首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1854篇
  免费   45篇
  国内免费   2篇
教育   1295篇
科学研究   117篇
各国文化   40篇
体育   212篇
综合类   2篇
文化理论   25篇
信息传播   210篇
  2023年   10篇
  2022年   20篇
  2021年   25篇
  2020年   53篇
  2019年   94篇
  2018年   107篇
  2017年   99篇
  2016年   83篇
  2015年   66篇
  2014年   75篇
  2013年   431篇
  2012年   61篇
  2011年   59篇
  2010年   57篇
  2009年   46篇
  2008年   56篇
  2007年   59篇
  2006年   49篇
  2005年   37篇
  2004年   40篇
  2003年   26篇
  2002年   32篇
  2001年   14篇
  2000年   20篇
  1999年   16篇
  1998年   14篇
  1997年   20篇
  1996年   17篇
  1995年   16篇
  1994年   10篇
  1993年   8篇
  1992年   19篇
  1991年   16篇
  1990年   11篇
  1989年   12篇
  1988年   11篇
  1987年   11篇
  1986年   7篇
  1985年   9篇
  1984年   16篇
  1983年   8篇
  1982年   7篇
  1980年   7篇
  1979年   9篇
  1978年   8篇
  1976年   3篇
  1973年   4篇
  1971年   3篇
  1967年   3篇
  1905年   3篇
排序方式: 共有1901条查询结果,搜索用时 15 毫秒
961.
This paper offers a historical perspective on government policies for the rationalisation of higher education (HE) in Ireland through a critical re-appraisal of the initiative for ‘merger’ of Trinity College and University College Dublin. The initiative launched by Donogh O'Malley in 1967 was the first significant attempt by an Irish government to transform the institutional architecture of HE. This study sheds new light on the rationale for merger. A key motivation for the merger was to overcome ‘the problem of Trinity College Dublin’: policy-makers sought to integrate Trinity College, long regarded as a Protestant ‘enclave’ in a predominantly Catholic society, within the Irish HE system. O'Malley's initiative sought to bring Trinity College Dublin (TCD) firmly under the control of the state and transcend traditional religious divisions, by circumventing the ‘ban’ on the attendance of Catholics at TCD imposed by the Catholic bishops. This paper also explores the emergence of proactive, interventionist approaches by Irish ministers and officials to policy formulation and implementation in HE.  相似文献   
962.
The purpose of the present study was to investigate and rank order by importance the contributions of various cognitive predictors to reading comprehension in third, seventh, and tenth graders. An exploratory factor analysis revealed that for third grade, the best fit was a four-factor solution including fluency, verbal reasoning, nonverbal reasoning, and working memory factors. For seventh and tenth grade, three-factor solutions with fluency, reasoning, and working memory factors were the best fit. The three and four-factor models were used in separate dominance analyses for each grade to rank order the factors by predictive importance to reading comprehension. Results indicated that fluency and verbal reasoning were the most important predictors of third grade reading comprehension. For seventh grade, fluency and reasoning were the most important predictors. By tenth grade, reasoning was the most important predictor of reading comprehension. Working memory was the least predictive of reading comprehension across all grade levels. These results suggest that inferential reasoning skills become an important contributor to reading comprehension at increasing grade levels.  相似文献   
963.
Within the development studies framework, empowerment involves increasing individual agency vis-à-vis the formal and informal opportunity structure. The Open Society Foundation's Early Childhood Programme developed the Getting Ready for School programme specifically for parents of preschool-age children to use at home in the year before school to build early math and literacy skills in their children. In Tajikistan, parents met on a regular basis with teachers in their local schools to learn activities to use with their children at home. Focus group reports indicated that parents gained knowledge and self-confidence as a result of programme participation, considered foundational aspects of the empowerment process. Responses also demonstrated that parents displayed characteristics of empowerment as they used programme activities and skills not only with their six-year-old child, but with siblings, extended family members and community children. They also shared the skills they learned with family members and neighbours.  相似文献   
964.
Objective:The purpose of this study was to compare pharmacy students’ ability to correctly answer drug information questions using Micromedex with Watson, Micromedex without Watson, or Google.Methods:This multicenter randomized trial compared pharmacy student responses to drug information questions using Micromedex with Watson, Micromedex without Watson, or Google from January to March of 2020. First- to fourth-year pharmacy students at two institutions were included. The primary outcome was the number of correct answers. Secondary outcomes were the time taken to answer the questions and differences in number of correct answers by pharmacy student year and institution.Results:The analysis included 162 participants: 52 students in the Micromedex group, 51 students in the Watson group, and 59 students in the Google group. There was a significant difference among groups in the total number of questions answered correctly (p=0.02). Post-hoc analysis revealed that participants in the Micromedex group answered more questions correctly than those in the Google group (p=0.015). There were no significant differences between Micromedex and Watson groups (p=0.52) or between Watson and Google groups (p=0.22). There was also no difference in time to complete the questions among groups (p=0.72).Conclusion:Utilizing Google did not save students time and led to more incorrect answers. These findings suggest that health care educators and health sciences librarians should further reinforce training on the appropriate use of drug information resources.  相似文献   
965.
How does educational stage affect the way people find information? In previous research using the Digital Visitors & Residents (V&R) framework for semi-structured interviews, context was a factor in how individuals behaved. This study of 145 online, open-ended surveys examines the impact that one's V&R educational stage has on the likelihood of attending to digital and human sources across four contexts. These contexts vary according to whether the search was professional or personal and successful or struggled. The impact of educational stage differs based on context. In some contexts, people at higher educational stages are more likely to attend to digital sources and less likely to attend to human sources. In other contexts, there is no statistically significant difference (p < 0.10) among educational stages. These findings provide support for previous V&R research, while also demonstrating that online surveys can be used to supplement and balance the data collected from semi-structured interviews.  相似文献   
966.
Current fiscal shortfalls are projected to bring deep and long-lasting budget cuts to libraries. With every budget dollar under close scrutiny, the urgency of filling patron information needs efficiently and cost-effectively increases. Interlibrary loan plays an important role in filling in gaps in library collections, yet as significant budget cuts are made at libraries of all sizes, materials will be available from fewer and fewer lenders. Libraries unable to find items from those with whom they have reciprocal arrangements will be will be forced to use lenders who charge. This article examines fees associated with interlibrary lending in 30 academic libraries in the southeast from 1995 and 2008.  相似文献   
967.
10. HISTORY     
A. Reference works

