首页 > 最新文献

Journal of Security Education最新文献

英文 中文
Security Management at the University of Denver University College 丹佛大学学院安全管理专业
Pub Date : 2007-12-18 DOI: 10.1300/J460V02N04_12
John Hill
ABSTRACT Security is a $100 billion annual business and is one of the fastest growing professions in the United States and worldwide. To obtain the skills and business training necessary to protect against new threats, security management professionals require higher education and advanced training. The University of Denver University College developed a robust security curriculum to meet the professional's needs by offering a Master of Applied Science in Security Management and a Certificate of Advanced Study in Security.
安全是一个年销售额达1000亿美元的行业,是美国乃至全球增长最快的行业之一。为了获得防范新威胁所需的技能和业务培训,安全管理专业人员需要接受高等教育和高级培训。丹佛大学学院通过提供安全管理应用科学硕士和安全高级研究证书,开发了一个强大的安全课程,以满足专业人士的需求。
{"title":"Security Management at the University of Denver University College","authors":"John Hill","doi":"10.1300/J460V02N04_12","DOIUrl":"https://doi.org/10.1300/J460V02N04_12","url":null,"abstract":"ABSTRACT Security is a $100 billion annual business and is one of the fastest growing professions in the United States and worldwide. To obtain the skills and business training necessary to protect against new threats, security management professionals require higher education and advanced training. The University of Denver University College developed a robust security curriculum to meet the professional's needs by offering a Master of Applied Science in Security Management and a Certificate of Advanced Study in Security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Characteristics and Outcomes of Insurance Claims Involving Losses from Theft 盗窃损失保险索赔的特点与结果
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_03
Shaun L. Gabbidon, Lakiesha N. Marzette
ABSTRACT This research examined state-level cases where businesses sued their insurance company in order to recoup losses related to theft. The study was based on 70 civil suits that provided the characteristics and outcomes of such litigation. In general, the cases revealed the following: Such legal suits were on the rise; males more than females were involved in the incidents in which the loss occurred; those in nonmanagerial positions were most often the employees who caused the loss; larceny, and embezzlement were most often the ways in which losses occurred; the cases involved significant losses; and, insurers were compelled to pay all or most of the claim in many of the cases.
本研究考察了企业起诉保险公司以赔偿与盗窃有关的损失的州级案例。该研究以70起民事诉讼为基础,提供了此类诉讼的特征和结果。总的来说,这些案件揭示了以下几点:此类法律诉讼呈上升趋势;男性比女性更多地参与发生损失的事件;那些非管理职位的员工往往是造成损失的最常见的员工;盗窃和挪用公款是造成损失最常见的方式;损失重大的;而且,在许多情况下,保险公司被迫支付全部或大部分索赔。
{"title":"Characteristics and Outcomes of Insurance Claims Involving Losses from Theft","authors":"Shaun L. Gabbidon, Lakiesha N. Marzette","doi":"10.1300/J460v02n04_03","DOIUrl":"https://doi.org/10.1300/J460v02n04_03","url":null,"abstract":"ABSTRACT This research examined state-level cases where businesses sued their insurance company in order to recoup losses related to theft. The study was based on 70 civil suits that provided the characteristics and outcomes of such litigation. In general, the cases revealed the following: Such legal suits were on the rise; males more than females were involved in the incidents in which the loss occurred; those in nonmanagerial positions were most often the employees who caused the loss; larceny, and embezzlement were most often the ways in which losses occurred; the cases involved significant losses; and, insurers were compelled to pay all or most of the claim in many of the cases.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114661013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Animal Cruelty and Violent Behavior 虐待动物和暴力行为
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_04
J. McClellan
ABSTRACT During the 1960s a supposition emerged based on a few case studies from anecdotal presentations and varied observational reports that the presence of childhood abuse towards animals was likely a significant precursor or major predictive dynamic for later adult interpersonal violent behavior of violent murderers in particular. This connection was then further applied to the linkage of childhood generalized violent behavior with future adult interpersonal violence. From its earliest presentation coupled with a growing chorus of sociologists and criminologists asserting the linkage assumptions, the supposition rose in the popular consciousness as a key indicator of the violent propensities in children. In 1987 childhood animal cruelty first appeared in the American Psychiatric Association Diagnostic Statistical Manual (III-R) as one of a set of symptoms indicating the presence of conduct disorder and as a factor associated with adult antisocial behavior. This article explores the early history of the linkage between childhood animal abuse and subsequent violent adult behavior in contemporary research and examines the questions involved with whether or not there is a valid connection between the issues of childhood animal abuse and violent interpersonal adult criminal conduct.
