首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   0篇
  2020年   1篇
  2019年   4篇
  2018年   3篇
  2017年   2篇
  2016年   1篇
  2014年   1篇
  2013年   23篇
  2012年   2篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
排序方式: 共有69条查询结果,搜索用时 15 毫秒
21.
Book reviews     
Frank Zimmer, Bismarcks Kampf gegen Kaiser Franz Joseph Konigsgratz und seine Folgen. Graz, Vienna, Cologne: Styria Verlag 1996. Pp.203,49 illus., 1 map. OS 350/DM 49. ISBN 3–222–12377–2.

Saul Zadka, Blood in Zion: How the Jewish Guerrillas drove the British out of Palestine. London and Washington: Brassey's, 1995. Pp.227, chron., illus., index. £19.95. ISBN 1–85753–136–1.

Theodore L. Gatchel, At the Water's Edge: Defending against the Modern Amphibious Assault. Annapolis, MD: Naval Institute Press, 1996. Pp.xvi+217, notes, biblio, index. $36.95. ISBN 1–55750–308–7.

Max G. Manwaring and William J. Olson (eds.) Managing Contemporary Conflict: Pillars of Success. Boulder, CO: Westview Press, 1996. Pp.269, no index. $65 (cloth); $25 (paper). ISBN 0–8133–8969 and 9978–5

Chris Seiple, The US Military/NGO Relationship in Humanitarian Interventions, Carlisle Barracks, PA: The

Richard L. Millett and Michael Gold‐Biss (eds.) Beyond Praetorianism: The Latin American Military in Transition. University of Miami: North/South Center Press; Boulder, CO: Lynne Rienner, 1996. Pp.xv +317, index. $24.95. ISBN 1–5745–000–9.

Rudolph C. Barnes Jr, Military Legitimacy: Might and Right in the New Millennium. London and Portland, OR: Frank Cass, 1996. Pp.199, select biblio., index. £27.50/$39.50, ISBN 0–714–4624–5.  相似文献   
22.
Abstract

Why do some small terrorist and guerrilla groups succeed in becoming full-blown insurgencies while many others fail? Proto-insurgencies face many difficulties in creating an insurgent movement: they must create a politically salient identity, harness a compelling cause, create an effective sanctuary, and defeat both violent and peaceful organizational rivals, all while evading the police and security services of the much more powerful state. Outside support is a mixed blessing for proto-insurgents. Often, the ultimate success of the proto-insurgency in becoming a full-blown insurgency depends on the mistakes of the government it opposes.  相似文献   
23.
24.
The successful pacification of Fallujah in 2007 during the Anbar Awakening movement was due to the coordinated efforts of US and Iraqi forces to physically and psychologically separate the people from the insurgency. Efforts along security, political, and development lines along with a robust tribal effort eliminated the armed insurgency and set the basis for victory in the area. But a synchronized delivery of these resources was insufficient to defeat the insurgency by itself absent the population's decision to turn against the insurgents. This process began to occur in 2006 and was successfully capitalized upon by Coalition Forces in Fallujah in 2007.  相似文献   
25.
Submarine berthing plans reserve mooring locations for inbound U.S. Navy nuclear submarines prior to their port entrance. Once in port, submarines may be shifted to different berthing locations to allow them to better receive services they require or to make way for other shifted vessels. However, submarine berth shifting is expensive, labor intensive, and potentially hazardous. This article presents an optimization model for submarine berth planning and demonstrates it with Naval Submarine Base, San Diego. After a berthing plan has been approved and published, changed requests for services, delays, and early arrival of inbound submarines are routine events, requiring frequent revisions. To encourage trust in the planning process, the effect on the solution of revisions in the input is kept small by incorporating a persistence incentive in the optimization model. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 301–318, 1997.  相似文献   
26.
Abstract

Since the end of the civil war in 1990, the Lebanese second Republic has experienced a dual security governance in the southern borderland region. Up to the Syrian military withdrawal in 2005, the territorial and functional ‘areas of limited statehood’ between the State and Hizbullah worked as a cooperation. After the Syrian withdrawal, various forms of cooperation appeared, raising the theoretical interest for the ‘mediated state’ framework. It is conceptualizing the cooperation between the state and the non-state actor as an interdependency – with case study ranging from the marking of the Blue Line to the struggle against the jihadists groups.  相似文献   
27.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
28.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities.  相似文献   
29.
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号