全文获取类型
收费全文 | 570篇 |
免费 | 3篇 |
国内免费 | 5篇 |
专业分类
578篇 |
出版年
2025年 | 1篇 |
2024年 | 2篇 |
2023年 | 1篇 |
2021年 | 13篇 |
2020年 | 10篇 |
2019年 | 35篇 |
2018年 | 31篇 |
2017年 | 38篇 |
2016年 | 33篇 |
2015年 | 17篇 |
2014年 | 48篇 |
2013年 | 116篇 |
2012年 | 13篇 |
2011年 | 27篇 |
2010年 | 35篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 11篇 |
2003年 | 14篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有578条查询结果,搜索用时 15 毫秒
161.
162.
介绍了一种用于指挥自动化网络中进行身份认证的U SB安全钥安全管理系统,给出了使用U SB安全钥进入网络终端时的认证机制,调用与浏览服务器信息时的认证流程,以及U SB安全钥软、硬件的设计要点。在该安全钥管理系统中可运行重要软件的关键程序和查询关键信息,有效增强保密强度,安全钥采用U SB接口,具有支持热插拔、携带方便等优点。 相似文献
163.
计算机网络攻击效果评估技术研究 总被引:32,自引:0,他引:32
计算机网络攻击效果评估技术是信息系统安全评估中一个重要而具有挑战性的课题。目前 ,相关的理论尚不成熟 ,有关的研究报道较少。简要总结了当前已经存在的主要信息安全的评估方法 ,在此基础上 ,从便于实际度量和计算的角度出发 ,提出了基于网络信息熵的评估技术、基于系统安全层次分析的安全评估框架和基于指标分析的网络攻击效果综合评估技术等三种评估模型 ,并分析了各自在使用中应注意的问题 相似文献
164.
Phillips Payson O’Brien 《战略研究杂志》2019,42(7):971-991
ABSTRACTThe decision by the US government to drop the atomic bombs on Japan is one of the most heavily debated questions in history. This article examines one element of that debate, in many ways the most surprising. That was the different views of the top of the military hierarchy in the USA, the Joint Chiefs of Staff (JCS). The JCS was on the whole more sceptical about using atomic weaponry than the USA’s civilian leadership, for ethical and strategic reasons. As such they were willing to consider very different ways of ending the war. 相似文献
165.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
166.
A dynamic multi-stage decision-theoretic approach is introduced to establish the optimal offset and its incidence, the contract price arising from bargaining, and the scale of the acquisition. A new rationale is suggested for offsets in terms of their role as an insurance devise. Results are derived for the pricing of delivery contracts subject to offset claims and their national security implications. It is shown that the national security is strictly convex in the offset transaction. As to the incidence of the offset, the offset claim is shown to be capitalised in the delivery price. The bargaining price is shown to depend on the value of the product to be delivered for the national security, the relative negotiation power of the contracting partners and the social cost of public funds. The analysis highlights the expectation effects of offsets on the bargaining price and the scale of delivery. The results aid in explaining why offsets are widely used in procurement contracts for defence materiel. As they contribute to the national security, they should be allowed to survive and not be denied under competition laws. 相似文献
167.
Susan Turner Haynes 《The Nonproliferation Review》2019,26(5-6):427-447
ABSTRACTWhile most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely. 相似文献
168.
Eugenio Cusumano 《Contemporary Security Policy》2019,40(2):239-262
Between 2014 and 2017, no less than 10 different non-governmental organizations (NGOs) conducted maritime Search and Rescue (SAR) operations off the coast of Libya. By rescuing over 100,000 migrants in three years, these NGOs became the largest provider of SAR in the Mediterranean. The theory of institutionalism suggests that organizations conducting similar activities are likely to converge in a process of mimetic isomorphism, deliberately imitating one another to increase their effectiveness and cope with uncertainty. These 10 SAR NGOs, however, developed two different rescue models: While some rescued migrants and disembarked them in Italian ports, others only simply assisted those in distress until the arrival of another ship transporting them to land. They also cooperated with Italian and European authorities to different degrees. Why did SAR NGOs imitated many elements of existing non-governmental rescue models, but discarded some others? This article argues that differences in material capabilities and organizational role conceptions are crucial to explain why newer SAR NGOs have imitated most but not all of their predecessors’ policies, engaging in a process of “selective emulation.” 相似文献
169.
170.