全文获取类型
收费全文 | 113篇 |
免费 | 2篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 17篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 1篇 |
轻工业 | 5篇 |
无线电 | 3篇 |
一般工业技术 | 4篇 |
冶金工业 | 9篇 |
自动化技术 | 68篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 1篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2013年 | 3篇 |
2012年 | 2篇 |
2011年 | 2篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 2篇 |
2005年 | 2篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 11篇 |
2001年 | 12篇 |
2000年 | 14篇 |
1999年 | 10篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有115条查询结果,搜索用时 31 毫秒
1.
2.
3.
Berni Dwan 《Computer Fraud & Security》2002,2002(2):11
The subjects of counterfeit and fraud have risen in popularity since the introduction of the Euro. While the notes are incredibly sophisticated, incorporating the most advanced technical features in the field of currency creation, the initial phase of unfamiliarity will raise the likelihood of people receiving and passing on counterfeits. Indeed, European Commissioner, Michaele Schreyer has warned that exceptional measures need to be taken to prevent 2002 becoming “the year of the counterfeiters”. In cooperation with the central banks of member states, the European Central Bank will coordinate a database on coin and note counterfeiting, to be used worldwide. The European Anti_Fraud Office (Olaf) will be the conduit of information exchange on the counterfeiting of the Euro. In addition, a European scientific and technical centre will be established to analyze every kind of fake Euro. Europol, the European police organization (www.europol.net), will serve as the coordinating anchor of all national anti_counterfeiting agencies, while Interpol will operate a special Euro file, which will register organized networks and independent counterfeiters operating in Europe, becoming the world reference in this field. 相似文献
4.
Berni Dwan 《Computer Fraud & Security》2001,2001(5):9
I have never met Wayne Summers of the Computer Science Faculty, New Mexico Highlands University, Las Vegas. Working in the arid desert air, he runs an excellent website (http://jaring.nmhu.edu/) that could really be described as a community service to those of us trying to keep abreast of the subject. 相似文献
5.
6.
7.
8.
9.
Berni Dwan 《Computer Fraud & Security》2001,2001(1):10-13
It was a cold winter’s night in 1991. After a long, difficult day in work I decided to have an early night. ‘Yep’, I said to my husband Brian at about 9 pm, ‘I’m going to bed with Clifford Stoll.’ Only being a few months’ married I was quick to clarify this by adding, ‘His Cuckoo’s Egg, that is.’ Hence the fascination began. I wanted to catch Markus Hess just as badly as Clifford Stoll did. I became Clifford Stoll’s doppelganger. I was with him every step of the way, checking those printouts and examining those logs. I was on call, waiting for that bleeper to go off. (This temporary aberration only lasted whilst reading the book)! The interesting thing is that I never once thought of Markus Hess as being ingenious let alone clever. I was more enthralled by the ingenuity of the pursuer rather than the dogged persistence of the pursued. 相似文献
10.
Berni Dwan 《Computer Fraud & Security》2002,2002(1):7
Not only is the protection of intellectual property (IP) an important issue, but it is vitally important to security for all those involved in E-business. Tradition has it that the mogul emperor Shah Jahan, who built the Taj Mahal instructed his soldiers to chop off the hands of the craftsmen who built it, so that another monument like it could never be recreated. Many centuries have passed since this apparently extreme case of protecting ones creation and terms like ‘copyright’ and ‘intellectual property’ are well established. 相似文献