全文获取类型
收费全文 | 293篇 |
免费 | 31篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 1篇 |
世界政治 | 3篇 |
外交国际关系 | 7篇 |
法律 | 229篇 |
中国共产党 | 1篇 |
中国政治 | 28篇 |
政治理论 | 17篇 |
综合类 | 35篇 |
出版年
2024年 | 1篇 |
2023年 | 12篇 |
2022年 | 11篇 |
2021年 | 13篇 |
2020年 | 10篇 |
2019年 | 21篇 |
2018年 | 19篇 |
2017年 | 23篇 |
2016年 | 19篇 |
2015年 | 19篇 |
2014年 | 43篇 |
2013年 | 31篇 |
2012年 | 11篇 |
2011年 | 17篇 |
2010年 | 14篇 |
2009年 | 13篇 |
2008年 | 5篇 |
2007年 | 12篇 |
2006年 | 6篇 |
2005年 | 7篇 |
2004年 | 6篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
排序方式: 共有324条查询结果,搜索用时 15 毫秒
281.
尹猛基 《中共郑州市委党校学报》2007,(4):156-157
我国高校学生干部往往是"终身制"占的比例较高,这不利于人才的培养。在高校实行流动学生干部制,让更多的大学生拥有担任学生干部的机会,对于推进素质教育、优化高校人才培养质量将大有裨益。 相似文献
282.
Digital devices now play an important role in the lives of many in society. Whilst they are used predominantly for legitimate purposes, instances of digital crime are witnessed, where determining their usage is important to any criminal investigation. Typically, when determining who has used a digital device, digital forensic analysis is utilised, however, biological trace evidence or fingerprints residing on its surfaces may also be of value. This work provides a preliminary study which examines the potential for fingerprint recovery from computer peripherals, namely keyboards and mice. Our implementation methodology is outlined, and results discussed which indicate that print recovery is possible. Findings are intended to support those operating at-scene in an evidence collection capacity. 相似文献
283.
Samuel Nunn Ph.D. 《Journal of forensic sciences》2013,58(3):601-608
A project by a metropolitan police agency in 2008–2009 had police use touch DNA kits to collect cell samples from seized firearms. To assess outcomes, results of touch DNA swabbing of firearms were compared to fingerprinting firearm evidence. The rationale was that fingerprinting, as the older technology, was the baseline against which to compare touch DNA. But little is known about ways to measure touch DNA productivity compared to fingerprinting. To examine differences between the two requires comparable measurements. Two measures were used: quantity of probative or investigative evidence produced and identification outcomes. When applied to firearms seized within an Indianapolis, IN police district, touch DNA produced a larger volume of evidence than fingerprinting, but identification outcomes for the two methods were equal. Because touch DNA was deployed by police patrol officers, there are implications for firearm forensics and the choice of forensic approaches used by police. 相似文献
284.
更改机动车辆车架号码和发动机号码是犯罪分子的惯用伎俩,常用方法有割改法、填改法、添减笔画法、添减阿拉伯数字法和移位法等。发现车辆号码更改的方法有观察车辆驾驶室内仪表盘,观察车辆发动机号码平台,以及牢记各类型车辆的发动机号码和车辆车架号码的字体特征、打印部位、打印方式、倾斜角度等特征,并进行比对。显现变动的车辆号码的方法一般用化学试剂显现。 相似文献
285.
得益于虚拟仿真技术的发展,计算机仿真取证目前已在我国悄然兴起,其可以很大程度上弥补传统静态取证证据获取能力之不足,但由于适用环境条件不成熟,仿真取证的司法应用问题一直未能解决。有鉴于此,从技术、法律和程序三个方面分析了仿真取证司法应用过程中亟待解决的问题,同时对仿真取证的法律、技术和程序标准的内容进行了系统构思。 相似文献
286.
287.
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting. 相似文献
288.
公安边防机动中队是维护边境地区稳定的一支重要执法力量,也是目前我国边境地区打击违法犯罪活动的主要力量。公安边防机动中队战术训练仍处于健全完善的阶段,存在一些问题。对此,本文在认真剖析公安边防机动中队战术训练存在的突出问题的基础上,提出相应对策,以期提高公安边防机动中队的战术训练水平,增强执勤能力。从而更好的发挥公安边防机动中队在边境地区的服务和保障作用,完成好党和人民交给的执勤任务。 相似文献
289.
Evangelos Dragonas MSc Costas Lambrinoudakis PhD Michael Kotsis MSc 《Journal of forensic sciences》2024,69(1):117-130
CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well-known manufacturer of such products. Despite its global market share, research regarding digital forensics of DAHUA Technology CCTV systems is scarce and currently limited to extracting their video footage, overlooking the potential presence of valuable artifacts within their log records. These pieces of evidence remain unexploited by major commercial forensic software, yet they can hide vital information for an investigation. For instance, these log records document user actions, such as formatting the CCTV system's hard drive or disabling camera recording. This information can assist in attributing nefarious actions to specific users and hence can be invaluable for understanding the sequence of events related to incidents. Therefore, in this paper, several DAHUA Technology CCTV systems are thoroughly analyzed for these unexplored pieces of evidence, and their forensic value is presented. 相似文献
290.
Charles E. Naquin 《Negotiation Journal》2014,30(2):191-208
In this study, we have explored the use of mobile phones during negotiations. Specifically, we examined the effects that multitasking — reading messages on a mobile phone while negotiating face to face — had on the outcome achieved in a negotiation, as well as on perceptions of professionalism, trustworthiness, and satisfaction. Using an experimental design in a face‐to‐face dyadic negotiation, we found that multitasking negotiators achieved lower payoffs and were perceived as less professional and less trustworthy by their partners. 相似文献