首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   447篇
  免费   16篇
  2021年   5篇
  2020年   5篇
  2019年   17篇
  2018年   14篇
  2017年   9篇
  2016年   12篇
  2015年   7篇
  2014年   11篇
  2013年   105篇
  2011年   10篇
  2010年   5篇
  2009年   7篇
  2008年   7篇
  2007年   8篇
  2006年   5篇
  2005年   8篇
  2004年   5篇
  2003年   5篇
  2002年   10篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1997年   8篇
  1996年   5篇
  1995年   5篇
  1994年   9篇
  1993年   10篇
  1992年   7篇
  1991年   7篇
  1990年   4篇
  1989年   7篇
  1988年   14篇
  1987年   7篇
  1986年   7篇
  1985年   11篇
  1984年   9篇
  1983年   5篇
  1980年   5篇
  1979年   6篇
  1978年   5篇
  1977年   6篇
  1976年   3篇
  1974年   7篇
  1973年   4篇
  1972年   5篇
  1971年   8篇
  1970年   6篇
  1969年   5篇
  1968年   3篇
  1967年   3篇
排序方式: 共有463条查询结果,搜索用时 31 毫秒
281.
Building indigenous armies in Asia with military advisory and aid programs has been a mission of the United States Army for over 100 years. Creation of an indigenous army was an early goal of American occupation policy in Korea, but little support and resources were assigned. Between 1946 and 1948, a minute American advisory effort partially trained and equipped a Korean Army cadre of 25,000 men. The unceasing efforts of a talented American advisor, Captain James Hausman, made success possible. He dominated the small advisory group, was given carte blanche to implement his ideas, and left indelible changes on what became the South Korean Army.  相似文献   
282.
Counter-insurgency scholars have long been familiar with Sir Robert Thompson’s classic work Defeating Communist Insurgency, which combined analysis of the insurgencies in Malaya and Vietnam with advice for counter-insurgents that emphasised the drawn-out nature of insurgency and the importance of focusing on population security. While historians have called attention to his role with the British Advisory Mission in South Vietnam and his later criticism of the US counter-insurgency campaign in Vietnam in his various books, less has been written about his subsequent role as a pacification advisor to the Nixon administration. This article explores Thompson’s relationship with Kissinger and Nixon and his views on the war in Vietnam from 1969 to 1974. An examination of Thompson’s thinking on Vietnam in the Nixon years reveals a theorist whose optimism on US prospects there was based on assumptions about elite and public patience for lengthy wars that were ultimately misplaced.  相似文献   
283.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   
284.
In 1941, the British instituted a comprehensive system of convoys in the Atlantic. One of the first convoys, OG 71, while sailing between Britain and Gibraltar, was shadowed by German aircraft and attacked by U‐boats. In the ensuing August battle, while no U‐boats were sunk, the British lost, out of a convoy consisting of 22 vessels, two escorts and eight merchant ships. The German victory was not complete owing to the inability of the German aircraft and U‐boats to cooperate successfully as well as the failure of the U‐boats to fight the battle effectively and aggressively. The British also made many mistakes during the defence of Convoy OG 71. The surface escorts made many errors of tactics; as for the British aircraft, owing to an inability to cooperate with the surface forces, they became almost totally ineffective. One bright spot for the British during the battle, however, was communications intelligence. The battle saw the first use of high frequency direction finders and on several occasions skillful use was made of information obtained from enemy radio transmissions. In fact important lessons were learned by the British from such use of communications intelligence which would pave the way for a more effective implementation of such information in future convoy battles.  相似文献   
285.
This article analyzes the main factors that contributed to the failure of the US intelligence community to alert against Soviet intentions and the intervention in the Egyptian–Israeli War of Attrition in 1969–70. Based on fresh archival sources, this research describes the US intelligence conception concerning the USSR; explains the crystallization of the intelligence estimate on the probability of Soviet intervention in 1970; deals with the intelligence data that were acquired but eventually ignored; and concludes with several plausible explanations for the intelligence blunder.  相似文献   
286.
Washington's so-called Maritime Strategy, which sought to apply US naval might against Soviet vulnerabilities on its maritime flanks, came to full fruition during the 1980s. The strategy, which witnessed a major buildup of US naval forces and aggressive exercising in seas proximate to the USSR, also explicitly targeted Moscow”s strategic missile submarines with the aim of pressuring the Kremlin during crises or the early phases of global war. Relying on a variety of interviews and newly declassified documents, the authors assert that the Maritime Strategy represents one of the rare instances in history when intelligence helped lead a nation to completely revise its concept of military operations.  相似文献   
287.
In 1999 India and Pakistan engaged in a limited war in the Himalayan peaks of Kashmir. Pakistani irregulars occupied territory in the Indian-held district of Kargil. A campaign that lasted 74 days and cost each side more than 1,000 casualties concluded with India in control of the commanding heights around Kargil. The conflict exposed flaws in the Indian armed forces as well as enduring truths of combat in the high mountains. Political constraints combined with the unforgiving environment and a determined enemy to diminish India's military advantage. Transition from counterinsurgency to high-intensity combat in the Himalayas proved to be a daunting task. Early failure was only overcome through innovation and adaptation to the environment. Specialised forces, unconventional techniques and the focused application of overwhelming firepower ultimately secured victory.  相似文献   
288.
289.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
290.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号