全文获取类型
收费全文 | 208篇 |
免费 | 2篇 |
出版年
2019年 | 1篇 |
2018年 | 7篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 82篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2006年 | 1篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 6篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有210条查询结果,搜索用时 156 毫秒
161.
John Stone 《战略研究杂志》2013,36(1):101-108
The question of whether or not cyber war amounts to war per se is difficult to determine given strategic theory's uncertain grasp of the concepts of force, violence and lethality. These three concepts, along with their relationships with one another, are explored in order to demonstrate that cyber attacks can in fact be construed as acts of war. 相似文献
162.
163.
John McCulloch 《Whitehall Papers》2013,80(1):53-57
Abstract The author provides an introduction to the Package Management System, which is transforming the relationship between MOD and the research establishments of the Defence Research Agency. 相似文献
164.
Domestic factors play an important role in the formulation and evolution of a country's foreign and security policy. This is clearly seen in the case study of a Soviet successor state, Ukraine. The article brings together in seven sections theory with the key domestic factors that influence Ukrainian security policy, such as economics, energy, national identity, elites and political parties. The article provides an insight into how these domestic factors influence the course of Ukrainian security policy which is striking a balance between the twin extremes of Soviet re‐integration, which would be tantamount to the loss of independence, and nationalist maximalism which seeks to place as much distance as possible between Ukraine and Russia. 相似文献
165.
166.
R.T. Stearn Editor John T. Fishel Paul Y. Hammond Thomas R. Mockaitis 《Small Wars & Insurgencies》2013,24(3):426-434
Ian Castle and Ian Knight, Fearful Hard Times: The Siege and Relief of Eshowe, 1879. Greenhill Books, London 1994, Pp.256, 85 illus, 6 maps, index. £17.95. ISBN 1–85367–180–0. Michael E. Brown (ed.), Ethnic Conflict and International Security. Princeton: Princeton University Press, 1993, Pp.263, selected biblio, index. $45/£30 (cloth); $14.95/£12.95 (paper). ISBN 0–691–03368 and 00068–9. Deborah Poole and Gerardo Renique, Peru: Time of Fear. London: Latin American Bureau (Research and Action) Ltd., 1992. Pp.212, 7 maps, photographs, glossary, sources/further reading, index. £17.99 ISBN 0–906156–70‐X and ‐71–8. David A. Charters (ed.), Peacekeeping and the Challenge of Civil Conflict Resolution. Center for Conflict Studies, University of New Brunswick, 1994. Pp.viii+220. NP. Joachim Remak, A Very Civil War: The Swiss Sonderbund War of 1847. Boulder, Colorado: Westview Press, 1993. Pp.xvi+221, 6 map's, 68 illus, biblio, index. $24.95/£16.95. 相似文献
167.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
168.
169.
170.
John Stone 《Small Wars & Insurgencies》2014,25(3):669-684
The use of conventional armed forces in a deterrent role merits close consideration. Instability in weak or failing states can have global ramifications, while efforts to build stability take time. In principle, conventional deterrence can be used to buy the time required for such stabilization efforts. Attempts at deterrence will, however, need to overcome credibility problems stemming from the technical limitations associated with conventional armed forces, and with the likely requirement for multiple external actors to deter multiple intrastate audiences. While deterrence might work under certain circumstances, it will not play as central a role in strategy as it did during the Cold War. 相似文献