computer crime
- computer crime的基本解释
-
n.
电脑犯罪
- 相似词
- 更多 网络例句 与computer crime相关的网络例句 [注:此内容来源于网络,仅供参考]
-
First, the author discusses the concept of drug, the concept of drug crime and the types of drug crime; Second, the author comparatively analysis both outside and inside legislation of drug crime, and analysis the characteristics of the legislation; Third, the author analysis several problems of the constitution of drug crime, including the accomplishment standard of the selling drug crime, the cognizance of illegally holding drug crime, mediacy act of drug crime; At last, the author presents my own proposals of perfecting the drug crime legislation, including adding the purchasing drug crime and illegally providing drug-making equipments crime, perfecting the aggravation polts and controlling the parole and commute of drug criminal.
首先,笔者论述了毒品的概念、毒品犯罪的概念和毒品犯罪的类型;其次,笔者对国内外毒品犯罪的立法进行了比较研究,并分析了其各自的立法特点;再次,笔者分析了我国毒品犯罪构成中的几个问题,包括贩卖毒品罪既未遂标准、非法持有毒品罪的认定和毒品犯罪居间行为;最后,笔者对我国毒品犯罪刑事立法的完善提出了自己的建议,包括增设购买毒品罪和非法提供制毒设备罪、完善我国毒品犯罪从重处罚的犯罪情节以及严格控制对毒犯的假释或减刑。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
This paper covers the following items of the crime of corruption: the definiens of corruption crime and the legislative evolution, the subject of corruption, the joint offender, conviction and its limits, legal sentence of corruption crime and legislative suggestions. Meanwhile, some focal points of the academic circle concerning the crime of corruption is interpreted, such as the definiens of corruption crime, conviction of the accomplice, means of calculating criminal amounts. Comparing the advantages and disadvantages of the different, academic points of view. It is there fore necessary to redefine the crime, the act of corruption in a narrow and in broad sense. The author proposes that the criminal liability of the accomplice should be investigated under the principle of joint taking the liability, while distinguishing their respective degrees of taking the liability so as to determine their criminal liability deserving of taking. Corruption crime's legal sentence breaks the three basic principles of the Criminal Law of PRC in nature, i. e. principle of a legally prescribed punishment for a specified crime; principle of suiting responsibility, punishment to crime; principle of equality before the law.
文章论及的内容包括:贪污罪的概念和立法演变,贪污罪的主体认定,贪污罪中的共同犯罪认定,贪污罪与相关犯罪的界限,贪污罪的刑法适用及立法完善;同时文章也对现在学术界争论的焦点问题,如贪污罪的概念、贪污罪共犯认定、贪污罪中各共同犯罪人的犯罪数额的计算,进行了不同学术观点的比较,分析了各种观点的利弊,对于贪污罪的概念重新予以认识,归纳了狭义贪污罪和广义贪污罪;提出在追究共同犯罪人的刑事责任时,应坚持共同负责的原则,同时区分各共同犯罪人在共同犯罪中所起作用的大小,以确定他们应承担的刑事责任;分析了刑法典中贪污罪法定刑设置存在的不足,认为贪污罪法定刑的设置从根本上违反了刑法三大基本原则,即罪行法定原则,罪责刑相适应原则以及刑法面前人人平等的原则,而且贪污罪法定刑的设置还存在其他一些问题,如附加刑包括罚金刑和没收财产刑等设置不当。
- 更多网络解释 与computer crime相关的网络解释 [注:此内容来源于网络,仅供参考]
-
computer crime:电脑犯罪
[1]对于"与电脑有关之犯罪",美国学者所使用之名词,至为分歧,归纳起来计有:(1)电脑滥用(computer abuse),(2)借电脑协助之犯罪(computer assisted crime),(3)与电脑相关之犯罪(computer reated crime),(4)电脑犯罪(computer crime),以及(5)电脑诈
-
computer crime:计算机犯罪
"计算机犯罪"(computer crime)一词的提出很早. 分析与计算机有关的犯罪行为,应该首先分析"计算机犯罪"作为一个概念提出的客观社会基础. 计算机的独特性也就是与计算机有关的犯罪所侵害的特殊对象应是我们确定"计算机犯罪"这一概念的基础. 以硬件意义上的计算机为对象的犯罪行为大多可以...
-
computer crime:涉及计算机的犯罪行为
component 组成元素;组件 | computer crime 涉及计算机的犯罪行为 | computer personnel 计算机从业员
-
computer crime:电脑犯罪net citizen 网民
compulsory education 义务教育 | computer crime 电脑犯罪net citizen 网民 | off line 下线
-
Computer Crime and Research:计算机犯罪与研究
392,"计算机导论","Introduction to Computer Technology" | 393,"计算机犯罪与研究","Computer Crime and Research " | 394,"计算机辅助设计","Computer Aided Design"
- 加载更多网络解释 (5)