全文获取类型
收费全文 | 506篇 |
免费 | 52篇 |
国内免费 | 12篇 |
出版年
2023年 | 3篇 |
2021年 | 13篇 |
2020年 | 8篇 |
2019年 | 30篇 |
2018年 | 29篇 |
2017年 | 34篇 |
2016年 | 35篇 |
2015年 | 17篇 |
2014年 | 51篇 |
2013年 | 98篇 |
2012年 | 12篇 |
2011年 | 26篇 |
2010年 | 35篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 22篇 |
2006年 | 20篇 |
2005年 | 22篇 |
2004年 | 16篇 |
2003年 | 15篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有570条查询结果,搜索用时 15 毫秒
91.
Galen Roger Perras 《战略研究杂志》2013,36(3):505-528
In 1924, HMCS Thiepval provided logistical support to a British attempt to circumnavigate the world by air. But the ship had another secret mission. Concerned America and Japan were fortifying their north Pacific possessions in violation of the 1922 Washington Treaty, and fearing war might be inevitable, the Canadian navy sent the Thiepval to covertly spy upon American and Japanese facilities. No cheating was discovered, but in the longer run, Canadian concerns about hostilities in the north Pacific were ‘on the mark’ correct. 相似文献
92.
Peter Dahl Thruelsen 《Small Wars & Insurgencies》2013,24(4):619-643
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR. 相似文献
93.
Matthew Stein 《Small Wars & Insurgencies》2013,24(3):394-412
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence. 相似文献
94.
Colin Robinson 《Small Wars & Insurgencies》2013,24(3):474-499
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward. 相似文献
95.
黄红梅 《武警工程学院学报》2013,(6):28-31
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。 相似文献
96.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。 相似文献
97.
刘玉藏 《中国人民武装警察部队学院学报》2001,17(4):75-76
通过简要介绍消防网络的构成及功能,进行网络安全及需求分析,并结合消防办公信息网的实际恃况,提出制定安全对策的几种建议. 相似文献
98.
区域的土地利用与生态安全及可持续发展的分析 总被引:4,自引:0,他引:4
分析了区域土地利用与区域经济发展的相互作用关系,以及土地利用方式转变所产生的生态安全问题,分析表明:随着经济的发展,土地利用的结构、效率、集约程度也将发生深刻的变化,单位土地的占用必将带来的GDP的快速增长,然而土地利用/覆盖变化对气候、水文、生物多样性等产生重要的影响。借鉴深圳市20多年来土地利用变化以及土地利用方式转变所产生的生态安全问题,提出了在保障区域生态安全的前提下,实现经济可持续发展和土地可持续利用的战略措施体系。 相似文献
99.
在分析基于格理论的信息流控制军用安全模型在实际应用中存在的不足的基础上,从安全类定义和信息流控制策略两个方面对原模型进行了理论扩展和安全性分析.扩展模型安全类在作为对象和主体时具有相同的表达方式,以及在保持原模型信息流关系情况下,允许同职权等级用户交流他们共知的信息,以及高职权等级用户访问低职权等级用户他们之间共知的信息.以数字文档安全管理系统为例对扩展模型应用进行了描述.实例表明扩展模型更适合实际系统对信息流控制的要求. 相似文献
100.
吕海峰 《中国人民武装警察部队学院学报》2010,26(7):79-80
深入研究、切实抓好预算执行审计工作对于保证预算的落实、达到收支平衡,具有十分重要的现实意义。预算执行审计应围绕“三个监督”开展工作,并处理好“三方面关系”。 相似文献