48

[7]许晋军等.网络信息安全研究.现代图书情报技术,2001,(1):60-64

[8]朱庆华等.信息系统安全与计算机犯罪.情报学报,1999,(12):489-495

[9]http://www.863.org.cn

[10]http://bj.netfront.com.cn

[11]http://www.tuling.com

[12]http://thirdind.xz.gov.cn

 

[1] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[2] Chen Ying, Li Jiao, Li Junlian. A Knowledge Representation Method for Pharmaceutical Products in China[J]. 现代图书情报技术, 2013, (6): 9-15.
[3] Zheng Dejun Ren Ni Xiong Jian Huang Shuiqing. Current Situation of Information Security Management in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 27-32.
[4] Huang Shuiqing Mao Yihong Xiong Jian. Assessment of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 33-38.
[5] Huang Shuiqing Ren Ni. Control of Information Security Risk in Digital Libraries[J]. 现代图书情报技术, 2010, 26(7/8): 39-44.
[6] Sun Wei,Zhao Yue. Standards on Library Information Technology[J]. 现代图书情报技术, 2009, 25(7-8): 33-37.
[7] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[8] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[9] Tian Feng,Sun Hui . Application of RBAC in Security Management of Defense Science and Technology Information[J]. 现代图书情报技术, 2007, 2(2): 75-77.
[10] Qin Jiahang,Xu Xin,Su Xinning . Research on Evaluating Indices System for IT in I-Campus[J]. 现代图书情报技术, 2006, 1(4): 63-69.
[11] Hu Zhizhou. Creation for Firewall of the Library Network Using Iptables[J]. 现代图书情报技术, 2005, 21(4): 34-36.
[12] Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming. Building a Network Security System for a Library[J]. 现代图书情报技术, 2005, 21(10): 67-69.
[13] Niu Zhendong,Shi Xuelin,Ye Chenglin. Status and Trend of Research on Standards Involved in Digital Libraries[J]. 现代图书情报技术, 2004, 20(7): 1-5.
[14] Wang Zunxin,Cong Luli. The Application Research in the Network Security of the Library of the Intrusion Detection System[J]. 现代图书情报技术, 2004, 20(6): 67-70.
[15] Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security[J]. 现代图书情报技术, 2004, 20(6): 71-75.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn