首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   1篇
法律   23篇
中国政治   1篇
综合类   12篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2015年   1篇
  2014年   2篇
  2012年   3篇
  2011年   3篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   5篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2000年   2篇
排序方式: 共有36条查询结果,搜索用时 15 毫秒
11.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions.  相似文献   
12.
文中对Sybase SQL Anywhere的故障、日志作详细阐述,并给出了对数据备份和恢复的多种操作方法。  相似文献   
13.
首先分析了网络取证的基本概念,然后介绍了网络取证系统的分析过程,最后提出和设计了一个分布式网络实时取证系统的实现模型。  相似文献   
14.
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there are various options that control which information is included in the logs. This paper introduces the notion of the ideal log setting necessary for an effective reconstruction process in database forensics. The paper provides a survey of the default logging preferences in some of the popular database management systems and identifies the information that a database log should contain in order to be useful for reconstruction. The challenges that may be encountered in storing the information as well as ways of overcoming the challenges are discussed. Possible logging preferences that may be considered as the ideal log setting for the popular database systems are also proposed. In addition, the paper relates the identified requirements to the three dimensions of reconstruction in database forensics and points out the additional requirements and/or techniques that may be required in the different dimensions.  相似文献   
15.
鉴定是鉴定结论的基础。意欲鉴定结论发挥应有的证明作用,除了对鉴定活动施以必要的程序规范外,还必需对鉴定的实质运作加以干预——即对鉴定佐以质量控制。但是,我国目前有关鉴定制度的改革及完善,忽略了鉴定的质量控制及鉴定方法的标准化问题。此外,本文还分析了现行诉讼制度下,鉴定结论的质证得以落实并最终发挥证明作用的三大要素:鉴定结论的质证主体要素、质证的程序性保障及质证的内容选择。  相似文献   
16.
案例二则     
《浅析现场物证检验鉴定在交通肇事案中所起的作用》(例一),面对为骗保而制造的假现场、为逃避处罚而请人冒名顶替的情况,现场物证检验鉴定可提供科学、客观的结论,进而为准确划分责任,及时处理事故提供依据;《浅析尸体解剖在交通逃逸事故处理中的重要性》(例二),面对两名驾驶员的疑问,对尸体进行解剖认定责任。  相似文献   
17.
域名是一种用于互联网上识别和定位计算机的地址系统。域名应归入到知识产权的范畴。域名注册机构一般不承担因域名争议引起的法律责任。域名与商标权和商号权之间易产生法律冲突。驰名商标的商标权可以延伸至域名权,将普通商标抢注为域名者主观上存在故意时构成侵犯商标权行为,巧合雷同、非商业性使用、域名注册在先、合理使用行为不侵犯商标权。  相似文献   
18.
在对大型数据库进行管理和维护操作时,经常会遇到操作速度缓慢、磁盘空间不足以及数据恢复等问题,这些问题的关键常常和事务日志有关。正确维护和处理好事务日志可确保数据库系统安全及高效运转。  相似文献   
19.
CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to use proprietary file systems, which frequently hinders a complete examination. HIKVISION is a well-known manufacturer of such devices that typically ships its products with its proprietary file system. The HIKVISION file system has been analyzed before but that research has focused on the recovery of video footage. In this paper, the HIKVISION file system is being revisited regarding the log records it stores. More specifically, these log records are thoroughly examined to uncover both their structure and meaning. These unexplored pieces of evidence remain unexploited by major commercial forensic software, yet they can contain critical information for an investigation. To further assist digital forensic examiners with their analysis, a Python utility, namely the Hikvision Log Analyzer, was developed as part of this study that can automate part of the process.  相似文献   
20.
认证技术是保证电子商务安全的重要技术手段,是防止信息被篡改、删除、重放和伪造的一种有效方法,它具有被验证的能力,使接收者能够识别和确认消息的真伪。常用的安全认证技术主要有数字证书、数字签名、数字信封等。文中分析了电子商务的这几种认证技术。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号