首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
法律   6篇
中国政治   1篇
政治理论   1篇
综合类   3篇
  2019年   1篇
  2014年   3篇
  2013年   3篇
  2011年   2篇
  2008年   1篇
  2006年   1篇
排序方式: 共有11条查询结果,搜索用时 31 毫秒
1.
Memory forensics has gradually moved into the focus of researchers and practitioners alike in recent years. With an increasing effort to extract valuable information from a snapshot of a computer's RAM, the necessity to properly assess the respective solutions rises as well. In this paper, we present an evaluation platform for forensic memory acquisition software. The platform is capable of measuring distinct factors that determine the quality of a generated memory image, specifically its correctness, atomicity, and integrity. Tests are performed for three popular open source applications, win32dd, WinPMEM, and mdd, as well as for different memory sizes.  相似文献   
2.
“最低消费”作为餐饮娱乐业界约定俗成的“行业规范,”现有法律难以对其合法性给出一个“标准答案”。在法社会学者看来,这一行业习惯法是“活的法律,”规范着社会的内在秩序。在多元社会里,应建立国家法与“活法”沟通的渠道,使二者在国家与社会互动的基础上形成良性竞争。  相似文献   
3.
Software based Memory acquisition on modern systems typically requires the insertion of a kernel module into the running kernel. On Linux, kernel modules must be compiled against the exact version of kernel headers and the exact kernel configuration used to build the currently executing kernel. This makes Linux memory acquisition significantly more complex in practice, than on other platforms due to the number of variations of kernel versions and configurations, especially when responding to incidents. The Linux kernel maintains a checksum of kernel version and will generally refuse to load a module which was compiled against a different kernel version. Although there are some techniques to override this check, there is an inherent danger leading to an unstable kernel and possible kernel crashes. This paper presents a novel technique to safely load a pre-compiled kernel module for acquisition on a wide range of Linux kernel versions and configuration. Our technique injects a minimal acquisition module (parasite) into another valid kernel module (host) already found on the target system. The resulting combined module is then relinked in such a way as to grant code execution and control over vital data structures to the acquisition code, whilst the host module remains dormant during runtime.  相似文献   
4.
This paper studies the fourth generation ‘peer-2-peer’ (P2P) file sharing technology which is also known as streaming technology from the technology point of view. It critically analyses the nature of streaming technology and assesses similarities to broadcasting for the purpose of copyright protection in the name of webcasting. In addition, it considers the possibility of protecting webcasting within the framework of broadcasting under copyright and the extent of broadcasters’ rights applicable to webcasters. Based on the conclusions derived from the discussion of UK, New Zealand, Italian and US law on streaming, WIPO Standing Committee on Copyright and Related Rights (SCCR) draft documents will be critically analyzed. The Last part of this work will offer suggestions as to how to protect webcasting (streaming technology) under the umbrella of copyright.  相似文献   
5.
警察实战综合演练教学是一种较贴近实战的对抗性教学训练方法,是体能、射击、控制反抗、查缉战术有机结合的综合演练教学,是实现“教、训、战”一体化教学的有效途径,也是科学利用师资资源的最佳途径之一.虚拟现实技术是利用计算机系统来生成一个逼真的三维视觉、听觉、触觉或嗅觉等感觉世界,让用户可以从自己的视点出发,利用自然技能和某些设备对这一生成的虚拟世界客体进行浏览和交互考察.而依托“人机互动”虚拟实景对抗训练等系统可以提升警察实战技能教学的有效性.  相似文献   
6.
Traditional, persistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, e.g., rapidly increasing storage capabilities of hard drives, memory-resident malicious software applications, or the growing use of encryption routines, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to examine alternative data sources and emphasize the value of volatile system information in RAM more recently. In this paper, we give an overview of the prevailing techniques and methods to collect and analyze a computer's memory. We describe the characteristics, benefits, and drawbacks of the individual solutions and outline opportunities for future research in this evolving field of IT security.  相似文献   
7.
