全文获取类型
收费全文 | 504篇 |
免费 | 38篇 |
国内免费 | 16篇 |
专业分类
558篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 14篇 |
2020年 | 8篇 |
2019年 | 29篇 |
2018年 | 29篇 |
2017年 | 33篇 |
2016年 | 32篇 |
2015年 | 17篇 |
2014年 | 51篇 |
2013年 | 99篇 |
2012年 | 8篇 |
2011年 | 30篇 |
2010年 | 34篇 |
2009年 | 33篇 |
2008年 | 38篇 |
2007年 | 23篇 |
2006年 | 17篇 |
2005年 | 18篇 |
2004年 | 12篇 |
2003年 | 15篇 |
2002年 | 5篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有558条查询结果,搜索用时 0 毫秒
51.
Chris M.A. Kwaja 《African Security Review》2013,22(2):153-161
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors. 相似文献
52.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
53.
Peter Dahl Thruelsen 《Small Wars & Insurgencies》2013,24(4):619-643
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR. 相似文献
54.
Colin Robinson 《Small Wars & Insurgencies》2013,24(3):474-499
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward. 相似文献
55.
为深入研究美陆军数据战略目标及实施策略,为我军数据战略研究提供借鉴,文章对美陆军2016年发布的最新《陆军数据战略》进行分析,指出其目标是实现数据的可视化、可获取、可信任、可理解和互操作,并对美陆军数据战略的具体实施策略进行了剖析,指出美国陆军数据战略推动的是美军军事作战理论转型,从"网络为中心"转变为以"数据为中心"作战理念,其核心意图在于以数据优势实现指挥决策优势。 相似文献
56.
在指控系统应用过程中,需要审查与系统安全相关的所有操作,并对不安全的操作行为进行报警。根据指控系统中数据库审计四要素的要求,提出将应用系统级审计与数据库级审计相结合的方法,最终实现两种级别审计的统一。解决了以往指控系统审计方式单一的问题,满足了军用数据库安全防护的要求。 相似文献
57.
58.
59.
60.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。 相似文献