在20世纪60年代,基于一些轶事陈述和各种观察报告的案例研究,出现了一种假设,即儿童虐待动物的存在可能是暴力杀人犯成年后人际暴力行为的重要前兆或主要预测动力。这种联系随后被进一步应用于儿童时期普遍的暴力行为与未来成人人际暴力之间的联系。从它最早的出现,再加上越来越多的社会学家和犯罪学家断言这种联系假设,这种假设作为儿童暴力倾向的关键指标在大众意识中上升。1987年,儿童虐待动物首次出现在美国精神病学协会诊断统计手册(III-R)中,作为表明存在行为障碍的一组症状之一,并作为与成人反社会行为相关的一个因素。本文探讨了当代研究中儿童虐待动物与随后的成年暴力行为之间联系的早期历史,并探讨了儿童虐待动物问题与成年暴力人际犯罪行为之间是否存在有效联系的问题。
{"title":"Animal Cruelty and Violent Behavior","authors":"J. McClellan","doi":"10.1300/J460v02n04_04","DOIUrl":"https://doi.org/10.1300/J460v02n04_04","url":null,"abstract":"ABSTRACT During the 1960s a supposition emerged based on a few case studies from anecdotal presentations and varied observational reports that the presence of childhood abuse towards animals was likely a significant precursor or major predictive dynamic for later adult interpersonal violent behavior of violent murderers in particular. This connection was then further applied to the linkage of childhood generalized violent behavior with future adult interpersonal violence. From its earliest presentation coupled with a growing chorus of sociologists and criminologists asserting the linkage assumptions, the supposition rose in the popular consciousness as a key indicator of the violent propensities in children. In 1987 childhood animal cruelty first appeared in the American Psychiatric Association Diagnostic Statistical Manual (III-R) as one of a set of symptoms indicating the presence of conduct disorder and as a factor associated with adult antisocial behavior. This article explores the early history of the linkage between childhood animal abuse and subsequent violent adult behavior in contemporary research and examines the questions involved with whether or not there is a valid connection between the issues of childhood animal abuse and violent interpersonal adult criminal conduct.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Organized Crime and Technology 有组织罪案及科技
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_07
D. Angelini, S. Gibson
ABSTRACT Organized crime is taking advantage of insufficient computer crime legislation in multiple jurisdictions and successfully perpetrating their crimes on the Internet. This article assesses how money laundering and other crimes are facilitated by technology. It concludes with a survey of some of the initiatives in both the European Union (EU) and the US that are aimed at combating this growing problem. It is suggested that in order to address these criminal issues effectively, the initiatives must include all stakeholders and be international in scope. Solutions must include legislative changes, education, and continual cooperation between all interested parties.
