全文获取类型
收费全文 | 484篇 |
免费 | 37篇 |
国内免费 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 14篇 |
2020年 | 6篇 |
2019年 | 30篇 |
2018年 | 29篇 |
2017年 | 33篇 |
2016年 | 32篇 |
2015年 | 17篇 |
2014年 | 49篇 |
2013年 | 101篇 |
2012年 | 8篇 |
2011年 | 26篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 17篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 13篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有537条查询结果,搜索用时 390 毫秒
461.
Mikkel Vedby Rasmussen 《Defence Studies》2016,16(4):374-389
Taking its point of departure in Donald Rumsfeld’s second term as US Secretary of Defense (2001–2006), this article analyses the crisis of strategic leadership in Western national security. Three “traps” are identified that explain why Donald Rumsfeld ultimately was a failure as defence secretary and demonstrate the perils of national security governance. These traps are termed the inquisitor trap, the strong leader trap and the delegation trap. It is argued that our understanding of strategic leadership in national security, particularly in defence, can benefit from insights gained from the study of strategic leadership in business. As such, this article engages the recent trend of merging insights from business and military strategy. 相似文献
462.
基于RBAC的分布式数据库系统安全管理技术 总被引:1,自引:0,他引:1
分析了分布式数据库系统安全管理的必要性 ,引入了基于角色的访问控制模型 ,结合分布式数据库系统的开发实例 ,阐述了利用Delphi实现基于SQLServer的分布式数据库系统安全管理的技术。 相似文献
463.
Kirstin J. H. Brathwaite 《Defence Studies》2018,18(1):1-18
How do we understand combat effectiveness – soldiers’ performance in battle? Despite the broad consensus that understanding combat effectiveness is important both for scholars and policymakers, there is widespread disagreement about what combat effectiveness is. More specifically, studies of effectiveness tend to focus on either the skill of soldiers in battle, or their will to fight. Yet both skill and will are essential components of an effective fighting force. This article argues that understanding combat effectiveness requires understanding both of these key components of effectiveness. In other words, combat effectiveness requires both the skill and will to engage the enemy in an organized manner. It then demonstrates the usefulness of this conceptualization by applying it to the cases of British, Indian, and Australian forces fighting the Japanese during the Second World War. Only when scholars are talking about the same concept will our understanding of the conditions under which militaries are effective in battle progress. By comparing different units fighting the same opponent under the same material conditions, I demonstrate that units vary both in their combat skill and their will to fight, and that understanding their effectiveness in battle requires analyzing both of these key factors. 相似文献
464.
Risks are omnipresent in contemporary international security. Despite a long tradition in security studies going at least back to Von Clausewitz, we consider that the topic of risk remains under-examined. This forum seeks to advance the research agenda on risk in security studies by showcasing work of scholars using advanced concepts of risk, based on insights from sociology, biology, psychology, and safety studies, to better understand the role of risk in international security. As a way of introduction, this short article sets out the main debates. 相似文献
465.
Jahara Matisek 《Defense & Security Analysis》2018,34(3):267-290
ABSTRACTThe United States has provided substantial amounts of military assistance and aid since the end of World War Two. During the Cold War, it proved vital in protecting numerous regimes from communist takeovers. Successful outcomes occurred when American leaders made large initial aid commitments, and the states had the capacity and political willpower to use it effectively. However, Vietnam was an example of how U.S. support lagged, as leaders in Saigon preferred political survival instead of creating regime legitimacy. Following 9/11, American security aid focused on making weak countries develop stronger security forces. Unfortunately, this created Fabergé egg militaries: expensive and easily broken by insurgents. This article suggests long-term strategic commitments need to be made alongside more resources for the American State Department and similar organizations to focus on the politics of state-building. Finally, this article suggests strategies, such as “whole-of-government” approaches, to improve long-term security and political institution building. 相似文献
466.
467.
针对嵌入式浏览器信息传输的安全性问题和嵌入式软件的特点,介绍了SSL协议,提出了一种在嵌入式浏览器中实现对SSL协议支持的方法.通过分析影响SSL协议客户端性能的因素,对SSL的实现过程进行了适当的优化,使用会话恢复机制、只对服务器进行验证的简单握手模式、减少TCP调用次数和优化对批量数据加密算法等方法,实现了嵌入式浏览器对SSL协议的支持;并介绍了方法在嵌入式浏览器JARI_Browser中的实现过程.实际的应用验证了该方法的可行性和正确性. 相似文献
468.
向加磊 《中国人民武装警察部队学院学报》2010,26(3):12-14
在深入调研公安边防部队各级指挥中心业务开展的基础上,分析了当前公安边防部队指挥系统存在的问题,提出了利用地理信息平台建立适应当前边防部队业务需要的综合指挥系统的可行性及具体思路。 相似文献
469.
白宏江 《中国人民武装警察部队学院学报》2010,26(3):25-27
专业综合演练对专业教学来讲是一个全新的课题,需要进行多方面的探索和实践。从研究警卫专业综合演练的原则入手,提出了组织实施综合演练应当遵循的几个原则。目的在于恰当地把握和评估演练,使演练更好地为提高学员执勤和处突能力服务。 相似文献
470.
王尚庆 《中国人民武装警察部队学院学报》2010,26(7):26-28
警卫基础建设是警卫工作建设的重要组成部分,是圆满完成各项警卫工作任务的基础保障。以“三基”工程建设为契机,发挥县级公安机关实战主体作用,完善各项工作机制,积极探索基础工作新模式是在实践中总结出来的经验和思路,是警卫基础建设的必由之路和研究充实的方向。 相似文献