首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   37篇
  国内免费   17篇
  544篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   33篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   28篇
  2010年   35篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   18篇
  2005年   20篇
  2004年   13篇
  2003年   15篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有544条查询结果,搜索用时 15 毫秒
411.
This article investigates how US national security planners have envisioned the emerging strategic environment during the early twenty-first century and evaluates how their perceptions of this strategic environment have changed during these years. This conceptual evolution can be seen in how defense planners define threats, identify defense priorities, and design security strategies. Five key strategic planning documents serve as the basis for this analysis and illustrate significant shifts in how the US government has envisioned its own security requirements as well as the context within which its strategic vision will need to be realized. These planning documents are: (1) Joint Vision 2020, (2) the Bush Administration's 2002 National Security Strategy of the United States, (3) the Obama Administration's 2010 National Security Strategy, (4) US Strategic Defense Guidance entitled Sustaining US Global Leadership: Priorities for 21st Century Defense, and (5) the US Chairman of the Joint Chiefs of Staff's Capstone Concept for Joint Operations: Joint Force 2020.  相似文献   
412.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
413.
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated.  相似文献   
414.
中央八项规定的出台给警卫工作带来了前所未有的挑战,即:减少“硬性”控制措施,能否经得起严峻安全形势的考验,确保警卫安全;接受公众和舆论的监督,能否提交合格“答卷”,展示警卫部队的良好形象。同时,中央八项规定也为推动警卫工作模式创新、警卫战斗力建设、警卫工作立法、警卫工作理念和作风转变提供了难得的机遇。  相似文献   
415.
在经历了陆权逐鹿、海权争霸、空天对垒以及制网权较量之后,在全球媒体时代,人类战争正在从自然空间、技术空间向认知空间拓展。文章从多学科视角切入,聚焦认知空间的战争与战略问题,剖析了战争制权理论演进背景下,制脑权战争兴起的历史合理性及其攻防对抗律,最后从捍卫国家认知空间安全的高度,对全球媒体时代的国家安全战略提出了对策。  相似文献   
416.
军事装备大数据是实现军事现代化、智能化的基础,其中,数据共享对实现装备可视化管理、整合装备供应链、优化指挥控制系统等具有至关重要的作用。军事装备数据涉及核心机密,数据的安全共享问题是导致这些技术发展迟缓的关键因素之一。区块链是一种具有去中心化、不可篡改、稳定可靠等特性的分布式链式账本技术,利用区块链技术和云计算可以保障装备数据安全,在军事领域有着广阔的发展前景。本文面向装备数据安全共享业务开展研究,探讨利用基于属性加密技术和智能合约技术解决不同主体间的信任问题,并提出了基于区块链的装备数据安全共享方案,以打破传统装备系统中的“信息孤岛”现象。  相似文献   
417.
为解决部分党员领导干部不认真过双重组织生活的问题,上海边防总队确立了发放组织生活通知单和组织生活公示制、报告制、通报制,这对于党员领导干部过好组织生活起到了很好的规范作用。严格落实"一单三制"制度,需要把握好三个环节:一要筑牢思想基础,增强落实制度的责任感;二要强化管理监督,提升落实制度的严肃性;三要建立配套制度,提高制度落实的规范性。  相似文献   
418.
水下信息对抗是海军信息化建设中需要重点考虑的内容之一.除了现有的声纳侦察之外,在未来的海战中,信息获取和信息对抗将更多地依赖水声网络的作用.因此,水声网络的相关问题必须得到重视.探讨了水声网络的一些关键技术,从信息对抗的角度分析了水声网络面临的挑战及应对措施.  相似文献   
419.
阐述了大型活动的类型和一般规律及大型消防保卫勤务的基本策略,结合实际案例提出了大型消防保卫勤务工作的重点,包括安全保卫机构的组成和原则,大型活动消防保卫预案制定的基本程序及消防安全分类等。  相似文献   
420.
This article identifies and evaluates likely challenges facing NATO today and into the next millennium. These contingencies include ethnic‐based civil wars in Europe, transnational terrorism, rogue states, increased world income inequality, out‐of‐area conflicts, and environmental and resource security. Using concepts and tools from collective action, I assess these challenges and suggest effective policies for addressing them. NATO still has a crucial role to play in maintaining world security in the post‐Cold War era.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号