全文获取类型
收费全文 | 1434篇 |
免费 | 86篇 |
专业分类
各国政治 | 94篇 |
工人农民 | 33篇 |
世界政治 | 76篇 |
外交国际关系 | 97篇 |
法律 | 872篇 |
中国共产党 | 3篇 |
中国政治 | 55篇 |
政治理论 | 179篇 |
综合类 | 111篇 |
出版年
2024年 | 4篇 |
2023年 | 19篇 |
2022年 | 19篇 |
2021年 | 29篇 |
2020年 | 45篇 |
2019年 | 42篇 |
2018年 | 52篇 |
2017年 | 82篇 |
2016年 | 50篇 |
2015年 | 39篇 |
2014年 | 85篇 |
2013年 | 202篇 |
2012年 | 86篇 |
2011年 | 61篇 |
2010年 | 80篇 |
2009年 | 103篇 |
2008年 | 82篇 |
2007年 | 89篇 |
2006年 | 79篇 |
2005年 | 35篇 |
2004年 | 46篇 |
2003年 | 40篇 |
2002年 | 39篇 |
2001年 | 30篇 |
2000年 | 15篇 |
1999年 | 15篇 |
1998年 | 8篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1981年 | 3篇 |
排序方式: 共有1520条查询结果,搜索用时 7 毫秒
91.
王国栋 《陕西行政学院学报》2002,16(1)
行政体制改革是一项长期而艰巨的工程。目前的论述更多关注于机构改革,而从系统论的观点来看,只有同时兼顾体制内、外两个层面,才有可能理清改革的原因,从而为体制改革的顺利推行提供保障。 相似文献
92.
网络犯罪成因的几点思考 总被引:1,自引:0,他引:1
汪剑歆 《福建公安高等专科学校学报》2001,15(5):22-26
随着互联网逐渐进入人们的生活 ,在给人们带来巨大便利和实惠的同时 ,网络犯罪也日益突出。本文从网络犯罪的成本、网络伦理道德、计算机网络本身存在的安全漏洞三方面对网络犯罪的成因展开了分析。 相似文献
93.
94.
印俄战略伙伴关系的新发展 总被引:2,自引:0,他引:2
印俄战略伙伴关系是冷战时期印苏特殊关系的继承和演进。进入21世纪以后,随着俄罗斯的复兴和印度的崛起,双方重新审视对方在各自战略棋盘上的分量,决定建立"战略伙伴关系",加强在政治、经济、军事、科技、能源等领域的合作。由于俄罗斯与中国的"战略协作伙伴关系"不断深化,印度与中国"面向和平与繁荣的战略伙伴关系"正在推进,印俄战略伙伴关系对于中国具有某种积极意义。尽管印俄对中国的态度有一定区别,但是印俄战略伙伴关系对中国的良性作用值得肯定。 相似文献
95.
Garrie Daniel B.; Wong Rebecca 《International Journal of Law and Information Technology》2007,15(2):129-152
The article considers the subject of clickstream data from aEuropean/US perspective, taking into account the Data ProtectionFramework (Data Protection Directive 95/46/EC; Directive onPrivacy and Electronic Communications 2002/58/EC) and the USlegal framework and in particular, the Wiretap Act U.S.C. 2701(2004) and related statutes. It examines the extent to whichclickstream data is considered "personal data" within the DataProtection Directive and the implications to consumers and businesses. 相似文献
96.
In Opinion 1/2010, the Article 29 Data Protection Working Party has provided additional guidance concerning the concepts of ‘controller’ and ‘processor’ contained in Directive 95/46/EC. This guidance aims to assist practitioners in their determination of whether an entity is acting as a controller or as a processor towards a particular data processing operation. Despite the fact that this opinion is informative, the existing framework still appears to leave room for a considerable amount of legal uncertainty. This uncertainty is attributable in part to the nature of the existing concepts, but also (and perhaps to a larger extent) to their apparent misalignment with current processing realities. In this paper, the author seeks to articulate why the existing concepts often remain difficult to apply in practice, in order to enable a constructive reflection on how these issues might be addressed in the future. 相似文献
97.
外交保护的实施过程可以区分为国内决策阶段和利用国际法向侵害本国人权利的相对国采取措施的阶段。因此,在国内决策阶段中有一种不可忽视的实践,那就是认为从国内法角度来看国家负有以一切可能方式保护本国公民的义务。但是,实际上外交是国家行为,它代表国民的整体利益。因而在具体个案中可能需要从大局出发采取和缓的方式对权益受侵害的国民进行保护或放弃保护。但,必须建立有效的机制以沟通被害者和实行外交保护的公权力机构。在对公共利益和私人利益进行取舍时,可能需要考虑相应的补偿问题。以此为出发点,对将以外交保护方式保护国民作为国家宪法义务的国家实践进行研究。 相似文献
98.
Accurate age estimation has always been a problem for forensic scientists, and apposition of secondary dentine is often used as an indicator of age. Cameriere et al. studied the pulp/tooth area ratio by peri-apical X-ray images of the canines, to observe the apposition of secondary dentine. The present study examines the application of this technique in a Mexican identified sample coming from the Department of Physical Anthropology of the INAH, at Mexico City. The main aim of this work is to test the reliability of this method in a skeletal sample of a specific population, different from the samples used for its development. The obtained regression model explained 96.2% of total variance (R(2) = 0.962) with a standard error of estimate of 1.909 and a standard deviation of 1.947. These results demonstrate great reliability and that the age/secondary dentine relationship is not variable in this specific population. 相似文献
99.
Swedish public law has incorporated a general rule of public access to documents, and to information in the wider sense, since
the Freedom of the Press Act of 1766. On the Community level, the relationship between Regulation (EC) 45/2001 on data protection
and Regulation (EC) 1049/2001 on public access to documents exemplifies the tension between the public's interest in scrutinising
the administration carried on in its name, and the integrity of the individual. However, a similar tension exists between
Sweden's Personal Data Act of 1998, implementing Directive 95/46, and the Freedom of the Press Act. A misuse model of data
protection law, by seeking to concentrate on serious rather than technical infringements of privacy, might serve to ease the
tension. The views expressed in this article are solely those of the author and are not attributable to any Community institution.
This revised version was published online in August 2006 with corrections to the Cover Date. 相似文献
100.