全文获取类型
收费全文 | 3231篇 |
免费 | 102篇 |
专业分类
各国政治 | 105篇 |
工人农民 | 265篇 |
世界政治 | 153篇 |
外交国际关系 | 125篇 |
法律 | 2041篇 |
中国共产党 | 1篇 |
中国政治 | 64篇 |
政治理论 | 566篇 |
综合类 | 13篇 |
出版年
2021年 | 23篇 |
2020年 | 35篇 |
2019年 | 53篇 |
2018年 | 167篇 |
2017年 | 101篇 |
2016年 | 166篇 |
2015年 | 67篇 |
2014年 | 82篇 |
2013年 | 289篇 |
2012年 | 175篇 |
2011年 | 160篇 |
2010年 | 53篇 |
2009年 | 69篇 |
2008年 | 78篇 |
2007年 | 72篇 |
2006年 | 84篇 |
2005年 | 452篇 |
2004年 | 163篇 |
2003年 | 82篇 |
2002年 | 51篇 |
2001年 | 38篇 |
2000年 | 21篇 |
1999年 | 31篇 |
1998年 | 19篇 |
1997年 | 18篇 |
1995年 | 19篇 |
1994年 | 22篇 |
1993年 | 17篇 |
1992年 | 36篇 |
1991年 | 33篇 |
1990年 | 38篇 |
1989年 | 53篇 |
1988年 | 43篇 |
1987年 | 43篇 |
1986年 | 40篇 |
1985年 | 38篇 |
1984年 | 22篇 |
1983年 | 27篇 |
1982年 | 15篇 |
1979年 | 20篇 |
1978年 | 24篇 |
1976年 | 14篇 |
1975年 | 27篇 |
1974年 | 35篇 |
1973年 | 22篇 |
1972年 | 27篇 |
1971年 | 22篇 |
1970年 | 17篇 |
1968年 | 14篇 |
1967年 | 17篇 |
排序方式: 共有3333条查询结果,搜索用时 15 毫秒
771.
772.
M. Joseph Hinshaw 《Communication Law & Policy》2013,18(3):299-323
Copyright protection for computer software often presents a contradiction between law and the desired public policy that is the law's inspiration. The law provides incentives to individuals to create intellectual property by protecting authors through monopolistic controls on copying and distributing the authors' work. Conferring too much protection, however, may reduce incentives to create competitive products in the same market, defeating the law's constitutional purpose of encouraging the “Progress of Science and the useful Arts.” Two characteristics of computer software, technical standards and interoperability, compound this contradiction. Using economic literature on standards and the recent line of Lotus v. Borland cases, this article examines the role of standardization and interoperability in copyright protection of computer software, and suggests a part for the fair‐use defense in such cases. 相似文献
773.
774.
775.
Ameil J. Joseph 《Critical Criminology》2014,22(2):273-292
In this paper I will argue, through the example of the “treatment” of racialized minorities diagnosed with mental illness, that the mental health system (including its unique laws, production of different identity categories and ruling disciplines), with its dogmatic adherence to and reliance on alleged expert opinion and internal inquiry, allows for the erasure of subaltern voices. Often we hear about a tragic incident as reported by the media about someone diagnosed with a mental illness who has committed a crime. These representations routinely present the person as violent, aggressive, uncontrollable, and unpredictable. Repeatedly the voice of the accused is not represented; his or her social, historical, and political contexts are not considered relevant. The technologies of the criminal justice and mental health system’s use of physical or chemical restraint, coercive treatment, or practices such as deportation are also not reported, thus reproducing systems of harm. We don’t get to look inside the asylum. Patients’ voices are excluded from the discursive practices, disciplinary hegemony or dominant regimes of truth within the mental health system. This creates a system impermeable to criticism, where violence continues to prevail. Through a discussion of the disproportionate criminalization and deportation of the mentally ill, the false associations between mental illness and violence, the colonial ancestry of internal inquiry, and example cases from the media, this paper reviews how these particular technologies of violence owe their inheritance to the orientalising, discursive practices and disciplinary hegemony developed during colonization that when ignored, reproduce the dehumanizing outcomes upon which they were built. 相似文献
776.
777.
778.
779.
Summary The above points are by no means exhaustive of major policy developments which should concern the policy community and academics who teach students or who do research. We therefore make two recommendations: first, that the Ford Foundation or some other group consider convening a meeting drawing together people who have worked on the above problems and who have taught at the second and third tier schools which are more closely related to these problems; second, we would hope that your journal would undertake to do something to effectively redress the academic imbalance in our premier schools as reflected in the Yates report of the Ford Conference. Perhaps you could announce that the king(s) is naked. 相似文献
780.
Joseph Lewthwaite 《Digital Investigation》2013,9(3-4):211-221
FrostWire is a peer-to-peer (P2P) application derived from the open source code of Limewire. Frostwire was first released in February of 2005 as a Gnutella P2P client. As interest in the Gnutella network waned, FrostWire switched in later versions to becoming a torrent client. Since the United States government shut Limewire down, FrostWire has become more popular and is seen more often in criminal investigations. This paper describes the different components of FrostWire and the useful information which can be obtained in a digital forensic examination. 相似文献