全文获取类型
收费全文 | 69篇 |
免费 | 0篇 |
出版年
2020年 | 1篇 |
2019年 | 4篇 |
2018年 | 3篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2014年 | 1篇 |
2013年 | 23篇 |
2012年 | 2篇 |
2011年 | 2篇 |
2010年 | 1篇 |
2009年 | 2篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2005年 | 1篇 |
2004年 | 3篇 |
2002年 | 1篇 |
2001年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
排序方式: 共有69条查询结果,搜索用时 15 毫秒
21.
Brendan Simms Bruce Hoffman Daniel W. Fitz‐Simons Robert H. Dorff Jennifer Morrison Taw Gabriel Marcella 《Small Wars & Insurgencies》2013,24(1):127-139
Frank Zimmer, Bismarcks Kampf gegen Kaiser Franz Joseph Konigsgratz und seine Folgen. Graz, Vienna, Cologne: Styria Verlag 1996. Pp.203,49 illus., 1 map. OS 350/DM 49. ISBN 3–222–12377–2. Saul Zadka, Blood in Zion: How the Jewish Guerrillas drove the British out of Palestine. London and Washington: Brassey's, 1995. Pp.227, chron., illus., index. £19.95. ISBN 1–85753–136–1. Theodore L. Gatchel, At the Water's Edge: Defending against the Modern Amphibious Assault. Annapolis, MD: Naval Institute Press, 1996. Pp.xvi+217, notes, biblio, index. $36.95. ISBN 1–55750–308–7. Max G. Manwaring and William J. Olson (eds.) Managing Contemporary Conflict: Pillars of Success. Boulder, CO: Westview Press, 1996. Pp.269, no index. $65 (cloth); $25 (paper). ISBN 0–8133–8969 and 9978–5 Chris Seiple, The US Military/NGO Relationship in Humanitarian Interventions, Carlisle Barracks, PA: The Richard L. Millett and Michael Gold‐Biss (eds.) Beyond Praetorianism: The Latin American Military in Transition. University of Miami: North/South Center Press; Boulder, CO: Lynne Rienner, 1996. Pp.xv +317, index. $24.95. ISBN 1–5745–000–9. Rudolph C. Barnes Jr, Military Legitimacy: Might and Right in the New Millennium. London and Portland, OR: Frank Cass, 1996. Pp.199, select biblio., index. £27.50/$39.50, ISBN 0–714–4624–5. 相似文献
22.
Daniel Byman 《战略研究杂志》2013,36(2):165-200
Abstract Why do some small terrorist and guerrilla groups succeed in becoming full-blown insurgencies while many others fail? Proto-insurgencies face many difficulties in creating an insurgent movement: they must create a politically salient identity, harness a compelling cause, create an effective sanctuary, and defeat both violent and peaceful organizational rivals, all while evading the police and security services of the much more powerful state. Outside support is a mixed blessing for proto-insurgents. Often, the ultimate success of the proto-insurgency in becoming a full-blown insurgency depends on the mistakes of the government it opposes. 相似文献
23.
24.
Daniel R. Green 《Small Wars & Insurgencies》2013,24(4):591-609
The successful pacification of Fallujah in 2007 during the Anbar Awakening movement was due to the coordinated efforts of US and Iraqi forces to physically and psychologically separate the people from the insurgency. Efforts along security, political, and development lines along with a robust tribal effort eliminated the armed insurgency and set the basis for victory in the area. But a synchronized delivery of these resources was insufficient to defeat the insurgency by itself absent the population's decision to turn against the insurgents. This process began to occur in 2006 and was successfully capitalized upon by Coalition Forces in Fallujah in 2007. 相似文献
25.
Gerald G. Brown Kelly J. Cormican Siriphong Lawphongpanich Daniel B. Widdis 《海军后勤学研究》1997,44(4):301-318
Submarine berthing plans reserve mooring locations for inbound U.S. Navy nuclear submarines prior to their port entrance. Once in port, submarines may be shifted to different berthing locations to allow them to better receive services they require or to make way for other shifted vessels. However, submarine berth shifting is expensive, labor intensive, and potentially hazardous. This article presents an optimization model for submarine berth planning and demonstrates it with Naval Submarine Base, San Diego. After a berthing plan has been approved and published, changed requests for services, delays, and early arrival of inbound submarines are routine events, requiring frequent revisions. To encourage trust in the planning process, the effect on the solution of revisions in the input is kept small by incorporating a persistence incentive in the optimization model. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 301–318, 1997. 相似文献
26.
Daniel Meier 《Small Wars & Insurgencies》2018,29(3):515-536
AbstractSince the end of the civil war in 1990, the Lebanese second Republic has experienced a dual security governance in the southern borderland region. Up to the Syrian military withdrawal in 2005, the territorial and functional ‘areas of limited statehood’ between the State and Hizbullah worked as a cooperation. After the Syrian withdrawal, various forms of cooperation appeared, raising the theoretical interest for the ‘mediated state’ framework. It is conceptualizing the cooperation between the state and the non-state actor as an interdependency – with case study ranging from the marking of the Blue Line to the struggle against the jihadists groups. 相似文献
27.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
28.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities. 相似文献
29.
30.