全文获取类型
收费全文 | 103500篇 |
免费 | 14317篇 |
国内免费 | 10342篇 |
专业分类
电工技术 | 15786篇 |
技术理论 | 9篇 |
综合类 | 12129篇 |
化学工业 | 3915篇 |
金属工艺 | 2079篇 |
机械仪表 | 5295篇 |
建筑科学 | 4136篇 |
矿业工程 | 2558篇 |
能源动力 | 2276篇 |
轻工业 | 1491篇 |
水利工程 | 2056篇 |
石油天然气 | 1841篇 |
武器工业 | 1008篇 |
无线电 | 21074篇 |
一般工业技术 | 4486篇 |
冶金工业 | 1854篇 |
原子能技术 | 282篇 |
自动化技术 | 45884篇 |
出版年
2024年 | 903篇 |
2023年 | 2377篇 |
2022年 | 4403篇 |
2021年 | 4745篇 |
2020年 | 4802篇 |
2019年 | 3448篇 |
2018年 | 2841篇 |
2017年 | 3275篇 |
2016年 | 3424篇 |
2015年 | 3895篇 |
2014年 | 6664篇 |
2013年 | 5990篇 |
2012年 | 7575篇 |
2011年 | 7904篇 |
2010年 | 6157篇 |
2009年 | 6607篇 |
2008年 | 6864篇 |
2007年 | 7644篇 |
2006年 | 6470篇 |
2005年 | 5839篇 |
2004年 | 4907篇 |
2003年 | 4358篇 |
2002年 | 3462篇 |
2001年 | 2930篇 |
2000年 | 2451篇 |
1999年 | 2006篇 |
1998年 | 1493篇 |
1997年 | 1209篇 |
1996年 | 990篇 |
1995年 | 744篇 |
1994年 | 540篇 |
1993年 | 370篇 |
1992年 | 240篇 |
1991年 | 150篇 |
1990年 | 119篇 |
1989年 | 94篇 |
1988年 | 57篇 |
1987年 | 30篇 |
1986年 | 35篇 |
1985年 | 33篇 |
1984年 | 20篇 |
1983年 | 20篇 |
1982年 | 27篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1979年 | 8篇 |
1975年 | 3篇 |
1963年 | 3篇 |
1959年 | 4篇 |
1951年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
802.11n技术在高校的无线校园网的建设规划过程中逐渐成为焦点,本文在对802.11n关键技术介绍的基础上,讨论了在无线校园网规划、无线设备选型、有线无线一体化、电源配套等关键因素。 相似文献
992.
993.
《Information Security Journal: A Global Perspective》2013,22(1):40-46
ABSTRACT Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue. 相似文献
994.
《Information Security Journal: A Global Perspective》2013,22(3):116-123
ABSTRACT Information technology organizations within most corporations are spending significant time and resources securing IT infrastructure. This increased need for security is driven by a number of factors. These factors include increased dependency on the Internet, financial and legal liability, protection of personal identity information and sensitive corporate data, increased numbers and age of legacy systems with limited vendor support, deploying complex systems, and new regulations governing corporate transactions. There a number of technologies on the market today that can mitigate most of these security factors. However, managers in IT organizations need to identify potential future threats and security technologies to assess and potentially mitigate risk through the deployment of those technologies. This article investigates three areas critical to the successful deployment and securing of information technology. 相似文献
995.
《Information Security Journal: A Global Perspective》2013,22(4):183-192
ABSTRACT Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking. 相似文献
996.
997.
《Information Security Journal: A Global Perspective》2013,22(1-3):83-93
ABSTRACTFirewalls are one of the most widely used security devices to protect a communications network. They help secure it by blocking unwanted traffic from entering or leaving the protected network. Several commercial vendors have extended their firewall capabilities to support SCADA protocols or designed SCADA-specific firewalls. Although open-source firewalls are used successfully in IT networks, their use in SCADA networks has not been properly investigated. In this research we investigate the major open-source firewalls for their use in SCADA networks and identify Linux iptables’ potential as an effective SCADA firewall. Iptables is a powerful open-source firewall solution available as part of most Linux distributions in use today. In general, use of iptables as a network-level firewall for SCADA systems has been limited to basic port and host filtering, without further inspection of control messages. We propose and demonstrate a novel methodology to use iptables as an effective firewall for SCADA systems. This is achieved by utilizing advanced iptables features that allow for dynamic inspection of packet data. It is noteworthy to mention that the proposed solution does not require any modification to the netfilter/iptables framework, making it possible to turn a Linux system into an effective SCADA firewall. The approach has been tested by defining filtering rules for the Modbus TCP protocol and validating its ability to defend against various attacks on the protocol. 相似文献
998.
999.
1000.