首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   1篇
各国政治   2篇
外交国际关系   1篇
法律   19篇
中国政治   5篇
政治理论   6篇
综合类   14篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   2篇
  2014年   5篇
  2013年   5篇
  2012年   2篇
  2011年   5篇
  2010年   2篇
  2009年   1篇
  2008年   7篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2004年   1篇
  2002年   2篇
  1998年   1篇
排序方式: 共有47条查询结果,搜索用时 15 毫秒
41.
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.  相似文献   
42.
In July 2011 following the revelations about phone hacking, all three political party leaders called for radical reform of the current system of press self‐regulation. Those within the press itself, including the Daily Mail, also conceded that serious changes were necessary. At the same time both politicians and press stressed the importance of protecting the freedom of the press and preventing undue government interference. Starting with both these pre‐requisites in mind—the creation of a new independent system and the protection of press freedom—this essay suggests four possible models of reform. For each model the essay sketches the basic parameters of reform and then suggests three problems associated with each. It argues against those who claim that anything more than small changes to the status quo would be too costly, would threaten press freedom, or would be technologically impractical.  相似文献   
43.
PDU模式下的短信息编码方式,被GSM手机广泛运用。在实际检验鉴定工作中,涉案手机检验量大幅增加,并且手机检验分析系统无法解析镜像文件的情况时有发生,检验人员只有对PDU有足够的了解,才能对手机取证驾轻就熟。通过对PDU模式结构的实例分析,手工成功恢复出手机短信息,这种分析的方法和经验可以应用于所有GSM手机的短信息取证。  相似文献   
44.
Android智能手机的取证   总被引:3,自引:0,他引:3  
作为一种新兴的智能手机,Android手机发展势头极为迅猛,并越来越多的受到人们的关注。通过对Android智能手机的取证研究,在介绍了Android手机的基本工作原理后,详细描述了取证方式。通过Android SDK工具对手机内外置存储进行镜像备份,逻辑分析利用文件系统分析,查找每个应用程序自带的数据库文件来获得有价值信息,物理分析通过对内存镜像进行数据恢复以寻找删除的文件,两者互相结合。结果表明,能够从Android手机中有效寻找到潜在证据。  相似文献   
45.
手机的技术功能使创作和书写即时化(instantaneity),它迎合了后现代“去中心化”、“差异”和“不连续性”等要求,但是,手机隐含的技术理性却前所未有地对人控制,使权力运作脱离了物质场域,在日常生活中延展开来。  相似文献   
46.
Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.  相似文献   
47.
Obscene or nuisance phone calls are particularly targeted towards women. Employing data from two sweeps of the British Crime Survey a decade apart (BCS 1982 and BCS 1992), this work attempts to measure the effects of individual socio-economic characteristics and victimization history of women in England and Wales on their likelihood of receiving at least one nuisance call. To make the logit modelling analysis more tangible, risks of nuisance calls are calculated from our models of five hypothetical women, single mother, professional, student, housewife and pensioner, with specific attributes taken from the set of explanatory variables.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号