有组织犯罪利用多个司法管辖区计算机犯罪立法的不足,在互联网上成功实施犯罪。本文评估了技术如何促进洗钱和其他犯罪。文章最后对欧盟(EU)和美国旨在解决这一日益严重的问题的一些举措进行了调查。有人建议,为了有效地解决这些犯罪问题,这些倡议必须包括所有利益攸关方,并在范围上具有国际性。解决方案必须包括立法改革、教育以及所有相关方之间的持续合作。
{"title":"Organized Crime and Technology","authors":"D. Angelini, S. Gibson","doi":"10.1300/J460v02n04_07","DOIUrl":"https://doi.org/10.1300/J460v02n04_07","url":null,"abstract":"ABSTRACT Organized crime is taking advantage of insufficient computer crime legislation in multiple jurisdictions and successfully perpetrating their crimes on the Internet. This article assesses how money laundering and other crimes are facilitated by technology. It concludes with a survey of some of the initiatives in both the European Union (EU) and the US that are aimed at combating this growing problem. It is suggested that in order to address these criminal issues effectively, the initiatives must include all stakeholders and be international in scope. Solutions must include legislative changes, education, and continual cooperation between all interested parties.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid 为什么社区大学的计算机安全课程不受欢迎以及应该避免的陷阱
Pub Date : 2007-12-18 DOI: 10.1300/J460V02N04_06
M. Basham
ABSTRACT Many presentations on curriculum tend to focus upon the best practices. This article is not one of those. Instead this article is a collection of the pitfalls to avoid when building a computer security course, program, or degree. The intent is not to hope that programs fail but to give educators some guidance on the pitfalls to avoid when building computer security programs. This article results from more than seven years of managing, traveling, and lecturing on computer security program development issues.
许多关于课程的演讲倾向于关注最佳实践。这篇文章不是其中之一。相反,本文是在构建计算机安全课程、程序或学位时要避免的陷阱的集合。其目的不是希望程序失败,而是给教育工作者一些指导,告诉他们在构建计算机安全程序时应该避免哪些陷阱。这篇文章是我七年多来管理、旅行和讲授计算机安全程序开发问题的结果。
{"title":"Why Computer Security Courses Are Failing in Community Colleges and the Pitfalls to Avoid","authors":"M. Basham","doi":"10.1300/J460V02N04_06","DOIUrl":"https://doi.org/10.1300/J460V02N04_06","url":null,"abstract":"ABSTRACT Many presentations on curriculum tend to focus upon the best practices. This article is not one of those. Instead this article is a collection of the pitfalls to avoid when building a computer security course, program, or degree. The intent is not to hope that programs fail but to give educators some guidance on the pitfalls to avoid when building computer security programs. This article results from more than seven years of managing, traveling, and lecturing on computer security program development issues.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n04_01","DOIUrl":"https://doi.org/10.1300/J460v02n04_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132553437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trans-System Ruptures and Wireless Solutions 跨系统故障和无线解决方案
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_02
Shreyas Pandit
ABSTRACT August 14, 2003, a massive power outage cascades through the Northeastern region of North America becoming the largest blackout in the region's history affecting over 50 million people and costing an estimated 4–10 billion US dollars. December 26, 2004, a tsunami triggered by two undersea earthquakes on the Sumatra-Andaman fault-line results in an estimated 300,000 deaths across five regions. August 23 and 29, 2005, the southeastern coast of the United States was hit by Hurricane Katrina, labeled as the most destructive and expensive disasters in US history. The perceived increase in the frequency of disasters over the recent years has prompted increased focus in the development of disaster resilient telecommunication networks. This paper provides an overview of how current telecommunications infrastructure functions during disasters, specifically how it ruptures and the impact it has on post-disaster recovery efforts. Further, the paper investigates possible attempts with wireless technology to prepare the telecommunications infrastructure for crisis communications.
