咨询与建议

限定检索结果

文献类型

  • 218 篇 期刊文献
  • 110 册 图书
  • 25 篇 会议

馆藏范围

  • 353 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 190 篇 工学
    • 128 篇 计算机科学与技术...
    • 25 篇 生物医学工程(可授...
    • 21 篇 控制科学与工程
    • 20 篇 仪器科学与技术
    • 18 篇 软件工程
    • 13 篇 船舶与海洋工程
    • 13 篇 网络空间安全
    • 8 篇 信息与通信工程
    • 5 篇 电气工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 电子科学与技术(可...
    • 4 篇 化学工程与技术
  • 122 篇 理学
    • 115 篇 物理学
    • 29 篇 化学
    • 24 篇 生物学
    • 5 篇 系统科学
    • 4 篇 数学
  • 119 篇 医学
    • 105 篇 基础医学(可授医学...
    • 39 篇 特种医学
    • 37 篇 临床医学
    • 24 篇 医学技术(可授医学...
  • 23 篇 教育学
    • 23 篇 教育学
  • 20 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 9 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
    • 3 篇 公安学
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 2 篇 文学
    • 2 篇 中国语言文学

主题

  • 353 篇 computer science...
  • 60 篇 medical imaging
  • 35 篇 computer softwar...
  • 30 篇 cancer
  • 29 篇 computer simulat...
  • 27 篇 radiation therap...
  • 26 篇 dosimetry
  • 25 篇 medical treatmen...
  • 20 篇 information tech...
  • 19 篇 network
  • 19 篇 computer systems
  • 15 篇 computed tomogra...
  • 14 篇 monographs and c...
  • 12 篇 radiation treatm...
  • 12 篇 testing procedur...
  • 12 篇 therapeutics
  • 12 篇 medical physicis...
  • 11 篇 networks and gen...
  • 11 篇 intensity modula...
  • 10 篇 biomedical model...

机构

  • 10 篇 reviewer
  • 4 篇 univ elect sci &...
  • 4 篇 univ fribourg de...
  • 4 篇 ut md anderson c...
  • 3 篇 duke university ...
  • 3 篇 memorial sloan-k...
  • 2 篇 university of io...
  • 2 篇 national cancer ...
  • 2 篇 university of wi...
  • 2 篇 bell telephone l...
  • 2 篇 the university o...
  • 2 篇 univ elect sci &...
  • 2 篇 univ western aus...
  • 2 篇 uc davis medical...
  • 2 篇 google llc
  • 2 篇 siemens ag
  • 2 篇 jiangxi universi...
  • 1 篇 aalto univ dept ...
  • 1 篇 csiro mineral re...
  • 1 篇 peking univ mini...

作者

  • 5 篇 j purdy
  • 4 篇 w bosch
  • 4 篇 zhou tao
  • 4 篇 j matthews
  • 3 篇 sammons john
  • 3 篇 zeng an
  • 3 篇 small michael
  • 3 篇 w straube
  • 2 篇 j deasy
  • 2 篇 tian hui
  • 2 篇 j boone
  • 2 篇 shang ke-ke
  • 2 篇 s armato
  • 2 篇 monasson r
  • 2 篇 vidmer alexandre
  • 2 篇 chen duan-bing
  • 2 篇 chuvakin anton
  • 2 篇 hughes ralph
  • 2 篇 dennis d. leavit...
  • 2 篇 orton colin g.

语言

  • 330 篇 英文
  • 21 篇 中文
  • 2 篇 其他
检索条件"主题词=Computer Science and Technology"
353 条 记 录,以下是121-130 订阅
排序:
Hacking with Kali: Practical Penetration Testing Techniques  1
收藏 引用
2013年
作者: Broad, James Bindner, Andrew
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb d... 详细信息
来源: 评论
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard  1
收藏 引用
2013年
作者: Brett Shavers
Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner a... 详细信息
来源: 评论
The Digital Crown: Winning at Content on the Web  1
收藏 引用
2013年
作者: Leibtag, Ahava
In 1997, Bill Gates famously said "Content is king." Since then, the digital marketing world has been scrambling to fulfill this promise, as we finally shift our focus to what consumers really want from our ... 详细信息
来源: 评论
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic  1
收藏 引用
2013年
作者: Robert Shimonski
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the worlds foremost network pr... 详细信息
来源: 评论
Practical Anonymity: Hiding in Plain Sight Online  1
收藏 引用
2013年
作者: Loshin, Peter
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees an... 详细信息
来源: 评论
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE: Developing Cyber-Physical Systems
收藏 引用
丛书名: The MK/OMG Press
2013年
作者: Selic, Bran Gerard, Sebastien
Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustratin... 详细信息
来源: 评论
Mobile User Experience: Patterns to Make Sense of it All
收藏 引用
2013年
作者: Mendoza, Adrian
This is your must-have resource to the theoretical and practical concepts of mobile UX. Youl learn about the concepts and how to apply them in real-world scenarios. Throughout the book, the author provides you with 10... 详细信息
来源: 评论
Cloud Storage Forensics  1
收藏 引用
2013年
作者: Quick, Darren Martini, Ben Choo, Raymond
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations a... 详细信息
来源: 评论
Application Administrators Handbook: Installing, Updating and Troubleshooting Software
收藏 引用
2013年
作者: Bourne, Kelly C
An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they ma... 详细信息
来源: 评论
The Basics of IT Audit: Purposes, Processes, and Practical Information  1
收藏 引用
丛书名: Basics (Syngress)
2013年
作者: Gantz, Stephen D.
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing proces... 详细信息
来源: 评论