全文获取类型
收费全文 | 1081篇 |
免费 | 17篇 |
国内免费 | 6篇 |
专业分类
1104篇 |
出版年
2025年 | 5篇 |
2024年 | 3篇 |
2023年 | 14篇 |
2022年 | 9篇 |
2021年 | 43篇 |
2020年 | 40篇 |
2019年 | 53篇 |
2018年 | 37篇 |
2017年 | 63篇 |
2016年 | 46篇 |
2015年 | 30篇 |
2014年 | 109篇 |
2013年 | 107篇 |
2012年 | 53篇 |
2011年 | 58篇 |
2010年 | 74篇 |
2009年 | 44篇 |
2008年 | 42篇 |
2007年 | 39篇 |
2006年 | 41篇 |
2005年 | 41篇 |
2004年 | 40篇 |
2003年 | 23篇 |
2002年 | 16篇 |
2001年 | 18篇 |
2000年 | 12篇 |
1999年 | 11篇 |
1998年 | 5篇 |
1997年 | 8篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有1104条查询结果,搜索用时 0 毫秒
171.
172.
美国长期以来大量对外国进行武器出口,一方面获取巨额利润,另一方面借此影响相关地区的形势.2017年上半年,伴随着美国政府对外政策的调整,美国对外军事贸易也出现了一些变化,在对亚太地区、中东地区、欧洲地区和其他潜在热点地区的武器出口方面有着不同的表现. 相似文献
173.
174.
Kenton White 《Defence Studies》2017,17(4):346-358
The use of commercial business management techniques is widespread in all government departments, including the Ministry of Defence. This article examines the use of popular management techniques in the Armed Forces and argues that their application is misplaced. It looks at what the “effs” – “efficiency” and “effectiveness” – mean in the business world and to the Armed Forces. It compares the definitions both in business and the Armed Forces and finds that there are few, if any, situations where the same measurements can be applied. Whilst many management techniques are suited for business, the function of the Armed Forces and its output cannot be measured in the same way, complicated by the different metrics of “efficiency” in peace and in war. This difference may not be clearly understood by some politicians, or indeed by some senior military personnel. Using examples from some of the most popular management techniques such as “Lean” and “Agile” it is possible to see that their use might actually diminish the capabilities of the Armed Forces when it comes to performing their principal role – the use of force to achieve political objectives. 相似文献
175.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion. 相似文献
176.
Brendan Sozer 《Small Wars & Insurgencies》2016,27(4):636-658
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships. 相似文献
177.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty. 相似文献
178.
179.
随着美国揭开第三次\"抵消战略\"重点发展对象的面纱,研发\"颠覆性技术\"已成为主要军事大国获得技术优势的手段。当前世界新一轮科技革命、产业革命、军事革命交织并行,给颠覆性技术提供了难得的良好机遇。但当我们看见颠覆性技术引领时代新型武器装备潮流发展的同时,也应理性看待其背后潜藏的风险。通过概述总结颠覆性技术研究现状,分析其推动的科技内生性变革,从本质上对其进行理性认知。研究表明,发展颠覆性技术必须积极作为,谨慎对待。 相似文献
180.
Lawrence E. Cline 《Defense & Security Analysis》2016,32(4):293-311
Particularly in African operations, United Nations (UN) peacekeeping forces have faced significant problems in restoring stability. In at least a few situations, unilateral national military interventions have been launched in the same countries. In the cases of Sierra Leone and Côte d’Ivoire, the British and French interventions respectively played a significant role in re-establishing stability. Lessons from these operations suggest that if effective coordination and liaison channels are established, such hybrid unilateral-UN missions can in fact be more successful than “pure” peace operations. 相似文献