全文获取类型
收费全文 | 475篇 |
免费 | 10篇 |
出版年
2021年 | 6篇 |
2019年 | 17篇 |
2018年 | 10篇 |
2017年 | 16篇 |
2016年 | 12篇 |
2015年 | 10篇 |
2014年 | 3篇 |
2013年 | 90篇 |
2011年 | 6篇 |
2010年 | 8篇 |
2009年 | 5篇 |
2008年 | 3篇 |
2007年 | 7篇 |
2006年 | 9篇 |
2005年 | 12篇 |
2004年 | 11篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 4篇 |
2000年 | 10篇 |
1999年 | 6篇 |
1998年 | 7篇 |
1997年 | 9篇 |
1996年 | 3篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1986年 | 9篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1983年 | 9篇 |
1982年 | 6篇 |
1981年 | 9篇 |
1980年 | 12篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 10篇 |
1975年 | 8篇 |
1974年 | 13篇 |
1973年 | 10篇 |
1972年 | 9篇 |
1971年 | 16篇 |
1970年 | 3篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 3篇 |
1948年 | 2篇 |
排序方式: 共有485条查询结果,搜索用时 15 毫秒
71.
Mark A. Boyer 《Defence and Peace Economics》2013,24(3):243-259
The original Olson and Zeckhauser model of alliance burden‐sharing was based on the following four assumptions: (1) alliance defence is a pure public good; (2) allied nations make their security contribution decisions without consulting the other allies; (3) alliances produce only a single public good; and (4) alliance defence is produced with equal degrees of efficiency in all alliance nations. But while the first of these assumptions has received a great deal of attention in the alliance literature, the remaining ones have received comparatively less attention, particularly in terms of empirical analyses. This paper synthesizes a varied literature developed around these four assumptions, both substantively and theoretically, and shows that when these assumptions are brought closer to real world approximations, hypotheses regarding the potential for security cooperation with less free‐riding result. This article also provides a simple test of Western alliance burden‐sharing in the areas of military spending, development resources spending, and research and development spending that supports the hypothesis positing more equitable burden‐sharing. 相似文献
72.
A O Adesoji 《African Security Review》2013,22(3):2-3
Abstract From the 1982 Maitatsine Uprising to the 2009 Kala Kato Riot, Nigeria has been bedevilled by ethno-religious uprisings with devastating human and material losses. In almost all these crises the police and the military have featured prominently as agencies tasked with the responsibility of maintaining law and order and suppressing insurrection. While it was not alleged that they precipitated some of these risings perhaps in their attempts to stem or nip them in the bud, they have been accused of escalating the conflict either by their slow and inadequate responses, their partisanship and their arbitrary responses, or by their slackness in managing the crises and their aftermath. However, but for their efforts the security basis of the Nigerian state would have been considerably compromised by religious fundamentalism given the level of preparedness of the groups involved, their resistance and, more importantly, the recurrent nature of the uprisings. This article reflects on the management of ethno-religious uprisings in Nigeria by the police and the military. It considers the nature of the security agencies' involvement in the crises and examines the factors both within the agencies and in the larger Nigerian society which have aided or hindered their effective management of the conflicts. 相似文献
73.
74.
75.
76.
Kevin D. McCranie Marcus Faulkner David French Gregory A. Daddis James Gow Austin Long 《战略研究杂志》2013,36(2):281-293
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X. Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3. Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1. Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X. Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4. Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115. T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8. 相似文献
77.
Edward C. O’Dowd 《战略研究杂志》2013,36(6-7):1027-1049
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort. 相似文献
78.
79.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
80.
Stuart A. Cohen 《战略研究杂志》2013,36(4):78-93
The British provided unprecedented shelter, training and supplies that made possible the revival of a new and better Belgian Army after the crushing German victories in 1940. Starting in Wales in 1940 as a small and disunited group, the Belgians improved more than any of the Allied exile ground forces. By 1944, their independent brigade fought well in Normandy and Belgium, restoring national pride and proving the worth of British help. The parallel and interdependent processes between the British and their Continental guests allows this analysis of the Anglo‐Belgian experience to be useful in considering British Army interactions with the other exiles as well. 相似文献