首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83篇
  免费   7篇
外交国际关系   1篇
法律   66篇
中国共产党   1篇
中国政治   9篇
政治理论   1篇
综合类   12篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2019年   6篇
  2018年   13篇
  2017年   2篇
  2016年   4篇
  2015年   3篇
  2014年   7篇
  2013年   6篇
  2012年   11篇
  2011年   4篇
  2010年   4篇
  2009年   3篇
  2008年   3篇
  2006年   3篇
  2005年   3篇
  2004年   2篇
  2003年   1篇
  2002年   4篇
  2001年   1篇
  2000年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有90条查询结果,搜索用时 15 毫秒
1.
通过动物试验,用荧光光度法测定生物检材中氰化物浓度,研究了氰化物浓度与保存时间关系。结果表明,染毒血液高体120h内,氰化物浓度呈平缓直线上升;120h至168h之间呈指数下降;染毒肝脏检材在168h内呈直线上升,建立了线性方程。  相似文献   
2.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
3.
血中碳氧血红蛋白饱和度测定影响因素的研究   总被引:1,自引:0,他引:1  
目的 考察血中碳氧血红蛋白饱和度(HbCO%)测定的影响因素,为其结果评定和所需样品保存条件提供实验依据。方法 利用三种分光光度法,测定30d内不同条件下保存的CO阳性血的HbCO%的变化。结果 还原双波长法、双波长法测定结果比较稳定,单波长法抗干扰能力较差;尸检所取血样的保存条件包括温度、保存时间及与空气接触程度对HbCO%的测定均有影响,其中温度影响较为显著。结论 利用还原双波长法与双波长法,并结合光谱扫描观察峰形变化可得到比较可靠的结果。30d内4℃条件下,密闭容器中血样接触少量空气不影响其HbCO%的测定。  相似文献   
4.
This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.  相似文献   
5.
As the Internet and World Wide Web have rapidly evolved and revolutionized the applications in everyday life, it is a demanding challenge for investigators to keep up with the emerging technologies for forensic analyses. Investigating web browser usages for criminal activities, also known as web browser forensics, is a significant part of digital forensics as crucial browsing information of the suspect can be discovered. Particularly, in this study, an emerging web storage technology, called IndexedDB, is examined. Characteristics of IndexedDB technology in five major web browsers under three major operating systems are scrutinized. Also, top 15 US websites ranked by Alexa are investigated for their data storage in IndexedDB. User screen names, ids, and records of conversations, permissions, and image locations are some of the data found in IndexedDB. Furthermore, BrowStEx, a proof‐of‐concept tool previously developed, is extended and cultivated into BrowStExPlus, with which aggregating IndexedDB artifacts is demonstrated.  相似文献   
6.
Detection of canines are well‐known to be valuable in the location of contraband, such as explosives or narcotics. More recently, canines have been trained and utilized in the detection of concealed mass storage devices that might contain evidence of illegal activity such as child pornography. To lay the analytical foundation for this detection work, research was carried out to determine the volatile organic compounds associated with mass storage devices (MSD) that could be used by trained canines for detection. Headspace analysis of a variety of electronic devices was performed using solid phase microextraction (SPME) with gas chromatography/mass spectrometry (GC/MS). Analyses found several volatile compounds common to SIM and SD cards, as well as USB drives, including 2‐propenenitrile, styrene, isophorone, hydroxycyclohexyl phenyl ketone, and 2‐furanmethanol, tetrahydro. Results indicated that mass storage devices do have a characteristic odor profile making detection with minimal false alerts feasible for trained canines.  相似文献   
7.
Many Americans own guns to protect themselves against other people, but there is evidence that both victimization and gun access increase suicide risk. We conducted qualitative interviews with informants of 17 suicide cases in New Orleans of the 60 who died between January 2015 and April 2016 to understand the relationship between past trauma, gun access and storage, and suicide. Nine cases had experienced a past trauma, including three who had recently had a family member killed by homicide. Eight died via firearm; of those, seven owned the guns they used to take their lives and stored them locked (but loaded) at home or in their cars. Preventing community violence and addressing its sequelae may be important for reducing suicides. A multi‐pronged strategy consisting of policies, education, and marketing will likely be needed to address the risk of suicide conferred by gun access.  相似文献   
8.
This paper looks at EU banks' use of public cloud computing services. It is based primarily on anonymised interviews with banks, cloud providers, advisers, and financial services regulators. The findings are presented in three parts. Part 1 explored the extent to which banks operating in the EU, including global banks, use public cloud computing services.Part 2 of this paper covers the main legal and regulatory issues that may affect banks' use of cloud services. It sets out how EU banking regulators have approached banks' use of cloud services and considers regulators' lack of cloud computing knowledge. The paper further considers how the regulation of outsourcing applies to banks' use of cloud services, including whether cloud computing constitutes “outsourcing”. It analyses the contentious issue of contractual audit rights for regulators as well as legal and practical issues around risk assessments, security, business continuity, concentration risk, bank resolution, and banking secrecy laws.Part 3 looks at the key contractual issues that arise between banks and cloud service providers, including data protection requirements, termination, service changes, and liability.All three parts of the paper can be accessed via Computer Law and Security Review's page on ScienceDirect at: http://www.sciencedirect.com/science/journal/02673649?sdc=2. The full list of sources is available via the same link and will be printed alongside the third part of the article.  相似文献   
9.
云计算,作为近年来发展迅速的信息技术手段,给社会各机构、普通群众的生活提供了很大的便利。云存储作为云计算的一个延伸技术,越来越多的融入到人们的生活中。在这一新形势下,犯罪分子也越来越多的使用该技术规避侦查人员的侦查取证活动。有鉴于云存储技术的新颖性与复杂性,有必要针对性地分析研究新的侦查取证策略,以应对新挑战。  相似文献   
10.
This report examines possession and storage of firearms in low-income urban families with at least one child between 8 and 12 years of age. The data primarily consisted of responses to a survey administered to parents, but these data were supplemented by records obtained from discussion groups composed of children between 8 and 12 years of age. The data were collected from five low-income neighborhoods in a medium sized city in the Pacific Northwest as part of a larger study focusing on the presence of risk factors for substance abuse, violence, and gang activity. All five neighborhoods are known to be plagued by poverty, violence, substance abuse, and gang activity. To make our findings more understandable, we compared our findings from these neighborhoods to similar data from a middle-class neighborhood. Middle-class parents were twice as likely to have firearms in their homes, but were much less likely to keep them loaded and/or unlocked. High rates of victimization, fear of crime, self-protective behavior, and exposure to threats or attacks were associated with keeping firearms for protection and engaging in risky gun behavior in the home.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号