首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   145篇
  免费   2篇
  国内免费   1篇
  2022年   1篇
  2020年   2篇
  2019年   5篇
  2018年   10篇
  2017年   9篇
  2016年   9篇
  2015年   5篇
  2014年   16篇
  2013年   74篇
  2012年   3篇
  2011年   3篇
  2010年   5篇
  2009年   2篇
  2008年   1篇
  2005年   1篇
  2003年   1篇
  1991年   1篇
排序方式: 共有148条查询结果,搜索用时 15 毫秒
41.
It has long been held that the Federation of Malaya’s counter-insurgency campaign during the First Malayan Emergency (1948–60) was determined by the use of intelligence. Special Branch — the Federation’s primary intelligence agency — dominates the prevailing paradigm of how the insurgent threat was tackled. Conversely, the role of the Royal Air Force (RAF) within this paradigm is very limited. Most observers simply dismiss the role of photoreconnaissance or airstrikes as being largely inconsequential to the counter-insurgency effort. This is perhaps understandable: the Emergency was after all a ‘policing action’ and the insurgents were largely hidden under Malaya’s jungle canopy and amongst the Chinese community. However, further scrutiny reveals that the RAF made a much more significant contribution to the intelligence element of the counter-insurgency campaign than previously realised. First, the RAF decided to locate their Advanced Headquarters with the Army’s General Headquarters. This led to the creation of the Land/Air Operations Room, through which intelligence, tasking and resources were coordinated. Moreover, the RAF put its intelligence teams into the field to provide a practical link between local units and theatre-level assets. Second, with the support of the Army, the RAF established at the beginning of the Emergency the Joint Air Photographic Intelligence Board (Far East). This coordinated all photographic intelligence requirements throughout the Emergency, which was then delivered via the Joint Air Photographic Centre (Far East). Hence, via Joint Operations Centre and JAPIB (FE), the RAF provided both the practical means for effective joint intelligence operations at theatre level throughout the Emergency.  相似文献   
42.
Throughout the 1990s Pakistan sought to cultivate ‘strategic depth’ throughout Iran, Afghanistan and the newly emergent Central Asian Republics while seeking to restrict Indian influence in the region. Chastened by its past failures, Pakistan now embraces more modest regional goals. Despite the diminution in objectives, several factors augur failure including Pakistan's policies in Afghanistan, which diminish the likelihood of a stable Afghanistan, and Pakistan's inability to pacify the various insurgencies roiling both Baluchistan and the Pashtun areas of the Federally Administered Tribal Areas as well as the Northwest Frontier Province.  相似文献   
43.
社会主义核心价值体系决定着中国特色社会主义的发展方向,公安现役部队院校学员是公安现役部队的重要后备力量,经济转型期的阶层分化、多元文化和日益发展的网络文化对学员认同社会主义核心价值体系有不同程度的影响.应当在公安现役院校的思想政治教育中,把社会主义核心价值体系贯穿于两课教学的全过程,帮助学员在多元文化中提高辨别能力,探索运用网络进行思想政治教育的新途径、新机制.  相似文献   
44.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   
45.
The mounting challenge posed by China's military modernization has highlighted the need for the United States to analyze its ability to execute a naval blockade. A blockade strategy is viable, but it would be limited to a narrow context: the United States would have to be engaged in a protracted conflict over vital interests, and it would need the support of key regional powers. The United States would also need to implement a mix between a close and distant blockade in order to avoid imperiling the conflict's strategic context. If enacted, a blockade could exact a ruinous cost on the Chinese economy and state.  相似文献   
46.
A striking difference between the EU’s 2016 Global Strategy and its 2003 predecessor is the ubiquity of resilience as a new leitmotif, understood as the ability of states and societies to reform, thus withstanding and recovering from internal and external crisis. Resilience provides a middle ground between over-ambitious liberal peace-building and under-ambitious stability, (re)directs attention to local resources and practices, and is ambiguous enough to be acceptable to everyone. The Global Strategy’s leitmotif is an example of the rise and spread of resilience in international discourses about crisis management and humanitarian emergencies. Although there are risks inherent to the way in which resilience reframes risks and crises, its added value lies in its power as convening concept, opening up international organizations to new ways of thinking and working, and providing a common ground for engagement.  相似文献   
47.
为深入研究信息化战场信息安全保障,提高保障效能,利用OODA环理论对信息化战场信息安全保障过程进行了分析与研究,明确了观察、判断、决策和行动每个阶段的任务与事件,并运用系统动力学方法对基于OODA环的信息化战场信息安全保障过程进行建模分析和模拟仿真,仿真结果表明随着时间推移,保障方得到的信息增多,判断和决策的正确率也随之增加,OODA环周期开始减小,保障效能随之大幅提升。研究结果对于提升信息化战场信息安全保障效能具有一定的参考价值。  相似文献   
48.
ABSTRACT

Scholars and practitioners of grand strategy agree that the use of military force should be supplemented by appropriate economic policies. However, strangely few accounts of economic complements to military grand strategies have been presented in recent discourse on US grand strategy. This paper takes a first step to fill this information gap. I first assess the role that could be played by economic measures under two types of grand strategies – one focusing on the balance of power and the other emphasising influence and order. Second, I introduce what I call ‘the influence-capability dilemma’ and discuss tradeoffs in adopting certain economic policies in order to help the US sustain pre-eminence in the international system. Third, I discuss how the US should address this dilemma of economic means in dealing with the rising China.  相似文献   
49.
本文首先分析了有关数据库安全所需要解决的几个问题,并基于 discretion 和mandatory 存取策略,以及完整性和数据库加密策略,提出了一个较完整的数据库系统的安全模型。  相似文献   
50.
Private security companies (PSCs) currently receive a great deal of attention in the news media, in sensationalist reporting, and increasingly in scholarly books and articles. While the scholarly books and articles make significant contributions to our understanding of this global phenomenon, there are several impediments to analysis that must be recognized and overcome if analysis is to be improved. Three of these impediments are reviewed in this article. The author suggests that US government material is currently available to minimize impediments and offers a framework to make analytical sense of it. Since contracting out is based on contracts, and unless the complexities of awarding and managing contracts are understood, recommendations made to reform the process of contracting out security are unrealistic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号