AN HISTORICAL AND ANALYTICAL BIBLIOGRAPHY OF THE LITERATURE OF CRYPTOLOGY by Joseph S. Galland (Evanston, IL: Northwestern University Graduate School “Northwestern University Studies in the Humanities Number Ten,”; 1945; reprinted by AMS Press, 1970; reprinted again by Aegean Park Press [Laguna Hills, CA], 1980—$26.80, paper, ISBN 0–89412–252–5, 209 pp.)

ENCYCLOPEDIA OF CRYPTOLOGY by David E. Newton (Santa Barbara, CA: ABC‐Clio, 1997—$65.00, ISBN 0–87436–772–7, 330 pp., photos, tables, bibliography, index)

SIGNALS INTELLIGENCE IN WORLD WAR II: A RESEARCH GUIDE compiled by Donal J. Sexton (Westport, CT: Greenwood, 1996—$69.50, ISBN 0–313–28304–4, 165 pp., bibliography, index)

DESCRIPTIVE DICTIONARY OF CRYPTOLOGIC TERMS by the U.S. Army Security Agency (Laguna Hills, CA: Aegean Park Press, 1980, 166 pp., ISBN 0–89412–266–5, bibliography)

CODES, CIPHERS &; OTHER CRYPTIC AND CLANDESTINE COMMUNICATION: MAKING AND BREAKING SECRET MESSAGES FROM HIEROGLYPHS TO THE INTERNET by Fred B. Wrixton (New York: Black Dog &; Leventhal, 1998—$17.98, ISBN 1–57912–040–7, 704 pp., diagrams, tables, appendix, glossary, bibliography, index)

B. Historical surveys

THE HISTORY OF CODES AND CIPHERS IN THE UNITED STATES: PRIOR TO WORLD WAR I edited by Wayne G. Barker (Laguna Hills, CA: Aegean Park Press “Cryptographic Series,”; 1978—$24.80, paper, ISBN 0–89412–026–3, 159 pp., notes, index)

THE MAN WHO BROKE PURPLE: THE LIFE OF COLONEL WILLIAM F. FRIEDMAN, WHO DECIPHERED THE JAPANESE CODE IN WORLD WAR II by Ronald Clark (Boston: Little, Brown, 1977, ISBN 0–316–14595–5, 271 pp., photos, index)

CRYPTOLOGY YESTERDAY, TODAY, AND TOMORROW edited by Cipher Deavours, et al. (Norwood, MA: Artech House “Artech House Communication and Electronic Defense Library,”; 1987, ISBN 0–89006–253–6, 519 pp., illustrations, notes)

