首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   43篇
各国政治   8篇
工人农民   29篇
世界政治   9篇
外交国际关系   27篇
法律   183篇
中国共产党   15篇
中国政治   48篇
政治理论   42篇
综合类   94篇
  2024年   2篇
  2023年   14篇
  2022年   34篇
  2021年   19篇
  2020年   23篇
  2019年   18篇
  2018年   19篇
  2017年   16篇
  2016年   12篇
  2015年   16篇
  2014年   24篇
  2013年   43篇
  2012年   20篇
  2011年   15篇
  2010年   26篇
  2009年   17篇
  2008年   16篇
  2007年   24篇
  2006年   19篇
  2005年   20篇
  2004年   18篇
  2003年   11篇
  2002年   19篇
  2001年   7篇
  2000年   3篇
排序方式: 共有455条查询结果,搜索用时 15 毫秒
141.
“数字化生存”是随着数字化、网络化发展而带来的一种生存方式和生存状态,它对人的全面发展既有积极意义,也有消极影响,正确反思数字化生存的本质和人文价值,对数字化生存视角下促进人的全面发展有重要意义。  相似文献   
142.
数字图书馆是一种拥有多种媒体、内容丰富的大型数字化信息资源库,它能够实现一般数据库和图书馆无法实现的智能化操作。党校图书馆应加快数字图书馆的建设。  相似文献   
143.
运用数码相机进行分色偏振光摄影   总被引:1,自引:0,他引:1  
目的研究运用数码相机进行分色偏振光摄影的可能性和方法。方法比较用数码相机拍摄有色地毯上的灰尘鞋印的各种方法的效果。结果分色偏振光摄影方法得到了较理想的效果。结论用数码相机进行分色偏振光摄影是有效的 ,相对传统方法提高了工作效率。  相似文献   
144.
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis.  相似文献   
145.
Hadas Eyal 《政治交往》2016,33(1):118-135
Two important and understudied dimensions of the interaction between politics and the digital revolution are the impact of digital technology on the ability of nongovernmental organizations (NGOs) to win more media coverage and to successfully influence the political processes. This original quantitative comparison of 50 Israeli NGOs examined two main issues: the impact of technology on the ability of organizations to achieve mass media and political success and whether some groups are better positioned than others to exploit technology to their advantage. A theoretical concept labeled digital fit was introduced and put to a statistical test using data from a survey of 50 NGO leaders and a survey of 15 key politicians who were asked to rank the political impact of organizations they are familiar with from relevant parliamentary committees they are members of. Digital fit is defined as a cluster of digitally related variables that puts political actors in a better position to harness digital technology to self-produce and self-distribute multimedia messages for the purpose of advocating their cause to mass media outlets and politicians. A prospective dimension of digital fit is its potential to stimulate power shifts between the old guard of successful political-communication actors and a new breed of successful challengers. Results showed that digital fit had a strong positive direct effect on mass media success and a mediated influence on political success. There are positive signs that conventional models are shifting in a way that empowers new political actors.  相似文献   
146.
In child sexual exploitation offenses, the collected evidence images often show the skin of nonfacial body parts of the criminals and victims. For identification in this scenario, “relatively permanent pigmented or vascular skin marks,” abbreviated as RPPVSM, were recently introduced as the basis for a novel biometric trait. This pilot study evaluated the interexaminer variability of RPPVSM identification. Four dermatology physicians were recruited to examine RPPVSM from 75 skin images collected from a total of 51 Caucasian and Asian subjects. The images were separated into 50 reference (“suspect”) images and 25 evaluation (“evidence”) images. The examiners were asked to perform identification by annotating RPPVSM in each of the 25 evaluation images and matching them with the reference images. The rate of misidentification was 0% while the mean rate at which examiners failed to find a match was 6%, indicating the potential of dermatology physicians performing the role of RPPVSM examiners.  相似文献   
147.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.  相似文献   
148.
高校期刊数字出版现状与前景分析   总被引:3,自引:0,他引:3  
当全球性的数字出版浪潮向我国出版业席卷而来时,业界表现出了前所未有的关注。我国数字出版的发展速度和繁荣程度是惊人的,为其进一步的深化提供了良好的基础和条件。目前,我国高校期刊数字出版尚停留在低层次的合作层面,并非真正意义上的“数字出版”。在今后的发展道路上,高校期刊需要依循循序渐进的合作发展模武,并正确认识发展过程中的相关问题,逐步探索一条适应高校期刊发展规律特点的数字出版之路。  相似文献   
149.
马睿 《政法学刊》2014,(4):45-47
期刊数字化出版作为一种新的出版方式,它正以其信息容量大、传播速度快、检索便捷等诸多优点,日益受到读者的青睐。然而,网络的广泛性和开放性,使得侵权轻而易举。在此背景下,作者、传统期刊的主办者、网络出版商三方在增强著作权保护意识的同时,签订合同,理清各自的权利和义务,同时采取有力的技术防范措施,以适应新形势下著作权保护的新特点。  相似文献   
150.
On 7th January 2013 the Anonymous hacking collective launched a White House petition asking the Obama administration to recognize DDoS11. Distributed Denial of Service attacks, thereafter referred to as DDoS attacks as a valid form of protest, similar to the Occupy protests. The ‘Occupy’ movement against financial inequality has become an international protest phenomenon stirring up the debate on the legal responses to acts of civil disobedience. At the same time, online attacks in the form of DDoS are considered by many as the digital counterparts of protesting. While the law generally acknowledges a certain level of protection for protesting as a manifestation of the rights to free speech and free assembly, it is still unclear whether DDoS attacks could qualify as free speech. This paper examines the analogies between offline protests and DDoS attacks, discusses legal responses in both cases and seeks to explore the scope for free speech protection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号