首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   3篇
  255篇
  2021年   3篇
  2019年   3篇
  2017年   4篇
  2016年   3篇
  2015年   4篇
  2014年   2篇
  2013年   62篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   2篇
  2005年   4篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   5篇
  1994年   6篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   5篇
  1988年   6篇
  1987年   5篇
  1986年   7篇
  1985年   6篇
  1984年   2篇
  1983年   3篇
  1982年   9篇
  1980年   5篇
  1979年   3篇
  1978年   3篇
  1977年   4篇
  1976年   2篇
  1975年   5篇
  1974年   6篇
  1973年   6篇
  1972年   5篇
  1971年   8篇
  1970年   3篇
  1969年   5篇
  1968年   5篇
  1967年   2篇
  1966年   3篇
  1948年   3篇
排序方式: 共有255条查询结果,搜索用时 0 毫秒
101.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   
102.
As an institution of state, the military in Lesotho was marred by controversy and steeped in intrigue from the start. For much of the post-colonial period the military was used as a politicised and partisan tool, which even seized power and governed in its own name. The current problem, as this brief history aims to demonstrate, is essentially two-pronged. It involves putting in place structures, mechanisms and philosophies designed to promote the military's acceptance of civil supremacy. The process should also include alterations to political society's perception of the military as a tool to be used in partisan games that almost always have calamitous outcomes. Lesotho's political development is classified in this article into four broad phases and the type of civil-military relations is assessed under each phase. The reasons for the military coup in 1986 are analysed, the emergence of a democratic order and the challenges facing this order are highlighted, and the reform measures that have thus far been instituted are evaluated. The essay concludes with a few projections into the future course of events.  相似文献   
103.
104.
105.
The events of the 1973 Arab‐Israeli War serve as an early indicator of Iraqi leader Saddam Hussein's willingness to use military power to address foreign policy concerns. In that war, Iraq intervened on the Syrian front with an armored division, other supporting units, and over 100 aircraft. This intervention, which occurred despite severe political and military difficulties, was larger than any previous Iraqi contribution to the anti‐Israeli struggle. Baghdad later asserted that Iraqi forces had saved Damascus from possible Israeli occupation, and these claims have been widely repeated by a variety of authors of different nationalities with various degrees of agreement or skepticism. Nevertheless, Iraqi claims to have saved Damascus from Israeli capture are false since the Israelis did not view the seizure of the city as important to their strategy for victory. Rather, the Iraqi presence on the Golan Heights was useful to the Arab war effort as one of many factors helping to delay the Israeli advance and prevent some important Syrian targets from being placed within artillery range of the Israeli force. Iraqi military shortcomings were well highlighted in this conflict, and many were repeated in the early stages of the war with Iran.  相似文献   
106.
The defence of India in general and the North West Frontier in particular was central to strategic debate within the late Victorian army, creating one of the fault lines between rival factions competing for key commands and appointments. After a discussion of the varying strategic options debated within the British and Indian armies, the article examines the impact of Indian defence upon the ‘politics of command’ with particular reference to the appointment of Commanders-in-Chief in India between 1876 and 1892.  相似文献   
107.
In a recent paper in this journal, Wijewerra and Webb study the connection between military spending and gross domestic product (GDP) in a group of five South Asian countries, finding a small but statistically significant positive relationship between military spending and GDP. This paper reviews their approach and proposes an alternative which tries to deal with the problems of omitted variables and variable construction. It finds, in contrast, that a higher share of military spending in GDP is associated with lower growth of GDP per capita.  相似文献   
108.
Technologically advanced aircraft rely on robust and responsive logistics systems to ensure a high state of operational readiness. This paper fills a critical gap in the literature for combat models by closely relating effectiveness of the logistics system to determinants of success in combat. We present a stochastic diffusion model of an aerial battle between Blue and Red forces. The number of aircraft of Blue forces aloft and ready to be aloft on combat missions is limited by the maximum number of assigned aircraft, the reliability of aircraft subsystems, and the logistic system's ability to repair and replenish those subsystems. Our parsimonious model can illustrate important trade‐offs between logistics decision variables and operational success.  相似文献   
109.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号