CRYPTOLOGY: MACHINES, HISTORY &; METHODS edited by Cipher Deavours, et al. (Norwood, MA: Artech House, 1989, ISBN 0–89006–399–0, 508 pp., illustrations, notes)

SELECTIONS FROM CRYPTOLOGIA: HISTORY, PEOPLE, AND TECHNOLOGY edited by Cipher A. Deavours, et al. (Norwood, MA: Attech House “Artech House Telecommunications Library,”; 1998—$83–00, ISBN 0–89006–862–3, 552 pp., illustrations, notes)

WAR SECRETS IN THE ETHER by Wilhelm F. Flicke, edited by Sheila Carlisle (Laguna Park, CA: Aegean Park Press, 1977, two vols; 1994 [rev. ed.]—$26.80, paper, ISBN 0–89412–233–9, 234 pp., index)

THE FRIEDMAN LEGACY: A TRIBUTE TO WILLIAM AND ELIZEBETH FRIEDMAN. (Fort George G. Meade, MD: National Security Agency, Center for Cryptologie History, “Sources in Cryptologie History, Number 3,”; 1992, 282 pp., photos, diagrams, notes, index)

THE CODEBREAKERS: THE STORY OF SECRET WRITING by David Kahn (New York: Macmillan, 1967; London: Weidenfeld &; Nicolson, 1974 [abridged ed.]; New York: Scribner's 1996 [2nd ed.]—$60.00, ISBN 0–684–83130–9, 1, 181 pp., photos, notes, index)

KAHN ON CODES: SECRETS OF THE NEW CRYPTOLOGY by David Kahn (New York: Macmillan, 1983, ISBN 0–02–560640–9, 343 pp., notes, index)

MASKED DISPATCHES: CRYPTOGRAMS AND CRYPTOLOGY IN AMERICAN HISTORY, 1775–1900 by Ralph E. Weber (Fort George G. Meade, MD: National Security Agency, Center for Cryptologic History “United States Cryptologic History, Series 1, Pre‐World War I, Vol. 1,”; 1993, paper, OCLC 29961699, 235 pp., photos, diagrams, notes, bibliography)

THE SIGINT SECRETS: THE SIGNALS INTELLIGENCE WAR, 1900 TO TODAY: INCLUDING THE PERSECUTION OF GORDON WELCHMAN by Nigel West (New York: William Morrow, 1998, ISBN 0–688–07652–1, 347 pp., appendices, photos, notes, bibliography, index)

C. World War I

THE HISTORY OF CODES AND CIPHERS IN THE UNITED STATES: DURING WORLD WAR I edited by Wayne G. Barker (Laguna Hills, CA: Aegean Park Press “Cryptographic Series,”; 1979—$24.80, paper, ISBN 0–89412–031‐X, 263 pp., notes, index)

ROOM 40: BRITISH NAVAL INTELLIGENCE 1914–1918 by Patrick Beesly (New York: Harcourt, Brace, Jovanovich, 1982, ISBN 0–15–178634–8, 338 pp., photos, notes, appendix, index)

THE ZIMMERMANN TELEGRAM OF JANUARY 16, 1917 AND ITS CRYPTOGRAPHIC BACKGROUND by William F. Friedman and Charles J. Mendelsohn (Laguna Hills, CA: Aegean Park Press “Cryptographic Series,”; 1994— $12.80, paper, ISBN 0–89412–239–8, 58 pp., photo, notes, appendix, index)

THE CONTRIBUTION OF THE CRYPTOGRAPHIC BUREAUS IN THE WORLD WAR by Yves Gyldén (Washington, DC: U.S. Government Printing Office, 1935; reprinted by Aegean Park Press “Cryptographic Series,”; 1978, ISBN 0–89412–027–1, 87 pp., notes)

THE CODE BREAKERS OF ROOM 40: THE STORY OF ADMIRAL SIR WILLIAM [sic] HALL, GENIUS OF BRITISH COUNTER‐INTELLIGENCE by Admiral Sir William James (New York: St. Martin's Press, 1956, OCLC 408707, 212 pp., photos, index)

THE ZIMMERMANN TELEGRAM by Barbara W. Tuchman (New York: Viking Press, 1958; Macmillan, 1966, OCLC 34683297, 244 pp., photos, notes, bibliography, index)

