首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   228篇
  免费   1篇
  229篇
  2021年   2篇
  2020年   8篇
  2019年   23篇
  2018年   8篇
  2017年   13篇
  2016年   10篇
  2015年   8篇
  2014年   13篇
  2013年   114篇
  2012年   8篇
  2011年   4篇
  2010年   8篇
  2005年   5篇
  2003年   2篇
  2001年   2篇
  1998年   1篇
排序方式: 共有229条查询结果,搜索用时 0 毫秒
1.
《孙子兵法》中蕴含着丰富而深刻的战机思想。不战全胜的“胜机”思想、立足不败的“待机”思想、变中求胜的“创机”思想、兵贵神速的“夺机”思想和因情用势的“握机”思想等内容,是《孙子兵法》战机思想的核心与精华。  相似文献   
2.
在现代条件下,从孙子“全胜”思想来看执勤体系能力建设,需要持续完善信息系统,优化平台建设和落实制度建设,切实提高执勤体系的“有效防范”和“高效处置”能力,继而确保执勤目标的绝对安全。  相似文献   
3.
抗日战争时期爱国主义的主要特点是:爱国力量的空前广泛性;爱国理念的鲜明时代性;爱国内容的明显进步性;爱国斗争的极大彻底性。上述特点给予我们的启示是:爱国主义是振兴中华民族的根本动力,中华儿女要永远高举爱国主义伟大旗帜;爱国主义具有鲜明的时代内容,弘扬爱国主义必须与时俱进;爱国主义具有深刻的内涵,实践爱国主义必须以科学理论为指导。  相似文献   
4.
Abstract

This paper employs the concept of smart power to construct an analytical framework for assessing wartime alliance management. It makes two arguments. First, wartime sources of soft power differ from those obtaining during peacetime. Second, the coerciveness with which an alliance leader wields hard power towards actual or prospective allies should vary inversely with the amount of soft power it possesses. The smart power framework illuminates three types of alliance management failure. The paper’s key contentions are illustrated with examples furnished from the record of US alliance leadership since World War II.  相似文献   
5.
This article highlights a pattern of military adaptation and tactical problem-solving utilized by the Israel Defense Forces (IDF) while engaged in protracted conflict with the Lebanese militant group Hizballah. It discusses the IDF’s recent attempts to institutionalize their historically intuitive process of ad-hoc learning by developing a formal tactical-level mechanism for ‘knowledge management’. The diffusion of this battlefield lesson-learning system that originated at lower-levels of the organization is examined, as well as its implementation and effectiveness during the 2006 Lebanon War. A nuanced analysis of IDF adaptation illustrates the dynamic interplay between both ‘top-down’ and ‘bottom-up’ processes of military innovation.  相似文献   
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
7.
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy.  相似文献   
8.
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies.  相似文献   
9.
Jacques Maritain (1882–1973) is widely recognized as one of the foremost Catholic philosophers of modern times. He wrote groundbreaking works in all branches of philosophy. For a period of about 10 years, beginning in 1933, he discussed matters relating to war and ethics. Writing initially about Gandhi, whose strategy of non-violence he sought to incorporate within a Christian conception of political action, Maritain proceeded to comment more specifically on the religious aspects of armed force in “On Holy War,” an essay about the civil war then ongoing in Spain (1936–1939). After the outbreak of World War II in September 1939, Maritain penned a series of essays that sought to explain why the Anglo–French declarations of war were warranted on Christian just war principles. While the secondary literature on Maritain’s thought is extensive, thus far there has been little systematic exploration of his writings on war. In what follows I seek to remedy this lacuna, by examining how he conceptualized just war in the three phases outlined above.  相似文献   
10.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号