- Database Introduction
EndNote® enables you to move seamlessly through your research process with flexible tools for searching, organizing and sharing your research, creating your bibliography and writing your paper. You can sync your EndNote library across your desktop, online, and iPad so all your references, attachments, and groups can be accessed from anywhere.
Special Note: It is prohibited to abuse the “EndNote Find Full Text” function to download hundreds of papers in a short time.
Our OpenURL:https://sustc-primo.hosted.exlibrisgroup.com/primo-explore/openurl?institution=86SUSTC&vid=86SUSTC&
Enclosure
EndNote 20 (MAC) : http://downl
oad.endnote. com/site/336 341b63bfd11e ba284b463631 d39bd/EndNot e20SiteInsta ller.dmg Note: EndNote 20 was launched in Nov. 2020 and is compatible only with Window 10. Windows7 users need to download the following X9 version.
EndNote(Mac版9)——个人参考文献管理软件.dmg
EndNote(Windows版9)——个人参考文献管理软件.zip
Copyright Notice
1. Any downloading of the library-subscribed electronic resources by network downloading software tools is prohibited.
2. Any systematically over-downloading of full-text documents from library-subscribed databases is prohibited.
3. Any redistributing electronic literatures to informal users and any use of these electronic literatures for the purpose of making profits are prohibited.
4. Without the prior permission of the library, neither organization nor individual has the right to provide informal users to access the library-subscribed electronic resources via proxy server.
5. If there is any violation of the above rules, the library will make a detailed investigation. The violator will be punished.
- Responsible Librarian
- Yixi Zhang (+86-755-88010841, zhangyx@sustech.edu.cn)
- 版权公告
- 1. Any downloading of library-subscribed electronic resources by software or tool is prohibited.
2. Any systematically over-downloading of full-text documents from library-subscribed databases is prohibited.
3. Use of proxy server or providing VPN account to unauthorized users is prohibited.
4. Without the prior permission of the library, redistributing library-subscribed resources in bulk to unauthorized users or via proxy server is prohibited.
5. Violators of the above rules will be punished based on results of thorough investigation.
- Yidan865
- Lynn780
- Learning Nexus132
- *
- *
- *