全文获取类型
收费全文 | 293篇 |
免费 | 31篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 1篇 |
世界政治 | 3篇 |
外交国际关系 | 7篇 |
法律 | 229篇 |
中国共产党 | 1篇 |
中国政治 | 28篇 |
政治理论 | 17篇 |
综合类 | 35篇 |
出版年
2024年 | 1篇 |
2023年 | 12篇 |
2022年 | 11篇 |
2021年 | 13篇 |
2020年 | 10篇 |
2019年 | 21篇 |
2018年 | 19篇 |
2017年 | 23篇 |
2016年 | 19篇 |
2015年 | 19篇 |
2014年 | 43篇 |
2013年 | 31篇 |
2012年 | 11篇 |
2011年 | 17篇 |
2010年 | 14篇 |
2009年 | 13篇 |
2008年 | 5篇 |
2007年 | 12篇 |
2006年 | 6篇 |
2005年 | 7篇 |
2004年 | 6篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
排序方式: 共有324条查询结果,搜索用时 31 毫秒
141.
Recent publications underline the interest of using polymers in microelectronics (Li and Wong, 2006a; Cui et al., 2014). Polymers are the ideal interconnect alternative to solder materials containing lead. Electrically Conductive Adhesives [ECAs] (Li and Wong, 2006b), Thermally Conductive Adhesives (TCAs) (Felba et al., 2011) and UV Adhesives (UVAs) (Asif et al., 2005) mainly consist of a polymeric resin (epoxy, silicon, polyurethane or polyimide) that provides physical and mechanical properties such as adhesion, mechanical strength while containing metal fillers (silver, gold, nickel or copper) that conduct electricity (Luo et al., 2016). Currently it is possible to find really cheap polymeric resin. Using these resins for digital forensic purposes is the focus of this paper, that we demonstrate in a hardware reverse engineering prototype case study.When considering new mobile devices, such as secure phones, it is often necessary to spy communication and perform numerous tests on the memory (e.g. by changing some bytes) to understand or modify the implemented security mechanisms (manipulate system time, locate password hashes, observe artefacts of implemented security algorithms, etc.). Traditional techniques use either laser attacks/probing (chip on) or soldering/read/re-soldering (chip off/on) (Heckmann et al., 2016, Jongh, 2014). These two techniques are unsuitable for repeated operations requiring many readings/changes/injections. This paper describes a concrete case study using adhesive properties complementary to chip on and chip off methods.We present the steps using different properties of adhesives (ECA, TCA, UVA) that we will lead to the realisation of a prototype particularly suitable for the repeating of the read phases/changes/injections necessary for reverse engineering secure mobile devices. 相似文献
142.
分析了中国现行户籍制度的历史沿革,并进行中外户籍制度比较,主要有加拿大、日本、韩国、印度等国,提出应吸收和借鉴外国的有益经验,改革我国现有制度中所存在的弊端,促进我国劳动力的自由流动和市场化。并提出改革的必要性、可行性和完善的具体措施。 相似文献
143.
144.
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there are various options that control which information is included in the logs. This paper introduces the notion of the ideal log setting necessary for an effective reconstruction process in database forensics. The paper provides a survey of the default logging preferences in some of the popular database management systems and identifies the information that a database log should contain in order to be useful for reconstruction. The challenges that may be encountered in storing the information as well as ways of overcoming the challenges are discussed. Possible logging preferences that may be considered as the ideal log setting for the popular database systems are also proposed. In addition, the paper relates the identified requirements to the three dimensions of reconstruction in database forensics and points out the additional requirements and/or techniques that may be required in the different dimensions. 相似文献
145.
In 2012, the United Kingdom actively sought to tackle acts of stalking through amendments to the Protection from Harassment Act 1997. Now, not only is stalking a recognised criminal offence, acts associated with stalking behaviour have finally been properly defined in legislation. Further, the role of technology in digital stalking offences, frequently termed as acts of cyberstalking, has been duly highlighted. The prosecution of such cyberstalking offences is reliant on the forensic analysis of devices capable of communication with a victim, in order to identify the offender and evidence the offending content for presentation to a court of law. However, with the recent proliferation of anonymous communication services, it is becoming increasingly difficult for digital forensic specialists to analyse and detect the origin of stalking messages, particularly those involving mobile devices. This article identifies the legal factors involved, along with a scenario-based investigation of sample anonymous and spoof SMS (Short Message Service) messages, documenting the evidence that remains on a victim's handset for the purpose of locating an offender, which often may be minimal or non-existent. 相似文献
146.
147.
安仲森 《山西青年管理干部学院学报》2011,24(2):35-38
使用手机媒体已经成为大学生生活的重要组成部分。由于社会大环境以及手机媒体自身的特征、大学对德育的定位和手机媒体管理的局限等多种因素的综合作用,“拇指下的德性”问题受到一定程度的冷落。为此,在德育工作中,一要注重德性伦理培育在大学生手机媒体运用中的导向性;二要将传统与现代相结合,创新德育方式;三要建立制度规范,促进手机媒体长效管理;四要加强校园环境建设,培育良好的校园德育环境。 相似文献
148.
手机短信和大学生教育的冲突与制衡 总被引:4,自引:0,他引:4
陈少松 《河南司法警官职业学院学报》2005,3(4):121-123
飞速发展的移动通讯是一条庞大的经济产业链、文化产业链,由其衍生出来的手机短消息 文化功能,给大学校园和大学生的信息传输带来了翻天覆地的变化,使校园文化空前活跃、丰富,并全 时空、全方位地影响着大学生的思想和行为。因此,重视和研究手机短信对大学生教育的影响尤显紧 迫和必要。 相似文献
149.
房敏 《山西青年管理干部学院学报》2011,24(1):35-37
随着信息化、网络化程度的加深,"手机依赖"为主要特征的拇指文化已然成为当今高校校园内流行的一大时尚。这一现象是由多种主客观因素综合作用所致,其中既有手机通讯自身的优势,也有学生缓解学习压力、寻求情感归属、建立良好人际关系等心理需求。然而这一现象对学生的心理和行为都产生了一定的负面效应,需要手机运营商、学校、教师和家庭等多方合作,以宽容的态度积极地去引导学生正确认识这种现象。 相似文献
150.
Graeme Horsman PhD 《Journal of forensic sciences》2021,66(1):179-189
As digital evidence now features prominently in many criminal investigations, such large volumes of requests for the forensic examination of devices has led to well publicized backlogs and delays. In an effort to cope, triage policies are frequently implemented in order to reduce the number of digital devices which are seized unnecessarily. Often first responders are tasked with performing triage at scene in order to decide whether any identified devices should be seized and submitted for forensic examination. In some cases, this is done with the assistance of software which allows device content to be “previewed”; however, in some cases, a first responder will triage devices using their judgment and experience alone, absent of knowledge of the devices content, referred to as “decision‐based device triage” (DBDT). This work provides a discussion of the challenges first responders face when carrying out DBDT at scene. In response, the COLLECTORS ranking scale is proposed to help first responders carry out DBDT and to formalize this process in an effort to support quality control of this practice. The COLLECTORS ranking scale consists of 10 categories which first responders should rank a given device against. Each devices cumulative score should be queried against the defined “seizure thresholds” which offer support to first responders in assessing when to seize a device. To offer clarify, an example use‐case involving the COLLECTORS ranking scale is included, highlighting its application when faced with multiple digital devices at scene. 相似文献