首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   314篇
  免费   1篇
  2021年   1篇
  2020年   10篇
  2019年   24篇
  2018年   14篇
  2017年   21篇
  2016年   15篇
  2015年   8篇
  2014年   27篇
  2013年   162篇
  2012年   9篇
  2011年   4篇
  2010年   8篇
  2009年   1篇
  2007年   1篇
  2005年   5篇
  2003年   2篇
  2001年   2篇
  1998年   1篇
排序方式: 共有315条查询结果,搜索用时 62 毫秒
41.
Nuclear deterrence is sometimes treated as a known quantity—a definite thing that keeps us safe and ensures our security. It has also often been used as a justification for possessing nuclear weapons. Nuclear deterrence, however, is based on an unexamined notion: the belief that the threat to destroy cities provides decisive leverage. An examination of history (including recent reinterpretations of the bombing of Hiroshima) shows that destroying cities rarely affects the outcome of wars. How is it possible that an action that is unlikely to be decisive can make an effective threat? Recent work on terrorism suggests that attacks against civilians are often not only ineffective but also counterproductive. And a review of the practical record of nuclear deterrence shows more obvious failures than obvious successes. Given this, the record of nuclear deterrence is far more problematic than most people assume. If no stronger rationale for keeping these dangerous weapons can be contrived, perhaps they should be banned.  相似文献   
42.
Book Reviews     
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X.

Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3.

Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1.

Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X.

Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4.

Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115.

T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8.  相似文献   
43.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
44.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   
45.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   
46.
This article analyzes the quality of the Egyptian and Israeli intelligence advice and decision-making process in the October 1973 War as key factors that determined its course. Following a background to the subject, we focus on the 9–13 October standstill stage, in which Sadat decided, despite his generals’ advice, to renew the Egyptian offensive. Effective Israeli intelligence collection about the coming attack, which was well used by the decision-makers, saved Israel from accepting an undesired ceasefire. The result was the 14 October failed Egyptian offensive that turned the tide of the war and led to Israeli military achievements at the war’s final stage  相似文献   
47.
Based on full access to Norwegian archives up to 1970, the article describes the origins and development of ‘stay-behind’– an organized preparedness, under the aegis of the Norwegian Intelligence Service, for intelligence and sabotage behind enemy lines in case of a Soviet occupation. Initiated by Defence Minister Jens Christian Hauge, wartime leader of the Norwegian military resistance, the set-up built on lessons learnt during the German occupation, when effective resistance was hampered by inexperience and improvisation. Secrecy and security, and national Norwegian control albeit with cooperative links with British and American secret services, were distinctive features of the networks that came into being from 1948 onwards. NATO began to take an interest from 1952, but SACEUR's main concern was for ‘retardation’– guerrilla and sabotage activities to delay Soviet forces even before entering NATO territory.  相似文献   
48.
While separatist-related conflict has re-emerged in southern Thailand, there is one predominantly Muslim border province that has remained outside of the conflict. Satun province has been conspicuously unaffected by the Malay-Muslim separatist movement, despite its shared history and ethnic origins with the conflict-affected provinces. In contrast to Pattani, Yala, and Narathiwat, the process of state penetration in Satun was gradual and comparatively less coercive, leading to relative stability and encouraging political and economic integration. This comparative study analyzes the history of cooperative state–minority relations and political stability in Satun province, and draws important lessons directly applicable to the unrest in neighbouring provinces.  相似文献   
49.
The Christian resistance to the Arab invasion of Spain in 711 tends to be glossed over as a sideshow in what is usually presented as the inexorable progress of the conquest. This reflects the bias of our meagre sources, which mostly take the Arab perspective. Nevertheless, with close consideration and careful handling of these sources, we can draw from them an impression of a persistent insurgency that presented a real problem to the Islamic authorities and induced them to take both political and military countermeasures. This paper suggests how the resistance formed, its organization and tactics, and why the Arabs were unable to suppress it.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号