首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   37篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   101篇
  2012年   8篇
  2011年   26篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有537条查询结果,搜索用时 15 毫秒
231.
介绍了指挥自动化系统安全性的内容,安全性的等级及实现安全性的技术。  相似文献   
232.
构造新的授权模型以满足面向对象、语义、文本数据模型等对授权的需求是当前数据库技术的重要研究课题之一。本文提出了一个基于复杂对象数据模型的、以权主群及权体簇作为授权单位的多级授权模型,即MAM模型,并讨论了面向文本数据库授权系统的基本功能及基本操作。  相似文献   
233.
城市环境安全评价初探   总被引:6,自引:1,他引:5  
环境安全研究目前主要停留在定性描述或定量评价自然生态安全阶段。考虑 到大中城市在经济建设和社会发展中的重要功能及城市生态系统的结构特殊性,首先定义 了城市环境安全范畴,并探讨了城市环境安全评价方法,提出了评价的程序和评价指标的选 择原则,最后提出了一个城市环境安全评价指标体系。  相似文献   
234.
This article explores the livelihood pathways of serving Ugandan Army soldiers and traces their methods and motivations for enlistment. All were from areas of northern Uganda affected by nearly two decades of violent instability. With the Uganda People's Defence Forces (UPDF) increasing recruitment eligibility requirements and taking other measures to improve professionalism, some soldiers enlisted using false credentials and names, travelled to skirt unofficial ethnic quotas, and joined against their family's wishes. The Army's defence reform process was intended to preclude such problems. The article concludes with reflections on what strategic deception (by both recruits and the Army) may imply for warriors' honour.  相似文献   
235.
Why did the United States, a country notorious for supporting coups and military dictatorships in Latin America during the Cold War, seek to depoliticize security forces in the Caribbean basin during the early twentieth century? Drawing from primary sources, I argue that this emphasis on military non-partisanship abroad stemmed from Progressive Era reforms popular at home. These reforms, which stressed bureaucratic efficiency via nonpartisan expertise, had become institutionalized within the US military and State Department and then channelled into the imperial administration of Nicaragua and the Dominican Republic. The State Department and Marine Corps attempted to replace local partisan armies with the kind of professional, nonpartisan armed forces that the US's own military had come to exemplify. That these civil-military reform efforts ultimately backfired should serve as a reminder of the difficulties inherent in using military interventions to transform coercive apparatuses and their societies.  相似文献   
236.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   
237.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   
238.
Using hitherto largely unexplored governmental archives from London and Dublin, this article focuses on the security challenges arising from the existence of the land frontier between the Republic of Ireland and Northern Ireland and the significance of issues of cross-border security cooperation for Anglo-Irish relations from the beginning of the Troubles until the Anglo-Irish Agreement in 1985. It argues that the relatively safe haven of the Republic was essential to the longevity of the IRA's campaign and that successive Irish governments exploited British security concerns to expand their political influence on Northern Ireland.  相似文献   
239.
ABSTRACT

The practice of dispatching teams of police advisors to other states to build or train foreign security forces began at the end of the nineteenth century, yet there exists no definitive history of the practice, or any definitive theoretical approach underpinning why such missions succeed or fail. Drawing upon their recent edited book on expeditionary police advising, and by examining the donor or sending states, the host nations, and the use of police in counterinsurgency situations, the authors present some key reasons why such missions fail, and lay some groundwork for additional study of this important subject.  相似文献   
240.
The U.S. Congress, charged with overseeing U.S. nuclear weapons policy and programs, usually addresses such policies and programs through the annual authorization and appropriations process, focusing mostly on questions of how many and what types of weapons the United States should deploy, with little attention paid to questions about nuclear weapons strategy, doctrine, and policy. The oversight process has brought about some significant changes in the plans for U.S. nuclear weapons, including the elimination of funding for the Robust Nuclear Earth Penetrator study and the shift of that funding into a study of the Reliable Replacement Warhead. But with the focus on authorizations and appropriations, along with the divided jurisdiction over nuclear weapons policy and programs in congressional committees, Congress has not, either recently or during the Cold War and post–Cold War eras, conducted a more comprehensive review of U.S. nuclear weapons strategy, policy, or force structure. Changes in committee jurisdictions could affect the oversight process, but as long as nuclear weapons policy and programs remain a relatively low priority for most members of Congress, and the country at large, it is unlikely that Congress will pursue such a comprehensive debate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号