D. Between the wars

THE HISTORY OF CODES AND CIPHERS IN THE UNITED STATES: DURING THE PERIOD BETWEEN THE WORLD WARS edited by Wayne G. Barker (Laguna Hills, CA: Aegean Park Press “Cryptographic Series”) as follows:

PART 1: 1919–1929 (1979—$24.80, paper, ISBN 0–89412–039–5, 186 pp., notes, index)

PART 2: 1930–1939 (1978—$24.80, paper, ISBN 0–89412–165–0, 99 pp., photos, notes, index)

INFORMATION AND SECRECY: VANNEVAR BUSH, ULTRA AND THE OTHER MEMEX by Colin Burke (Lanham, MD: Scarecrow Press, 1994—price not given, ISBN 0–8108–2783–2, 467 pp., photos, notes, index)

MACHINE CRYPTOGRAPHY AND MODERN CRYPTANALYSIS by Cipher A. Deavours and Louis Kruh (Norwood, MA: Artech “Artech House Telecommunications Library,”; 1985, ISBN 0–89006–161–0, 259 pp., illustrations, notes, index)

THE STORY OF MAGIC: MEMOIRS OF AN AMERICAN CRYPTOLOGIC PIONEER by Frank B. Rowlett (Laguna Hills, CA: Aegean Park Press, 1998— $32.80, ISBN 0–89412–273–8, 258 pp., photos)

THE AMERICAN BLACK CHAMBER by Herbert O. Yardley (Indianapolis: Bobbs Merrill, 1931, 375 pp.; London: Faber &; Faber, 265 pp.; reprinted by Ballantine Books “Ballantine Espionage/Intelligence Library,”; 1981, ISBN 0–3452–9867–5, 250 pp., photos)

E. World War II‐general

A HISTORY OF U.S. COMMUNICATIONS INTELLIGENCE DURING WORLD WAR II: POLICY AND ADMINISTRATION by Robert Louis Benson (Fort George B. Meade, MD: National Security Agency, Center for Cryptologic History “United States Cryptologic History, Series 4, World War II, Vol. 8,”; 1997, OCLC 40526841, 185 pp., photos, glossary, sources)

HITLER'S JAPANESE CONFIDANT: GENERAL OSHIMA HIROSHI AND MAGIC INTELLIGENCE, 1941–1945 by Carl Boyd (Lawrence: University Press of Kansas, 1993, ISBN 0–7006–0569‐X, 271 pp., photos, tables, maps, notes, bibliography, index)

U.S. ARMY SIGNALS INTELLIGENCE IN WORLD WAR II: A DOCUMENTARY HISTORY edited by James L. Gilbert and John P. Finnegan (Washington, DC: U.S. Government Printing Office [Center of Military History, United States Army] “CMH Pub 70–43,”; 1993—$24.00, ISBN 0–16–037816–8, 237 pp., photos, appendices)

THE ULTRA‐MAGIC DEALS AND THE MOST SECRET RELATIONSHIP, 1940–1946 by Bradley F. Smith (Novato, CA: Presido, 1992—$12.95, paper, ISBN 0–891414–6, 276 pp., notes, bibliography, index)

F. World War II‐Europe

CODEBREAKING AND SIGNALS INTELLIGENCE edited by Christopher Andrew (London: Frank Cass, 1986, ISBN 0–7146–3299–6, 137 pp., notes, bibliographies)

ULTRA IN THE WEST: THE NORMANDY CAMPAIGN OF 1944–45 by Ralph Bennett (New York: Scribners, 1979, ISBN 0–684–16704–2, 336 pp., maps, figures, glossary, bibliography, notes, index).

ULTRA AND MEDITERRANEAN STRATEGY by Ralph Bennett (New York: William Morrow, 1989, ISBN 0–688–08175–4, 496 pp., maps, diagrams, notes, glossary, bibliography, index)

INTELLIGENCE INVESTIGATIONS: COLLECTED PAPERS OF RALPH BENNETT by Ralph Bennett (London: Frank Cass “Studies in Intelligence,”; 1996—price not given, ISBN 0–7146–4742‐X hard, 0–7146–4300–0 paper, 216 pp., notes, index)

TOP SECRET ULTRA by Peter Calvocoressi (New York: Pantheon, 1980, ISBN 0–394–51154–9, 132 pp., photos, appendices, index)

THE ENEMY IS LISTENING by Aileen Clayton (London: Hutchinson, 1980, ISBN 0–091–4234–6, 381 pp.; reprinted by Ballantine Books “Ballantine Espionage/Intelligence Library,”; 1982; photos, glossary, notes, bibliography, index)

THE ENGIMA WAR by Jóseph Garliński (New York: Scribner's, 1980—ISBN 0–684–15866–3, 219 pp., photos, maps, diagrams, notes, appendix, bibliography, index)

ENGIMA by Robert Harris (New York: Random House, 1995, ISBN 0–679–42887–9, 320 pp.)