Mark Thompson deplores the decline in the public trust of government and of public service institutions such as the BBC. But there has also been a decline in another form of trust: government's trust in the ability of professionals such as doctors and teachers to deliver high quality public services. And, unlike Thompson's type of trust, this decline was inevitable, because it was based on untenable assumptions concerning professional motivation. The author discusses the importance of trust in an unwritten constitution, including trust in the use made of public resources, trust that appointments are being made on merit, trust that the civil service is ‘speaking truth unto power’ behind the scenes and ultimately trust that it retains the ability to serve future governments. In a world where trust in institutions is diminishing, there are still surprising levels of trust in the world of private philanthropy. The public are only too ready to give donations without seeking to question, especially in the wake of major disasters. Yet the nature of aid agencies has changed dramatically in the past thirty years into major global enterprises with sophisticated media and marketing operations. In this case a greater degree of scepticism from those who donate and paradoxically less trust might actually result in better outcomes from aid and better use of funding. Trust is critical to the mission of the FCO. The public needs to trust the competence and sound judgment of the professional diplomats. The diplomats themselves need to be able to rely on the commonsense of their fellow colleagues. Ministers and diplomats need to trust each other. And other governments need to have confidence in the discretion of their British counterparts. This is an increasing challenge in the world of instant news. Trust can be quickly lost by indiscreet or self‐serving revelations. But the key is to be as open and transparent as possible about the processes of diplomacy. A new survey commissioned by the British Journalism Review demonstrates that public confidence in journalism has collapsed over the last five years. This is particularly true for the commercial broadcasters ITV and Channel 4, whose journalism has traditionally commanded as much public esteem as the BBC. Trust in the BBC and print journalists has also declined, and journalism suffered more than any of the other 16 occupational groups being assessed. This is partly due to the cumulative effect of various “fakery” scandals that have afflicted broadcasters over the last 18 months and partly down to a more widespread cynicism directed at those in authority.  相似文献   
8.
粤东丰顺县历史上存在不少妇女集体投江自杀的现象。留隍妇女集体投江自杀之风从清代中后期始,历经民国,一直持续到建国初期。经济上普遍贫困、生产与家务劳动方面极度劳累,以及已婚妇女在家庭的地位低下、婚姻方面极度不自由是集体投江自杀的主要原因。此外,该地存在着的多种形式畸形婚姻、家庭生活中家婆权力很大,也与传统妇女集体自杀现象有较直接的关系。  相似文献   
9.
Copyrighted works are greatly entwined with the concept of the sharing economy because of their status as informational public goods. Unlike commercial sharing models that address tangible goods such as bikes and houses, the sharing of which is limited by their physical nature, sharing models for intangible copyrighted works such as Google Books and live game webcasting must account for the comparatively unfettered ability for these to be shared. Accordingly, these models are more focused on exploiting such works to their full commercial potential. However, these sharing models are to a large extent based on the unauthorised exploitation of copyrighted works and will be unworkable if the related copyright issues cannot be solved. The interest that copyright owners have in exclusivity must thus be balanced with the public's interest in further exploitation of copyrighted works. Article 22 of the Copyright Law of China outlines an exhaustive list of copyright exceptions; such a restrictive list is incompatible with the sharing economy. The Chinese courts have realised this problem and have gone beyond the law in their judgments, taking a cue from their US counterparts. However, many of these decisions appear to be inconsistent with one another.To address the aforementioned problems, this paper examines the latest proposed amendment to the Copyright Law of China and proposes several legislative and judicial actions that could help promote the sharing economy. At the legislative level, enacting legislation based on a refined open-ended fair use model is necessary to promote the development of the sharing economy. At the judicial level, Chinese courts should employ the concept of transformative use to correctly interpret legislation based on the proposed open-ended model. With transformative use as the cornerstone of copyright policy, the public gains the freedom to share others’ works, participate in the innovation process, and create works with new value. Moreover, authors would retain an incentive to create works under such a legal regime because market substitution will not occur if a work is used for a different expressive purpose than that for which the work was originally created. Thus, a balance can be achieved between promoting the sharing economy and protecting the exclusivity of copyright in China.  相似文献   
10.
在司法公开日益受到重视的今天,庭审的过程也是体现司法公平与正义的重要环节。从最初通过电视等媒体对庭审过程进行报道,到互联网时代中通过网络对的庭审活动进行直播,再到“自媒体”兴起后庭审活动的微博直播与互动,我国法院的审判工作透明化程度日益提高;司法公开的含义远大于庭审直播;为进一步促进司法公开与公正,包括庭审在内的法院工作的公开,需要在合法、合理地予以规制。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号