全文获取类型
收费全文 | 623篇 |
免费 | 95篇 |
国内免费 | 29篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 10篇 |
2020年 | 21篇 |
2019年 | 8篇 |
2018年 | 13篇 |
2017年 | 37篇 |
2016年 | 20篇 |
2015年 | 17篇 |
2014年 | 57篇 |
2013年 | 42篇 |
2012年 | 43篇 |
2011年 | 56篇 |
2010年 | 41篇 |
2009年 | 48篇 |
2008年 | 49篇 |
2007年 | 48篇 |
2006年 | 40篇 |
2005年 | 46篇 |
2004年 | 27篇 |
2003年 | 29篇 |
2002年 | 18篇 |
2001年 | 19篇 |
2000年 | 10篇 |
1999年 | 11篇 |
1998年 | 5篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 5篇 |
1989年 | 2篇 |
排序方式: 共有747条查询结果,搜索用时 906 毫秒
171.
Alan Chong 《战略研究杂志》2015,38(3):233-244
AbstractSmart power is comprised of two elements: the quest for building society among states and between states and non-state actors; as well as the desire for cleaner forms of power projection. This special issue explores how states continue to fumble over achieving the optimum mix of hard and soft power across several country cases and themed articles. This set of contributions suggests that smart power is not unlike a ‘Swiss Army Knife’ analogy: multifunctional and challenging to choose the right combination of ideational and material tools. 相似文献
172.
173.
174.
针对舰船装备维修保障领域维修保障知识缺乏有效统一管理、共享和重用程度低等问题,将领域本体理论引入维修保障知识管理中,提出了基于全寿命周期的舰船装备维修保障知识本体建模方法。分析舰船装备维修保障领域知识的来源、分类和构成,构建了装备维修保障领域的顶层本体及其概念关系。重点介绍了维修保障知识中故障案例知识的本体建模表示,并提出了基于预检索的全局故障案例知识检索算法,建立了原型系统并应用验证。结果表明:该方法能够解决目前维修保障知识管理中存在的问题,提高了知识检索效率。 相似文献
175.
176.
177.
178.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
179.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
180.
发展战区军事职业教育培养联合军官,是加强联合作战指挥人才建设、实现军事人才现代化、推进联合作战指挥体系建设的重要内容。文章针对当前面临的矛盾问题,围绕加快发展战区军事职业教育、下大力培育联合军官提出了顶层设计、优化内容体系、拓宽实践渠道、激发队伍活力。 相似文献