首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   517篇
  免费   36篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   9篇
  2019年   35篇
  2018年   30篇
  2017年   38篇
  2016年   33篇
  2015年   17篇
  2014年   48篇
  2013年   116篇
  2012年   10篇
  2011年   27篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   19篇
  2004年   11篇
  2003年   14篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有570条查询结果,搜索用时 15 毫秒
251.
This article presents a synopsis of Community of insecurity: SADC's struggle for peace and security in southern Africa, published by Ashgate in 2012. It focuses on SADC's efforts to establish a common security regime; conflict and peacemaking in southern Africa between 1992 and 2011; and the prospects of SADC becoming a security community. It summarises the reasons for SADC's difficulties in the sphere of regional security and politics, namely the weakness of member states, their unwillingness to surrender sovereignty to communal mechanisms, and the absence of common values among them. The main conclusion is that these problems lie primarily at the national level and cannot be solved at the regional level. SADC is a forum of states and it cannot do anything that these states will not permit it to do.  相似文献   
252.
In June 2000, the Conference of Heads of State and Government of the Economic Community of Central African States (ECCAS) adopted the Protocol on the establishment of the Peace and Security Council for Central Africa (COPAX), with its two technical structures, namely the Central African Multinational Force (FOMAC) and the Central African Early Warning Mechanism (MARAC). MARAC is tasked with collecting and analysing data for the early detection and prevention of conflicts and crises. It currently consists of the Central Structure located at the ECCAS Executive Secretariat in Libreville (Gabon) and 31 Decentralised Correspondents spread throughout the ten member states of ECCAS. This article assesses the performance of MARAC in the light of its assigned objectives. Bearing in mind the peace and security challenges facing the central African sub-region, the central argument of this article is that while the establishment of MARAC is commendable, it flowed more from the logic and context of the establishment of similar mechanisms on the African continent during the same period than from any displayed capacity and/or readiness on the part of ECCAS to implement the recommendations due to emanate from such a structure.  相似文献   
253.
ABSTRACT

Natural resource-based conflicts continue to occur in different parts of Nigeria with negative implications. This study investigated the phenomena of natural resource conflicts vis-à-vis their propensities to impact political economy and national security negatively. Data for the study were sourced from theoretical and empirical evidence. Empirical data were sourced from existing studies selected on the basis on their relevance to the study and analysed based on their content. The limitation to this approach is the obsolete and subjective nature of some the literature. This limitation was, however, addressed among others through the author’s knowledge of the issues under study. The study found that Nigeria is enmeshed in conflict over ownership, distribution, access to or competition over natural resources such as petroleum resources and agricultural land and these conflicts have undermined democracy, human rights, the economy and the nation’s security. The paper identified poor resource governance, environmental factors and poor political leadership as the causes and drivers of these conflicts. It recommends natural resource governance among others, as a way out of the problem.  相似文献   
254.
Current U.S. nuclear weapons strategy, force structure, and doctrine contribute to the threat of nuclear terrorism in several ways. First, the U.S. nuclear stockpile presents opportunities for nuclear terrorists to seize the materials they need. Second, U.S. nuclear forces remain a key justification for Russia's maintenance of similar nuclear forces that are less well protected. Third, America's continued embrace of nuclear weapons encourages and legitimizes other states to seek nuclear weapons that they will have difficulty securing from terrorists. The national security interests of the United States would be better served by a strategy to shrink the global footprint of nuclear weapons and provide the highest possible levels of security for the most minimal possible deterrent forces. Given the inability to secure nuclear weapons and materials perfectly or to eliminate terrorism in the foreseeable future, reducing the global inventory of nuclear weapons and materials is the most reliable way to reduce the chances of nuclear terrorism.  相似文献   
255.
Nuclear Logics: Contrasting Paths in East Asia and the Middle East, by Etel Solingen. Princeton University Press, 2007. 404 pages, $26.95.  相似文献   
256.
Defusing Armageddon: Inside NEST, America's Secret Nuclear Bomb Squad, by Jeffrey T. Richelson. W.W. Norton & Company, 2009. 318 pages, $27.95.  相似文献   
257.
舰艇近区安全防卫系统分析   总被引:1,自引:0,他引:1  
针对我国舰艇近区安全存在的问题,参照国外舰艇近区自卫装备发展情况,提出了发展具有综合利用观瞄设备和声纳,并集合各种致命和非致命武器特点的舰艇近区安全防卫系统的构想。系统配备的观瞄设备用于探测地面、水上及低空近临目标,而声纳用于探测水下目标,如蛙人,无人水下航行器等。在打击方面,系统配备了可以歼灭目标的致命武器以及用于驱逐目标的非致命武器。并对系统的关键技术进行了初步探讨。 关键词:舰艇近区安全,近区安全防卫系统,非致命武器  相似文献   
258.
259.
《Arms and Armour》2013,10(1):45-52
Abstract

A small part of the White Tower displays at the Royal Armouries at the Tower is marking the centenary of the First World War and the role the Tower of London played in the War, the links between the site, its staff and the great event are described. The importance of Charles ffoulkes as curator in developing the collection is emphasized. The choice of display content and the way the exhibition will change to reflect each year of the war is described, starting with material from 1914 displayed during 2014 in ‘Foreman Buckingham goes to war’.  相似文献   
260.
随着公安警卫部队信息化建设的全面高速发展,云计算技术将更多地应用于警卫信息化建设。展望云计算在警卫信息化建设中的应用前景,分析当前警卫信息化建设中运用云计算技术所面临的问题及对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号