首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   31篇
各国政治   3篇
工人农民   1篇
世界政治   3篇
外交国际关系   7篇
法律   229篇
中国共产党   1篇
中国政治   28篇
政治理论   17篇
综合类   35篇
  2024年   1篇
  2023年   12篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   21篇
  2018年   19篇
  2017年   23篇
  2016年   19篇
  2015年   19篇
  2014年   43篇
  2013年   31篇
  2012年   11篇
  2011年   17篇
  2010年   14篇
  2009年   13篇
  2008年   5篇
  2007年   12篇
  2006年   6篇
  2005年   7篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有324条查询结果,搜索用时 125 毫秒
11.
计算机犯罪取证主要围绕证据的获取和证据的分析。主要过程包括保护和勘查现场、获取物理数据、分析数据、追踪源头、提交结果等。计算机反取证就是删除或者隐藏入侵证据,使取证工作无效。反取证技术主要有数据擦除、数据隐藏等,数据擦除是最有效的反取证方法。从取证与反取证两方面分析计算机犯罪的特征,研究反取证技术的根源,可有效地保护国家信息网络安全,打击犯罪。  相似文献   
12.
A PP相关主体规范与否直接关乎数据信息安全,关涉公民合法权益和社会公益.基于个人信息保护的不断发展,APP信息泄露问题逐渐显露出来.本文认为,应结合现有的个人信息保护立法,通过完善A PP实名制度,构建A PP相关主体备案制度,实施数据信息市场主体准入制度和第三方参与数据收集制度,以加强对个人数据信息的保护.  相似文献   
13.
At the time of this writing, Android devices are widely used, and many studies considering methods of forensic acquisition of data from Android devices have been conducted. Similarly, a diverse collection of smartphone forensic tools has also been introduced. However, studies conducted thus far do not normally guarantee data integrity required for digital forensic investigations. Therefore, this work uses a previously proposed method of Android device acquisition utilizing ‘Recovery Mode’. This work evaluates Android Recovery Mode variables that potentially compromise data integrity at the time of data acquisition. Based on the conducted analysis, an Android data acquisition tool that ensures the integrity of acquired data is developed, which is demonstrated in a case study to test tool's ability to preserve data integrity.  相似文献   
14.
随着移动互联网的迅速发展,教育资源的呈现样式、展现方式、以及内容丰富性都已达到一定高度。但是如何实现教育教学资源共建共享是当前研究重要课题。通过从优质教学资源的收集与优化、各级教育平台的建立与合作,创建新型信息资源移动平台三个方面调查来深入研究如何提高教育学科课程教学资源共建共享过程中的协作能力,从而建设有效的资源共享的措施,提高资源服务的质量。  相似文献   
15.
Increasingly, Android smartphones are becoming more pervasive within the government and industry, despite the limited ways to detect malicious applications installed to these phones' operating systems. Although enterprise security mechanisms are being developed for use on Android devices, these methods cannot detect previously unknown malicious applications. As more sensitive enterprise information becomes available and accessible on these smartphones, the risk of data loss inherently increases. A malicious application's actions could potentially leave sensitive data exposed with little recourse. Without an effective corporate monitoring solution in place for these mobile devices, organizations will continue to lack the ability to determine when a compromise has occurred. This paper presents research that applies traditional digital forensic techniques to remotely monitor and audit Android smartphones. The smartphone sends changed file system data to a remote server, allowing for expensive forensic processing and the offline application of traditional tools and techniques rarely applied to the mobile environment. The research aims at ascertaining new ways of identifying malicious Android applications and ultimately attempts to improve the state of enterprise smartphone monitoring. An on-phone client, server, database, and analysis framework was developed and tested using real mobile malware. The results are promising that the developed detection techniques identify changes to important system partitions; recognize file system changes, including file deletions; and find persistence and triggering mechanisms in newly installed applications. It is believed that these detection techniques should be performed by enterprises to identify malicious applications affecting their phone infrastructure.  相似文献   
16.
Memory forensics has gradually moved into the focus of researchers and practitioners alike in recent years. With an increasing effort to extract valuable information from a snapshot of a computer's RAM, the necessity to properly assess the respective solutions rises as well. In this paper, we present an evaluation platform for forensic memory acquisition software. The platform is capable of measuring distinct factors that determine the quality of a generated memory image, specifically its correctness, atomicity, and integrity. Tests are performed for three popular open source applications, win32dd, WinPMEM, and mdd, as well as for different memory sizes.  相似文献   
17.
电子邮件真伪鉴定初探   总被引:1,自引:0,他引:1  
电子邮件作为网络沟通常见的形式之一,应用十分广泛,但涉及电子邮件的相关纠纷与犯罪问题也日益突出。很多案件由于无法判明电子邮件证据真实性,而导致诉讼无法正常进行、无奈拖延或者失败。为确定电子邮件证据真实性,对其进行科学鉴定显得十分重要,但电子邮件不同传统的物证、书证鉴定,其本身十分复杂,对其鉴定研究,必须分析常见的伪造形式,以及如何伪造,并在此基础上探讨鉴定的主要思路。  相似文献   
18.
翁洁 《桂海论丛》2008,24(2):38-40
科学构建流动党员管理新机制,必须简化流动党员的组织关系接转手续,适当放宽流动党员缴纳党费的期限,强化流动党员管理制度执行的刚性,建立健全城乡一体党员动态管理机制,在街道、社区设立流动党员管理服务站从而健全流动党员管理机构。  相似文献   
19.
《Science & justice》2022,62(3):349-357
Shahtoosh, the most expensive and sought-after wool in the illegal wildlife trade is obtained from the underfur of a critically endangered species-the Tibetan Antelope (Pantholops hodgsonii). It is often adulterated or mixed with the wool of Pashmina goat (Capra aegagrus hircus) for making shawls, scarves and other woolen articles to maximize the profit. The comparable fineness, color and texture, makes it a challenging task in wildlife forensics to differentiate them. In this study, an attempt has been made to differentiate 50 reference unprocessed underfur hairs from five individuals of each species using ATR FT-IR spectroscopy in combination with chemometric tools such as PCA, and PLS-DA. Results of PCA model demonstrated slight overlap and thus failed to distinguish hairs of these two species. Subsequently, PLS-DA model was employed, and also validation tests (external and blind testing) were carried out to ensure the predictive ability of the model, which resulted in 100% accuracy. The results of PLS-DA model exhibited complete differentiation between Shahtoosh, Pashmina and Angora (Oryctolagus cuniculus domesticus) wool used for external validation study with highly significant predictive ability (R-square value 0.99). This proof-of-concept study illustrates the potential of ATR FT-IR spectroscopy to complement current forensic microscopic and DNA based technique to analyze hair evidence in wildlife investigations owing to its rapid and non-destructive nature with high degree of confidence, and its ease-of-use with minimal to no sample preparation.  相似文献   
20.
当计算机互联网作为"第四媒体"方兴未艾时,以手机上网为平台的"第五媒体"——手机互联网悄然兴起。手机网民中青少年群体占主体。文章从分析手机互联网对青少年产生的影响入手,提出应从互联网管理、宣传教育、网德培养等方面进行应对,减少或避免手机互联网对青少年的负面影响。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号