首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   0篇
  2019年   3篇
  2018年   2篇
  2017年   2篇
  2016年   1篇
  2015年   2篇
  2014年   4篇
  2013年   28篇
  2012年   3篇
  2011年   2篇
  2010年   1篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   2篇
  2003年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   2篇
  1989年   1篇
  1987年   1篇
  1983年   1篇
  1981年   1篇
排序方式: 共有69条查询结果,搜索用时 31 毫秒
51.
52.
53.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
54.
This article focuses on the relationship between the threat perception analyses of the British Admiralty and the strategic orientation of the Royal Navy at the outset of the twentieth century. The current view is that this was an era when fear of France and Russia drove British naval policy. However, as this article will show, Britain's Naval Intelligence Department formed a low opinion of French and Russian naval capabilities at this time and this negative evaluation exerted considerable influence over decision making. The belief that, owing to multiple qualitative deficiencies, these powers could definitely be beaten in battle lessened the standing of the Franco-Russian naval challenge and freed the Admiralty to consider the danger posed by other possible enemies, most notably Germany.  相似文献   
55.
In recent years, China has made stunning progress in its satellite reconnaissance capabilities. Starting from almost no capacity for live surveillance ten years ago, today the PLA has gained the capability to support real-time tactical naval operations from space. China's suite of electro-optical, synthetic aperture radar, and electronic intelligence satellites would be key to its anti-access/area denial capabilities, through which the PLA could deny the United States military the capability to operate with impunity close to its shores. Furthermore, these achievements suggest a shift towards more military-dedicated space assets and form the contours of a crucial support system for expanded PLA operations.  相似文献   
56.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   
57.
Long understood as the key document in Britain's Cold War history, the Duncan Sandys Defence White Paper of 1957 nevertheless has a largely forgotten context: home defence. This article argues that understanding this context allows important new conclusions to be drawn concerning the drafting, presentation and the reception of the document and the deterrent strategy it expounded. It argues that the Paper failed to establish a new doctrine for civil defence which reconciled the policy with the wider deterrent strategy. In doing this, the Paper presented a muddled policy to the public: one which failed to justify the reductions in civil defence provision but which stressed the destructive power of thermonuclear weapons. This had the effect of encouraging the critics of the government's nuclear strategy to flag up the absence of adequate civil defence measures and highlight the ‘admission’ that there was no defence against the hydrogen bomb.  相似文献   
58.
This paper demonstrates that US–Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed. Bilateral US intelligence liaison relations with nominally neutral Sweden were of particular importance in the early years of the Cold War given its geographic location adjacent to the northwestern portion of the USSR. Moreover, the importance of Sigint received from the three principal Scandinavian countries covered by this paper (Norway, Denmark, and Sweden) proved to be quite important to the US intelligence community during the early years of the Cold War, when the US Sigint infrastructure was relatively weak and stretched thin by commitments in Asia and elsewhere. This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations, demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by.  相似文献   
59.
This article looks at the emergence of nuclear planning assumptions within the South East Asia Treaty Organization (SEATO) during the mid-1950s. It does so by examining US strategic concepts for the defence of the treaty area, and the ways these produced major problems for the Australian Government as it switched the emphasis in its defence policy toward a permanent commitment of forces to the South East Asian mainland. At the same time, Britain was struggling to reconcile its membership of SEATO with the need to effect economies in defence spending that would not alarm their Australian Commonwealth partners. As dissatisfaction within SEATO grew, both the US and Britain moved toward a more overt acceptance of nuclear planning assumptions that would reassure their allies without producing a greater call on their resources.  相似文献   
60.
British attitudes towards military intervention following the campaigns in Iraq and Afghanistan have undergone what appears to be considerable change. Parliament has voted against the use of Britain's armed forces in Syria and the public are unenthused by overseas engagement. Conscious of the costs and the challenges posed by the use of British military power the government has been busy revamping the way it approaches crises overseas. The result is a set of policies that apparently heralds a new direction in foreign policy. This new direction is encapsulated in the Building Stability Overseas Strategy (BSOS) and the more recent International Defence Engagement Strategy (IDES). Both BSOS and IDES set out the basis for avoiding major deployments to overseas conflict and instead refocuses effort on defence diplomacy, working with and through overseas governments and partners, early warning, pre-conflict prevention and post-conflict reconstruction. Developing a number of themes that reach from across the Cold War to more contemporary discussions of British strategy, the goal of this special edition is to take into account a number of perspectives that place BSOS and IDES in their historical and strategic context. These papers suggest that using defence diplomacy is and will remain an extremely imprecise lever that needs to be carefully managed if it is to remain a democratically accountable tool of foreign policy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号