CODEBREAKERS: THE INSIDE STORY OF BLETCHLEY PARK edited by F. H. Hinsley and Alan Stripp (New York: Oxford University Press, 1993—price not given, ISBN 0–19–820327–6, 321 pp., photos, diagrams, notes, appendices, index)

SEIZING THE ENIGMA: THE RACE TO BREAK THE GERMAN U‐BOAT CODES, 1939–1943 by David Kahn (Boston: Houghton Mifflin, 1991, ISBN 0–395–42739–8, 336 pp., photos, notes, bibliography, index)

ENIGMA: HOW THE GERMAN MACHINE CIPHER WAS BROKEN, AND HOW IT WAS READ BY THE ALLIES IN WORLD WAR TWO by Wladyslaw Kozaczuk, translated by Christopher Kasparek (London: Arms and Armour Press/Lanham, MD: University Publications of America “Foreign Intelligence Book Series,”; 1984, ISBN 0–89093–547–5, 348 pp., photos, diagrams, appendices, bibliography, index)

ULTRA GOES TO WAR: THE FIRST ACCOUNT OF WORLD WAR II'S GREATEST SECRET BASED ON OFFICIAL DOCUMENTS by Ronald Lewin (New York: McGraw‐Hill, 1978, ISBN 0–07–037453–8, 398 pp., notes, glossary, appendix, bibliography, index)

THE ULTRA AMERICANS: THE U.S. ROLE IN BREAKING THE NAZI CODES by Thomas Parrish (New York: Stein &; Day, 1986, ISBN 0–8128–3072–5, 338 pp., photos, notes, sources, index)

THE ENIGMA SYMPOSIUM edited by Hugh Skillen (published by the author, 56 St. Thomas Drive, Pinner, England HA5 4SS; as follows, photos, maps, diagrams, notes):

1992 (1992, reprinted 1997, paper, ISBN 0–9515190–34, 60 pp.)

1994 (1994, £8.50, paper, ISBN 0–9515190–50, about 100 pp.)

1995 (1995, £9.95, paper, ISBN 0–9515190–77, 164 pp.)

1997 (1997, £9.95, paper, ISBN 0–9515190–85, 194 pp.)

1998 (1998, £14.95, paper, ISBN 0–9515–330–01, 205 pp.)

THE SPIES OF THE AIRWAVES by Hugh Skillen (published by the author; address immediately above, 1989—£23.00, ISBN 0–9515190‐X, 550 pp., photos, maps, index)

STATION X: THE CODEBREAKERS OF BLETCHLEY PARK by Michael Smith (London: Channel 4 Books, 1998—£14.99, ISBN 0–7522–2189–2, 184 pp., photos, sources, index)

THE HUT SIX STORY: BREAKING THE ENIGMA CODES by Gordon Welchman (New York: McGraw‐Hill, 1982, ISBN 0–07–069180–0, 326 pp., diagrams, notes, bibliography, index)

THE ULTRA SECRET by F. W. Winterbotham (London: Weidenfeld &; Nicolson, 1974, ISBN 0–297–76832–8, 199 pp., index; numerous reprints)

ULTRA AT SEA: HOW BREAKING THE NAZI CODE AFFECTED ALLIED NAVAL STRATEGY DURING WORLD WAR II by John Winton (London: Leo Cooper; New York: Morrow, 1988, ISBN 0–688–08546–6, 207 pp., photos, glossary, index)

G. World War II‐pacific

MACARTHUR'S ULTRA: CODEBREAKING AND THE WAR AGAINST JAPAN, 1942–1945 by Edward J. Drea (Lawrence: University Press of Kansas “Modern War Studies,”; 1992, ISBN 0–7006–0504–5, 296 pp., photos, maps, tables, notes, bibliography, index)

THE BROKEN SEAL: “OPERATION MAGIC”; AND THE SECRET ROAD TO PEARL HARBOR by Ladislas Farago (New York: Random House, 1967, 439 pp., reference notes, index)

