全文获取类型
收费全文 | 784篇 |
免费 | 195篇 |
国内免费 | 60篇 |
出版年
2024年 | 2篇 |
2023年 | 2篇 |
2022年 | 5篇 |
2021年 | 28篇 |
2020年 | 17篇 |
2019年 | 10篇 |
2018年 | 18篇 |
2017年 | 40篇 |
2016年 | 42篇 |
2015年 | 20篇 |
2014年 | 53篇 |
2013年 | 79篇 |
2012年 | 48篇 |
2011年 | 46篇 |
2010年 | 40篇 |
2009年 | 46篇 |
2008年 | 47篇 |
2007年 | 45篇 |
2006年 | 60篇 |
2005年 | 67篇 |
2004年 | 47篇 |
2003年 | 44篇 |
2002年 | 35篇 |
2001年 | 28篇 |
2000年 | 24篇 |
1999年 | 28篇 |
1998年 | 24篇 |
1997年 | 15篇 |
1996年 | 12篇 |
1995年 | 13篇 |
1994年 | 9篇 |
1993年 | 9篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 20篇 |
1989年 | 3篇 |
排序方式: 共有1039条查询结果,搜索用时 15 毫秒
991.
992.
Patrick Mileham 《Defense & Security Analysis》2016,32(1):97-111
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global. 相似文献
993.
Nicolas Groffman 《Defense & Security Analysis》2016,32(2):144-162
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries. 相似文献
994.
对几种类型的碳纤维在Cf/SiC复合材料制备工艺中的先驱体中氧含量及高温热处理和PCS浸渍裂解处理过程中造成的损伤进行了考察,并探讨了损伤机制.结果表明,碳纤维石墨化程度和表面状态的差别会对其在复合材料制备过程中的损伤程度产生影响.石墨化程度高的M40JB碳纤维损伤程度较大;表面呈活性的JC1#碳纤维对外界条件的变化较为敏感;而石墨化程度不高而表面不活泼的JC2#碳纤维则损伤程度较小且较稳定. 相似文献
995.
为了适应嵌入式定制微处理器的开发的需要 ,克服现有微处理器仿真工具的某些不足 ,文中介绍了微处理器的仿真验证工具———VCPU的设计和实现方法。同其它微处理器仿真工具相比 ,该工具具有多层次 ,可配置 ,功能全面的特点。利用该工具 ,设计者可在设计早期进行系统集成验证 ,缩短设计周期并减少设计错误。该工具已经在嵌入式微处理器开发过程中得到成功应用 相似文献
996.
997.
王爱军 《中国人民武装警察部队学院学报》2002,18(5):35-37
根据化学危险品事故的特点及消防部队的装备配备情况 ,提出了一整套化学危险品事故抢险救援的程序 ,并介绍了处置过程中的关键技术。 相似文献
998.
网络安全与防火墙技术 总被引:1,自引:0,他引:1
介绍了防火墙技术的概念、几种防大墙实现技术的原理、防火墙的配置及安全措施. 相似文献
999.
介绍了一种双正激电路的软开关拓扑,分析了其软开关的工作原理,推导了实现软开关的关键技术参数的计算公式并采用该技术开发了1.8kW的充电电源。 相似文献
1000.
应用AVERLOGIC公司最新研制的平板显示控制器AL300,实现了便携式火炮测径窥膛仪的火炮直径数据采集、炮膛视频图像转换与显示系统设计。该系统以微处理器AT89C52为控制核心,利用AL300控制液晶显示屏,同时显示炮膛视频图像和直径测量数据。 相似文献