全文获取类型
收费全文 | 503篇 |
免费 | 50篇 |
国内免费 | 23篇 |
专业分类
576篇 |
出版年
2024年 | 3篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 16篇 |
2020年 | 7篇 |
2019年 | 28篇 |
2018年 | 31篇 |
2017年 | 37篇 |
2016年 | 41篇 |
2015年 | 21篇 |
2014年 | 51篇 |
2013年 | 102篇 |
2012年 | 9篇 |
2011年 | 29篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 37篇 |
2007年 | 22篇 |
2006年 | 18篇 |
2005年 | 18篇 |
2004年 | 14篇 |
2003年 | 14篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有576条查询结果,搜索用时 0 毫秒
51.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
52.
Peter Dahl Thruelsen 《Small Wars & Insurgencies》2013,24(4):619-643
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR. 相似文献
53.
Colin Robinson 《Small Wars & Insurgencies》2013,24(3):474-499
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward. 相似文献
54.
为深入研究美陆军数据战略目标及实施策略,为我军数据战略研究提供借鉴,文章对美陆军2016年发布的最新《陆军数据战略》进行分析,指出其目标是实现数据的可视化、可获取、可信任、可理解和互操作,并对美陆军数据战略的具体实施策略进行了剖析,指出美国陆军数据战略推动的是美军军事作战理论转型,从"网络为中心"转变为以"数据为中心"作战理念,其核心意图在于以数据优势实现指挥决策优势。 相似文献
55.
在指控系统应用过程中,需要审查与系统安全相关的所有操作,并对不安全的操作行为进行报警。根据指控系统中数据库审计四要素的要求,提出将应用系统级审计与数据库级审计相结合的方法,最终实现两种级别审计的统一。解决了以往指控系统审计方式单一的问题,满足了军用数据库安全防护的要求。 相似文献
56.
57.
58.
59.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。 相似文献
60.
为探索信息化作战中指挥控制关键因素,提出改进作战指挥体制的对策措施,采用系统动力学理论,对协同决策的结构、参与者和信息反馈关系等关键因素进行了分析,在此基础上构建了基于系统动力学的协同决策模型并进行了模拟仿真。结果表明,增加指挥控制机构之间的信息共享可以有效提升协同决策的效率,为建立协同决策指挥控制体制提供了借鉴意义。 相似文献