全文获取类型
收费全文 | 2179篇 |
免费 | 110篇 |
专业分类
各国政治 | 145篇 |
工人农民 | 107篇 |
世界政治 | 216篇 |
外交国际关系 | 118篇 |
法律 | 1036篇 |
中国政治 | 12篇 |
政治理论 | 635篇 |
综合类 | 20篇 |
出版年
2023年 | 11篇 |
2022年 | 5篇 |
2021年 | 20篇 |
2020年 | 46篇 |
2019年 | 58篇 |
2018年 | 71篇 |
2017年 | 91篇 |
2016年 | 73篇 |
2015年 | 58篇 |
2014年 | 83篇 |
2013年 | 334篇 |
2012年 | 74篇 |
2011年 | 99篇 |
2010年 | 61篇 |
2009年 | 80篇 |
2008年 | 64篇 |
2007年 | 85篇 |
2006年 | 85篇 |
2005年 | 86篇 |
2004年 | 75篇 |
2003年 | 87篇 |
2002年 | 82篇 |
2001年 | 42篇 |
2000年 | 44篇 |
1999年 | 38篇 |
1998年 | 39篇 |
1997年 | 39篇 |
1996年 | 30篇 |
1995年 | 35篇 |
1994年 | 31篇 |
1993年 | 22篇 |
1992年 | 21篇 |
1991年 | 16篇 |
1990年 | 25篇 |
1989年 | 14篇 |
1988年 | 25篇 |
1987年 | 16篇 |
1986年 | 9篇 |
1985年 | 18篇 |
1984年 | 16篇 |
1983年 | 12篇 |
1982年 | 7篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1976年 | 7篇 |
1973年 | 4篇 |
1970年 | 3篇 |
1967年 | 3篇 |
排序方式: 共有2289条查询结果,搜索用时 46 毫秒
841.
Mark Guido M.S. Marc Brooks M.S. M.B.A. Justin Grover M.S. Eric Katz M.S. Jared Ondricek M.S. Marcus Rogers Ph.D. Lauren Sharpe M.S. 《Journal of forensic sciences》2016,61(6):1467-1472
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis. 相似文献
842.
AbstractCyber technology, both explicitly and implicitly, impacts every facet of local, state, national and international criminal justice operations. Unfortunately, technological changes, including cyber technologies, are rarely well thought out and may have unintended negative consequences. Additionally technology, and particularly cyber technology, evolves at a much faster pace than our understanding of the ethics, laws and policies involved. Consequently, citizens, criminals and justice professionals often rely on technology without the benefit of legal protections or explicit agency policy. This paper will examine how technology, both historically (non cyber) and contemporarily (cyber), has positively and negatively affected one aspect of the Criminal Justice enterprise – law enforcement. 相似文献
843.
844.
Adeline M. Nyamathi Sheldon Zhang Benissa E. Salem David Farabee Betsy Hall Elizabeth Marlow Mark Faucette Doug Bond Kartik Yadav 《Journal of Experimental Criminology》2016,12(1):49-74
Objectives
This study conducted a randomized controlled trial with 600 recently released homeless men exiting California jails and prisons.Methods
The purpose of this study was to primarily ascertain how different levels of intensity in peer coaching and nurse-partnered intervention programs may impact reentry outcomes; specifically: (a) an intensive peer coach and nurse case managed (PC-NCM) program; (b) an intermediate peer coaching (PC) program with brief nurse counseling; and (c) the usual care (UC) program involving limited peer coaching and brief nurse counseling. Secondary outcomes evaluated the operational cost of each program.Results
When compared to baseline, all three groups made progress on key health-related outcomes during the 12-month intervention period; further, 84.5 % of all participants eligible for hepatitis A/B vaccination completed their vaccine series. The results of the detailed operational cost analysis suggest the least costly approach (i.e., UC), which accounted for only 2.11 % of the total project expenditure, was as effective in achieving comparable outcomes for this parolee population as the PC-NCM and PC approaches, which accounted for 53.98 % and 43.91 %, respectively, of the project budget.Conclusions
In this study, all three intervention strategies were found to be comparable in achieving a high rate of vaccine completion, which over time will likely produce tremendous savings to the public health system.845.
846.
847.
Mark Langan 《圆桌》2016,105(5):477-487
AbstractBrexit will of course have major implications for trade between Commonwealth African nations and the European continent. In the short term, the European Commission’s Economic Partnership Agreements with regional groups such as the East African Community will be complicated by the UK’s decision to leave the European project. Moreover, there are longer-term consequences to be considered, not least the role which the UK—as an independent trade actor—will adopt in its trade relations with Commonwealth African countries. This article examines the impact of Brexit for Commonwealth African nations’ trade with Europe (including the UK). It particularly points to several potential pitfalls arising from the Brexit referendum vis-à-vis African development. 相似文献
848.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented. 相似文献
849.
850.
Andrea Lane Eastman Emily Putnam-Hornstein Joseph Magruder Michael N. Mitchell Mark E. Courtney 《Journal of public child welfare》2017,11(1):40-57
This study examined factors associated with youth remaining in extended foster care. Cohorts of youth in care in California at age 17 years were defined for the period from 2003–2012. Multivariable generalized linear models documented factors associated with remaining in care through age 19. Findings indicate that: a) the population of youth in care at age 17 has declined over time; b) youth in care at age 17 in 2012 were qualitatively different from those a decade earlier; c) a larger proportion of youth who do not exit to permanency are remaining in extended foster care; and d) although the characteristics of youth who remain in foster care as non-minor dependents continue to vary relative to those who age out, differences have diminished. Findings highlight the potential to target subgroups of youth who may benefit from the extension of care but are remaining in care at lower rates. 相似文献