首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   678篇
  免费   68篇
  国内免费   34篇
  2024年   1篇
  2023年   1篇
  2021年   14篇
  2020年   7篇
  2019年   29篇
  2018年   29篇
  2017年   34篇
  2016年   38篇
  2015年   25篇
  2014年   56篇
  2013年   104篇
  2012年   18篇
  2011年   38篇
  2010年   39篇
  2009年   44篇
  2008年   44篇
  2007年   35篇
  2006年   38篇
  2005年   32篇
  2004年   39篇
  2003年   29篇
  2002年   10篇
  2001年   16篇
  2000年   8篇
  1999年   7篇
  1998年   6篇
  1997年   4篇
  1996年   4篇
  1995年   7篇
  1994年   5篇
  1993年   4篇
  1992年   6篇
  1991年   4篇
  1990年   2篇
  1989年   3篇
排序方式: 共有780条查询结果,搜索用时 15 毫秒
771.
Given the advances made in conventional weapon capabilities, precision should by now be the accepted and expected norm in cyberspace as well. In this article I argue that developing precision cyber weapon systems, to be used during a lawful conflict, can be an important part of a responsible national security strategy to reduce the amount of violence and physical destruction in conflicts. I first describe a precision cyber weapon system in a military context. I then present three compelling rationales for the development of precision cyber weapon systems based on ethical, operational, and financial considerations. To support the position, I address several arguments that have been levied against their development. Thereafter I present several recommendations for a way ahead.  相似文献   
772.
EU High Representative Federica Mogherini presented her EU Global Strategy (EUGS) in June 2016. Encircled by security crises, it is difficult to think of something more important for Europe than collective action with the aim of weathering the storm. The EUGS, in this respect, seeks to define common ends and identify means. So what do we make of the EUGS? What does the EUGS tell us about the current role of the EU in global affairs? And how will the withdrawal of the UK from the EU affect foreign and security policy? As a way of introduction to the forum, this article notes that the EUGS focuses on the neighbourhood, puts the interests of European citizens first, identifies civilian means, and has created momentum on security policy. The key question, however, remains whether there is any interest in the EUGS beyond the foreign policy elites.  相似文献   
773.
ABSTRACT

The rising trend of kidnapping targeting women has shown that counterinsurgency does not begin and end with the strategic advantage of state security providers in the security market and the field. Kidnapping of females by Boko Haram insurgents threatens human security and hinders sustainable development goals in Northeastern Nigeria. With primary and secondary sources, this qualitative study examines how Boko Haram insurgents target women in Northeastern Nigeria. The paper argues that community driven security strategy achievable through the collaboration between state and traditional security providers, can prevent the entry and easy escape of the insurgents. It concludes that the forces of order should sustain a policy of stop and searches until insurgents are defeated along with a programme of community-based human rights education and insurgency emergency response system for quick response to security threats.  相似文献   
774.
鉴于美军的太空作战走在世界前列,从顶层设计、信息网络、态势感知、作战应用等方面分析了美军太空安全体系的建设现状,重点指出了其在太空安全应急响应方面的发展趋势和启示,对我国太空安全研究具有参考作用。  相似文献   
775.
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.  相似文献   
776.
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy.  相似文献   
777.
软件需求工程及其发展   总被引:5,自引:0,他引:5  
详细介绍了需求工程的基本概念及其内容,根据目前的实际情况,简要总结了需求工程的常用方法和支持工具,并指出需求工程的发展现状和存在的主要问题。收集国内外的相关资料,进行综合分析,以便了解国内外的研究现状,并进行适当的相关研究。认为:软件需求的获取是软件需求工程的重要一步,是软件质量保证的基础:研究具有可操作性和实用性的软件需求工程辅助工具具有重要意义。  相似文献   
778.
专业综合演练对专业教学来讲是一个全新的课题,需要进行多方面的探索和实践。从研究警卫专业综合演练的原则入手,提出了组织实施综合演练应当遵循的几个原则。目的在于恰当地把握和评估演练,使演练更好地为提高学员执勤和处突能力服务。  相似文献   
779.
《孙子兵法》中所蕴含的军队管理理念对部队的安全防事故工作有着高度的借鉴意义。从各级指挥员是部队安全防事故工作的主导,有效预防各类事故案件指挥员应具备综合的管理素质,明确部队安全防事故工作是全体官兵的共同责任三个方面,对《孙子兵法》在部队安全防事故中应用的合理性进行了分析。  相似文献   
780.
网络安全与防火墙技术   总被引:1,自引:0,他引:1  
介绍了防火墙技术的概念、几种防大墙实现技术的原理、防火墙的配置及安全措施.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号