全文获取类型
收费全文 | 269篇 |
免费 | 27篇 |
专业分类
各国政治 | 1篇 |
世界政治 | 1篇 |
法律 | 232篇 |
中国政治 | 12篇 |
政治理论 | 8篇 |
综合类 | 42篇 |
出版年
2024年 | 1篇 |
2023年 | 9篇 |
2022年 | 13篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 19篇 |
2018年 | 19篇 |
2017年 | 20篇 |
2016年 | 14篇 |
2015年 | 16篇 |
2014年 | 40篇 |
2013年 | 21篇 |
2012年 | 8篇 |
2011年 | 21篇 |
2010年 | 14篇 |
2009年 | 12篇 |
2008年 | 5篇 |
2007年 | 14篇 |
2006年 | 11篇 |
2005年 | 7篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2000年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有296条查询结果,搜索用时 31 毫秒
1.
2.
在实行诉讼对抗制的国家,人们可以通过以下三种方法使信息技术证据成为保护企业利益的一种工具:(1)起诉,包括刑事诉讼;(2)法庭辩护;(3)为规则制定者和企业作出重要决策提供依据。然而,对于什么样的信息技术证据具有可采信性,人们仍有质疑。计算机法学正是研究如何确定、保存、分析及如何提交数字证据的一门新兴的学科。尽管传统上计算机法学被认为是一门滞后的学科,但是澳大利亚《信息技术证据管理指引》还是前瞻性地规定了能使电子证据效力最大化的系统生存周期的一些重要原则。 相似文献
3.
The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service. 相似文献
4.
目的研究NTFS存储设备的3种数据恢复方式,测试、比较不同方式的恢复效果,促进电子物证检验工作。方法本文针对同一NTFS存储设备,分别使自行设计的NTFS日志检验软件测试基于NTFS日志文件的恢复方式,使用Final Data的快速扫描功能测试基于MFT记录的恢复方式,使用Final Data的完整扫描功能测试基于文件头部存储特征值的恢复方式,比较3种方式的恢复效果,分析各自的恢复原理。结果基于NTFS日志和MFT记录的方式恢复出的信息较全,用时较短,但不适合恢复较长时间之前删除的文件。基于文件头部存储特征值的方式可恢复较长时间前删除的文件,但用时长,不能恢复文件名、创建时间等信息,也不能有效恢复离散存储的文件。结论结合实际情况、综合运用3种方式可有效恢复数据。 相似文献
5.
Darrell O. Ricke Ph.D. Philip Fremont‐Smith M.S. James Watkins B.S. Sara Stankiewicz M.S. Tara Boettcher B.S. Eric Schwoebel Ph.D. 《Journal of forensic sciences》2019,64(5):1468-1474
High‐throughput sequencing (HTS) of large panels of single nucleotide polymorphisms (SNPs) provides an alternative or complimentary approach to short tandem repeats (STRs) panels for the analysis of complex DNA mixture forensic samples. For STRs, methods to estimate individual contribution concentrations compare capillary electrophoresis peak heights, peak areas, or HTS allele read counts within a mixture. This article introduces three approaches (mean, median, and slope methods) for estimating individual DNA contributions to forensic mixtures for HTS/massively parallel sequencing (MPS) SNP panels. For SNPs, the major:minor allele ratios or counts, unique to each contributor, were compared to estimate contributor proportion within the mixture using the mean, median, and slope intercept for these alleles. The estimates for these three methods were typically within 5% of planned experimental contributions for defined mixtures. 相似文献
6.
At the time of this writing, Android devices are widely used, and many studies considering methods of forensic acquisition of data from Android devices have been conducted. Similarly, a diverse collection of smartphone forensic tools has also been introduced. However, studies conducted thus far do not normally guarantee data integrity required for digital forensic investigations. Therefore, this work uses a previously proposed method of Android device acquisition utilizing ‘Recovery Mode’. This work evaluates Android Recovery Mode variables that potentially compromise data integrity at the time of data acquisition. Based on the conducted analysis, an Android data acquisition tool that ensures the integrity of acquired data is developed, which is demonstrated in a case study to test tool's ability to preserve data integrity. 相似文献
7.
计算机犯罪取证主要围绕证据的获取和证据的分析。主要过程包括保护和勘查现场、获取物理数据、分析数据、追踪源头、提交结果等。计算机反取证就是删除或者隐藏入侵证据,使取证工作无效。反取证技术主要有数据擦除、数据隐藏等,数据擦除是最有效的反取证方法。从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。 相似文献
8.
谭瑾 《河南公安高等专科学校学报》2007,(1):96-98
鬼船欺诈是海事欺诈的一种形式,欺诈者借鬼船窃取货物,给国际货物贸易的买卖双方、保险人都造成了极大的经济损失。鬼船欺诈之所以产生并蔓延有着多方面的原因。应通过多种途径对鬼船欺诈进行有效的预防和打击。 相似文献
9.
串通投标与串通拍卖是两个不同的法律概念,其外延并无包容或交叉关系,二者在标的、目的、社会危害程度、适用法律等方面均有一定的区别."串通投标情节严重的应追究刑事责任"是我国刑法的明文规定,但我国刑法并未明确规定串通拍卖的行为构成犯罪,因此不宜将串通拍卖行为认定为串通投标罪.对于串通拍卖的行为,一般依照<拍卖法>由工商行政管理部门给予行政处罚即可;但对于具有严重社会危害性的串通拍卖行为并构成犯罪的,应当按照非法经营罪或者合同诈骗罪定罪处罚. 相似文献
10.
Increasingly, Android smartphones are becoming more pervasive within the government and industry, despite the limited ways to detect malicious applications installed to these phones' operating systems. Although enterprise security mechanisms are being developed for use on Android devices, these methods cannot detect previously unknown malicious applications. As more sensitive enterprise information becomes available and accessible on these smartphones, the risk of data loss inherently increases. A malicious application's actions could potentially leave sensitive data exposed with little recourse. Without an effective corporate monitoring solution in place for these mobile devices, organizations will continue to lack the ability to determine when a compromise has occurred. This paper presents research that applies traditional digital forensic techniques to remotely monitor and audit Android smartphones. The smartphone sends changed file system data to a remote server, allowing for expensive forensic processing and the offline application of traditional tools and techniques rarely applied to the mobile environment. The research aims at ascertaining new ways of identifying malicious Android applications and ultimately attempts to improve the state of enterprise smartphone monitoring. An on-phone client, server, database, and analysis framework was developed and tested using real mobile malware. The results are promising that the developed detection techniques identify changes to important system partitions; recognize file system changes, including file deletions; and find persistence and triggering mechanisms in newly installed applications. It is believed that these detection techniques should be performed by enterprises to identify malicious applications affecting their phone infrastructure. 相似文献