全文获取类型
收费全文 | 806篇 |
免费 | 16篇 |
国内免费 | 5篇 |
专业分类
827篇 |
出版年
2025年 | 2篇 |
2024年 | 4篇 |
2023年 | 5篇 |
2022年 | 4篇 |
2021年 | 19篇 |
2020年 | 19篇 |
2019年 | 46篇 |
2018年 | 43篇 |
2017年 | 59篇 |
2016年 | 52篇 |
2015年 | 30篇 |
2014年 | 72篇 |
2013年 | 127篇 |
2012年 | 28篇 |
2011年 | 37篇 |
2010年 | 46篇 |
2009年 | 41篇 |
2008年 | 38篇 |
2007年 | 28篇 |
2006年 | 22篇 |
2005年 | 26篇 |
2004年 | 26篇 |
2003年 | 18篇 |
2002年 | 8篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 5篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1990年 | 2篇 |
排序方式: 共有827条查询结果,搜索用时 0 毫秒
251.
针对W indows2000下自带的IPSec与L inux的IPSec相互通讯比较困难的问题,对L inux IPSec、ND IS网络驱动程序以及WDM设备驱动程序进行了研究,在W indows平台下设计并实现了一个基于中间层驱动程序的IP-Sec,它能与L inux IPSec通讯。中间层驱动程序对过往的数据包进行加密或者解密操作是通过WDM设备驱动程序与上层应用程序的通讯机制,以此来实现应用层与内核的双向通讯,即应用层向内核传递密钥及其他配置信息,内核向上层应用程序提供底层的配置信息。此外,在L inux IPSec源代码的基础上增加了安全审计功能,具体测试结果表明,这个系统可以与L inux IPSec通信。 相似文献
252.
Valery Konyshev 《Defense & Security Analysis》2014,30(4):323-335
In contrast with a widespread perception of Russia as an expansionist power in the Arctic, this article argues that Moscow does not seek military superiority in the region. Rather, Moscow's military strategies in the Arctic pursue three major goals: first, to demonstrate and ascertain Russia's sovereignty over its exclusive economic zone and continental shelf in the region; second, to protect its economic interests in the High North; and third, to demonstrate that Russia retains its great power status and still has world-class military capabilities. The Russian military modernization programs are quite modest and aim at upgrading the Russian armed forces in the High North rather than providing them with additional offensive capabilities or provoking a regional arms race. The Russian ambitions in the Arctic may be high, but they are not necessarily implying the intentions and proper capabilities to confront other regional players by military means. On the contrary, Moscow opts for soft rather than hard power strategy in the Arctic. 相似文献
253.
The ‘resource curse’ is the paradoxical theory frequently used to explain how a seemingly desirable asset, such as oil, can actually pervert an economy, erode governance, perpetuate conflict, and ruin local communities to the extent that it becomes a curse. New oil discoveries in western Ghana and western Uganda have raised concerns for the democratic prospects and future stability of these countries and their surrounding regions. Based on field interviews in these oil-producing regions, this report summarises how local communities have been affected thus far and their concerns for the future. The authors assess the extent to which each country is vulnerable to oil-induced instability, and identify groups or communities that would be most likely to perpetuate it. Lastly, it provides some assessment of the future trajectory of each country. 相似文献
254.
Obert Hodzi 《African Security Review》2014,23(3):295-306
This paper argues that the crisis of electoral democracy in Zimbabwe and Cote d'Ivoire is a result of underlying structural and institutional deficiencies within national and regional multinational institutions. It assesses the extent to which they have been ‘enablers’ or ‘spoilers’ of electoral-based transitions to democracy. Yet it avoids generalisations of the security sector's involvement in political transitions. In terms of structure, the paper is divided into four sections. Section one will briefly discuss the theoretical perspectives of the election-democracy trajectory. It argues that although elections are a major variable for democracy, unless the ‘ecology of elections’ is conducive, elections may not be an instrument of transition to democracy. The second section analyses the militarisation of politics and the role of the security sector in aiding or stalling democratisation. Section three will assess the role of regional organisations such as the Southern African Development Community, Economic Community of West African States and the African Union in electoral-based political transitions in Africa. Lastly, the paper will discuss how the security sector and multinational African institutions can aid political transitions to democracy in troubled African countries. 相似文献
255.
256.
Bertrand Fonck 《Small Wars & Insurgencies》2014,25(4):767-783
In the late seventeenth century during the Dutch War (1672–1678) and the Nine Years War (1688–1697), French armies relied on small war for the accomplishment of essential tasks and as part of an overall strategy of exhausting their opponents in the Low Countries. The purposes of small war included the imposition of contributions on enemy populations, the destruction of the enemy base of operations, blockades of fortresses, and the general support of campaign armies. The expression ‘small war’ in the French language appeared with growing frequency in the 1690s. Small war can be viewed as both a cause and consequence of the characteristics of these wars. The limited policy goals of Louis XIV the king of France required a strategy that minimised risk and accomplished the goal of reducing if not eliminating the Spanish presence in the Low Countries that bordered the north of France. As French armies increased in size during this period, the demand for specialists at small increased in order to provide security and ensure supply. Small war in the late seventeenth century was thus not ideologically motivated insurgency, but in the minds of French commanders an essential component of strategy and the nature of war. 相似文献
257.
王洪军 《中国人民武装警察部队学院学报》2014,(5):25-27
部队战斗力的生成和提高主要依靠平时的军事训练来实现。根据公安警卫部队当前任务实际,着眼新形势下的警卫任务执勤需要,就警卫部队训练对象的层级划分和具体训练目标、训练科目和内容、训练管理体制的建立与完善等问题进行探讨。 相似文献
258.
张志勇 《中国人民武装警察部队学院学报》2014,(5):46-49
沿海船舶边防治安管理是维护海上治安秩序稳定的重要手段。为加强海上治安管理,需要通过立法活动赋予公安边防机关特殊的执法权,并以此规范公安边防行政执法活动。分析沿海船舶边防治安管理立法概况及其存在的问题,提出完善沿海船舶边防治安管理立法的建议。 相似文献
259.
边境安全风险分析系统的构建研究 总被引:1,自引:0,他引:1
唐超 《中国人民武装警察部队学院学报》2014,(11):22-26
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。 相似文献
260.
刘颖璇 《中国人民武装警察部队学院学报》2014,(11):27-30
当前,警卫情报工作的范围已经扩展到警卫实战、预警、决策、管理等各个方面,但从总体上看,警卫情报工作仍需进一步优化,以满足日益增长的警卫实践需求。针对警卫情报工作的特点,采用SWOT分析法对警卫情报工作的内外部条件进行客观分析,提出针对性的优化策略,以提升警卫情报工作能力。 相似文献