2003年8月14日,北美东北部地区发生大规模停电,成为该地区历史上最大的停电事件,影响了5000多万人,造成约40 - 100亿美元的损失。2004年12月26日,苏门答腊-安达曼断裂带上两次海底地震引发海啸,造成五个地区约30万人死亡。2005年8月23日至29日,美国东南部沿海地区遭受卡特里娜飓风袭击,这是美国历史上最具破坏性和最昂贵的灾难。近年来灾害频率的增加促使人们更加关注抗灾电信网络的发展。本文概述了当前电信基础设施在灾害期间的功能,特别是它是如何破裂的,以及它对灾后恢复工作的影响。此外,本文还研究了利用无线技术为危机通信准备电信基础设施的可能尝试。
{"title":"Trans-System Ruptures and Wireless Solutions","authors":"Shreyas Pandit","doi":"10.1300/J460v02n04_02","DOIUrl":"https://doi.org/10.1300/J460v02n04_02","url":null,"abstract":"ABSTRACT August 14, 2003, a massive power outage cascades through the Northeastern region of North America becoming the largest blackout in the region's history affecting over 50 million people and costing an estimated 4–10 billion US dollars. December 26, 2004, a tsunami triggered by two undersea earthquakes on the Sumatra-Andaman fault-line results in an estimated 300,000 deaths across five regions. August 23 and 29, 2005, the southeastern coast of the United States was hit by Hurricane Katrina, labeled as the most destructive and expensive disasters in US history. The perceived increase in the frequency of disasters over the recent years has prompted increased focus in the development of disaster resilient telecommunication networks. This paper provides an overview of how current telecommunications infrastructure functions during disasters, specifically how it ruptures and the impact it has on post-disaster recovery efforts. Further, the paper investigates possible attempts with wireless technology to prepare the telecommunications infrastructure for crisis communications.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with David Brooks 专访大卫·布鲁克斯
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_10
John Kostanoski
David Brooks is currently the Security Science Discipline Coordinator in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. David’s research areas include the security body of knowledge, psychometric risk management and the application of security technology. General duties include the development, management and administration of four undergraduate security science courses, an honour’s, two Master’s courses and a PhD program.
David Brooks现任西澳大利亚珀斯伊迪丝考恩大学工程与数学学院安全科学学科协调员。David的研究领域包括安全知识体系、心理风险管理和安全技术应用。一般职责包括开发、管理和管理四门本科安全科学课程、一门荣誉课程、两门硕士课程和一门博士课程。
{"title":"Interview with David Brooks","authors":"John Kostanoski","doi":"10.1300/J460v02n04_10","DOIUrl":"https://doi.org/10.1300/J460v02n04_10","url":null,"abstract":"David Brooks is currently the Security Science Discipline Coordinator in the School of Engineering and Mathematics, Edith Cowan University, Perth, Western Australia. David’s research areas include the security body of knowledge, psychometric risk management and the application of security technology. General duties include the development, management and administration of four undergraduate security science courses, an honour’s, two Master’s courses and a PhD program.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with Michael W. Wanik, CPP, CBCP 采访Michael W. Wanik, CPP, CBCP
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_11
John Kostanoski
{"title":"Interview with Michael W. Wanik, CPP, CBCP","authors":"John Kostanoski","doi":"10.1300/J460v02n04_11","DOIUrl":"https://doi.org/10.1300/J460v02n04_11","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System Hardening 系统硬化
Pub Date : 2007-12-18 DOI: 10.1300/J460v02n04_09
Nick Clemente
ABSTRACT The rise of sophisticated technology introduces us to the sophisticated adversary. These adversaries force us to increase our defense and security of today's information systems more than ever. The powerful process of system hardening is a good way to increase our defense and security. System hardening is a multilayered system of defense to enhance the security of an information system. My goal here is to fully define the term system hardening and explain its benefits, methods to accomplish it, the tools available to us to secure our systems, the challenges that stand in the way, and the goals of system hardening.
尖端技术的兴起使我们认识到了老练的对手。这些对手迫使我们比以往任何时候都要加强对当今信息系统的防御和安全。强大的系统加固过程是增加我们的防御和安全的好方法。系统加固是为提高信息系统的安全性而进行的多层防御。我在这里的目标是完整地定义术语“系统加固”,并解释它的好处、实现它的方法、可用来保护系统的工具、阻碍系统加固的挑战以及系统加固的目标。
{"title":"System Hardening","authors":"Nick Clemente","doi":"10.1300/J460v02n04_09","DOIUrl":"https://doi.org/10.1300/J460v02n04_09","url":null,"abstract":"ABSTRACT The rise of sophisticated technology introduces us to the sophisticated adversary. These adversaries force us to increase our defense and security of today's information systems more than ever. The powerful process of system hardening is a good way to increase our defense and security. System hardening is a multilayered system of defense to enhance the security of an information system. My goal here is to fully define the term system hardening and explain its benefits, methods to accomplish it, the tools available to us to secure our systems, the challenges that stand in the way, and the goals of system hardening.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121061215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Security Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1