首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85篇
  免费   2篇
工人农民   2篇
世界政治   5篇
外交国际关系   6篇
法律   22篇
中国共产党   6篇
中国政治   6篇
政治理论   12篇
综合类   28篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   5篇
  2018年   2篇
  2017年   2篇
  2016年   5篇
  2015年   1篇
  2014年   1篇
  2013年   10篇
  2012年   6篇
  2011年   9篇
  2010年   4篇
  2009年   7篇
  2008年   7篇
  2007年   6篇
  2006年   3篇
  2005年   7篇
  2004年   1篇
  2003年   2篇
  2002年   2篇
  2001年   3篇
排序方式: 共有87条查询结果,搜索用时 9 毫秒
11.
The author starts by questioning the main privacy challenges raised by our present and future information society viewed as a “global village”. Apart from a comparison with the traditional village of our parents, he identifies the two complementary and not dissociable facets of our privacy: the right to seclusion and the right to participate fully in our society. According to the first German Constitutional Court recognizing the right to informational self-determination as a new constitutional right, he underlines the need to analyse the data protection as a tool for ensuring both the citizens' dignity and our democracy.  相似文献   
12.
web2.0的兴起引发了传播形态、媒体环境及营销手段等种种变化,这些均为整合营销传播的实施提供了新的契机。目前,我们要充分发挥web2.0的应用元素,实现营销与传播的融合,以web2.0为中心全面整合营销手段及传播渠道,通过话题引导建立与利益攸关者的良好关系,推进整合营销传播的执行。  相似文献   
13.
远程开放教育必须积极探索适合成人的英语教学模式。根据远程开放教育的课程及教学对象的特点,构建网络环境下导学、助学、促学三结合的教学模式,对于增强学生的自主学习能力,体现“以学生为中心”的现代教学理念,都是一种有益的尝试。  相似文献   
14.
QQ取证及其司法鉴定方法研究   总被引:3,自引:0,他引:3  
简要介绍QQ取证及其司法鉴定研究的发展现状。分析QQ消息传输协议、数据库文件结构、Msg2.0.db文件的加密机制,重点研究QQ聊天记录及其他证据信息获取的思路和方法。在结合QQ取证鉴定案例的基础上,提出将手机与QQ进行融合取证的新思路,并对QQ取证及其司法鉴定的发展方向进行展望。  相似文献   
15.
As the Internet and World Wide Web have rapidly evolved and revolutionized the applications in everyday life, it is a demanding challenge for investigators to keep up with the emerging technologies for forensic analyses. Investigating web browser usages for criminal activities, also known as web browser forensics, is a significant part of digital forensics as crucial browsing information of the suspect can be discovered. Particularly, in this study, an emerging web storage technology, called IndexedDB, is examined. Characteristics of IndexedDB technology in five major web browsers under three major operating systems are scrutinized. Also, top 15 US websites ranked by Alexa are investigated for their data storage in IndexedDB. User screen names, ids, and records of conversations, permissions, and image locations are some of the data found in IndexedDB. Furthermore, BrowStEx, a proof‐of‐concept tool previously developed, is extended and cultivated into BrowStExPlus, with which aggregating IndexedDB artifacts is demonstrated.  相似文献   
16.
With an increase in the creation and maintenance of personal websites, web content management systems are now frequently utilized. Such systems offer a low cost and simple solution for those seeking to develop an online presence, and subsequently, a platform from which reported defamatory content, abuse, and copyright infringement has been witnessed. This article provides an introductory forensic analysis of the three current most popular web content management systems available, WordPress, Drupal, and Joomla! Test platforms have been created, and their site structures have been examined to provide guidance for forensic practitioners facing investigations of this type. Result's document available metadata for establishing site ownership, user interactions, and stored content following analysis of artifacts including Wordpress's wp_users, and wp_comments tables, Drupal's “watchdog” records, and Joomla!'s _users, and _content tables. Finally, investigatory limitations documenting the difficulties of investigating WCMS usage are noted, and analysis recommendations are offered.  相似文献   
17.
梅夏英  刘明 《法律科学》2013,31(2):82-92
基于WEB2.0技术条件下网络信息传播模式的改变,我国《侵权责任法》第36条规定的“提示”规则和“明知”规则,在法律适用上遇到了强有力的现实制约.通过梳理国外网络侵权的发展轨迹和利益博弈,揭示出网络服务提供者的注意义务由严格日益走向宽松的趋势.在此基础上,对网络社会的运行规律和公共影响进行系统考察,提炼出网络社会的公共属性和相对性的主体关系结构这两个显著特征,并以此作为网络侵权归贲设计上的价值考量因素.  相似文献   
18.
In the recent years, the field of conflict research has produced new findings on the relation between conflict and geography. In doing so, new data sets have been created with the help of GIS software. These data sets include variables relevant for the study of conflict with a spatial component. However, the use of geographic data requires specialized software and substantial training and therefore involves high entry costs for researchers and practitioners. This paper introduces the WarViews project whose aim is to create an easy-to-use front end for the exploration of GIS data on conflict. It takes advantage of the recent proliferation of Internet-based geographic software and makes geographic data on conflict available for these tools. With WarViews, geographic data on conflict can be accessed, browsed, and time-animated in a few mouse clicks, using only standard software. As a result, a wider audience can take advantage of the valuable data contained in these databases, for example, as supplementary data for conflict case studies or for classroom demonstrations. We present two versions of WarViews. The static version runs in a web browser and allows the user to switch between different data sets. The dynamic version is based on Google Earth and can time-animate geographic data such that the development over time can be monitored. The WarViews website can be freely accessed at http://www.icr.ethz.ch/research/warviews .  相似文献   
19.
在网页设计中,网页布局非常重要,直接影响到页面的显示效果。目前,采用CSS+DIV的方式进行网页布局,是网页布局的主要技术之一,它具有结构与表现分离、页面载入快、易被搜索、字体控制与排版能力强,以及对浏览器具有亲和力等优点,同时也存在程序编写难度高、调用复杂等缺点。  相似文献   
20.
电子政府的网络建设和信息安全一直是近年比较热门的话题。政府部门的工作逐步公开了,大部分数据都通过网络流动了,如何保证数据安全和网络系统可靠运行就成了关键。深病毒的影响,大量网络瘫痪,重要信息遭到恶意更改,这些都是电子政府网络信息安全需要解决的问题。本文从如何解决电子政府网络信息安全方面进行多方阐述,提出了一些解决方案。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号