THE AMERICAN MAGIC: CODES, CIPHERS AND THE DEFEAT OF JAPAN by Ronald Lewin (New York: Farrar, Straus &; Giroux, 1982, ISBN 0–374–10417–4, 332 pp., photos, appendices, notes, sources, index)

A PRICELESS ADVANTAGE: U.S. NAVY COMMUNICATIONS INTELLIGENCE AND THE BATTLES OF CORAL SEA, MIDWAY, AND THE ALEUTIANS by Frederick D. Parker (Fort George G. Meade, MD: National Security Agency, Center for Cryptologic History, “United States Cryptologic History, Series IV, World War II, Volume 5,”; CH‐E32–93–01, 1993, 88 pp., photos, bibliography, notes)

PEARL HARBOR REVISITED: UNITED STATES NAVY COMMUNICATIONS INTELLIGENCE, 1924–1941 by Frederick D. Parker (Fort George G. Meade, MD: National Security Agency, Center for Cryptologie History, “United States Cryptologic History, Series IV, World War II, Volume 5,”; CH‐E32–94–01, 1994, photos, notes, appendices, bibliography)

COMBINED FLEET DECODED: THE SECRET HISTORY OF AMERICAN INTELLIGENCE AND THE JAPANESE NAVY IN WORLD WAR II by John Prados (New York: Random House, 1995—$37.50, ISBN 0–679–43701–0, 832 pp., photos, maps, notes, bibliography, index)

LISTENING TO THE ENEMY: KEY DOCUMENTS ON THE ROLE OF COMMUNICATIONS INTELLIGENCE IN THE WAR WITH JAPAN edited by Ronald H. Spector (Wilmington, DE: Scholarly Resources, 1988, ISBN 0–8420–2275–9, 285 pp., notes, tables)

CODEBREAKER IN THE FAR EAST by Alan Stripp (London: Frank Cass “Studies in Intelligence,”; 1989, ISBN 0–7146–3363–1, 204 pp., illustrations, notes, bibliography, index)

THE “MAGIC”; BACKGROUND OF PEARL HARBOR by the U.S. Department of Defense (Washington, DC: U.S. Government Printing Office, 1978—5 vols published in 8, OCLC 5170297)

DEADLY MAGIC: A PERSONAL ACCOUNT OF COMMUNICATIONS INTELLIGENCE IN WORLD WAR II IN THE PACIFIC by Edward Van Der Rhoer (New York: Scribner's, 1979, ISBN 0–684–15873–6, 225 pp., photos, index)

ULTRA IN THE PACIFIC: HOW BREAKING JAPANESE CODES &; CYPHERS AFFECTED NAVAL OPERATIONS AGAINST JAPAN by John Winton (Annapolis: Naval Institute Press, 1993, ISBN 1–55750–856–9, 247 pp., maps, sources, index)

H. Postwar developments

THE PUZZLE PALACE: A REPORT ON AMERICA'S MOST SECRET AGENCY by James V. Bamford (Boston: Houghton Mifflin, 1982, ISBN 0–395–31286–8, 465 pp.; reprinted by Penguin Books with a new 50‐page afterword, 1983, 655 pp., appendix, notes, acronyms, index)

VENONA: SOVIET ESPIONAGE AND THE AMERICAN RESPONSE, 1939–1957 edited by Robert Louis Benson and Michael Warner (Washington, DC: National Security Agency and Central Intelligence Agency [National Technical Information Service], 1996—$50.00, paper, OCLC 35768954, 450 pp., acronyms, chronology, notes; reprinted by Aegean Park Press, 1997, 503 pp. adding an index and several brief NSA monographs on the subject)

VENONA: DECODING SOVIET ESPIONAGE IN AMERICA by John Earl Haynes and Harvey Klehr (New Haven: Yale University Press, 1999— $30.00, ISBN 0–300–07771–8, 487 pp., photos, appendices, notes, index)  相似文献   
968.
969.
In an integrated media environment where news networks seek synergistic opportunities for their parent companies, news content is increasingly susceptible to promotional influence. A comparative content analysis of new and traditional news spaces on U.S. cable television news networks Cable News Network, MSNBC, and Fox News Channel examined the video screen space and the news crawl, or “ticker,” space. Findings reveal that, proportionally, more promotional content occurs within the traditional video content space when compared to the ticker space. However, it was also shown that the ticker acts as a general branding agent for 2 of the 3 networks. Content dispersion also suggests a unique “content identity” for each news brand. The study found no evidence of “covert” promotion for synergistic gain—a positive result for news consumers.  相似文献   
970.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号