首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   37篇
  国内免费   16篇
  537篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   101篇
  2012年   8篇
  2011年   26篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有537条查询结果,搜索用时 0 毫秒
161.
国家安全委员会具有“内外兼备”的基本职能,即:将维护国家安全与创新社会治理、创新有效预防和化解社会矛盾体制、健全公共安全体系等内政事务并列并举,在维护国内安全稳定方面也肩负重任。它较之现今的“国安领导小组”更为广泛和重要,是一个应对有别于国家日常工作之外的应急的危机管理机构,是应对可能的、突发的、潜在的对国家安全、利益构成威胁的前瞻性机构。  相似文献   
162.
在思想观念日益多样化的今天,充分运用红色资源是深化公安现役部队理想信念教育的新途径。通过对红色资源在部队理想信念教育中优势、问题及原因的分析,对如何有效运用红色资源开展公安现役部队的理想信念教育进行了简要阐述。  相似文献   
163.
极端民族宗教分裂势力恐怖活动已严重危害我国领土主权完整、威胁社会政治稳定,对国家安全构成严重威胁,必须采取相应对策予以打击。  相似文献   
164.
戚大伟 《国防科技》2021,42(6):10-14
后苏联时代的俄罗斯未能维持其在太空安全领域的优势,已不再是太空军事强国。本文首先梳理了俄罗斯太空安全政策的发展历程,其次,讨论了俄罗斯在太空安全治理和防止太空武器化方面的外交倡议,最后总结了俄罗斯太空安全政策的特征。本研究认为,自21世纪初起,俄罗斯逐渐开始复兴其太空军事力量,力图使其太空安全政策适应新的地缘政治格局,不仅积极调整其航天计划,对其航天工业体系、航天机构和航天资产进行简化、整合和现代化建设,还谋求“非对称”反制策略,并在联合国框架内积极开展“太空外交倡议”,以应对美国太空武器化所带来的威胁和挑战,同时推动禁止太空武器化进程。  相似文献   
165.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   
166.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
167.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
168.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox.  相似文献   
169.
170.
分析了军用电话网、军用广播电视网和指挥自动化网的现状,明确了军用“三网合一”的目标和可行性,提出了一种适合我军战时需要的“三网合一”实现方案,着重描述了该方案的结构、组成、工作原理及网络接口设计,对该方案的安全性能及使用的关键技术进行了分析,并给出了提高系统安全性的相关措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号