全文获取类型
收费全文 | 627篇 |
免费 | 93篇 |
国内免费 | 53篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2021年 | 20篇 |
2020年 | 9篇 |
2019年 | 29篇 |
2018年 | 30篇 |
2017年 | 39篇 |
2016年 | 51篇 |
2015年 | 23篇 |
2014年 | 61篇 |
2013年 | 111篇 |
2012年 | 26篇 |
2011年 | 46篇 |
2010年 | 44篇 |
2009年 | 46篇 |
2008年 | 46篇 |
2007年 | 31篇 |
2006年 | 39篇 |
2005年 | 39篇 |
2004年 | 21篇 |
2003年 | 23篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
排序方式: 共有773条查询结果,搜索用时 15 毫秒
621.
Raul Gouvea 《Defense & Security Analysis》2017,33(3):223-241
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region. 相似文献
622.
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures. 相似文献
623.
Philip Adémọ́lá Ọláyọkù 《African Security Review》2017,26(4):378-398
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security. 相似文献
624.
625.
626.
627.
628.
网络安全与防火墙技术 总被引:1,自引:0,他引:1
介绍了防火墙技术的概念、几种防大墙实现技术的原理、防火墙的配置及安全措施. 相似文献
629.
C3I系统体系结构的演化开发过程 总被引:2,自引:0,他引:2
体系结构的建立是C3I系统工程的重要组成部分,它是保障所开发的C3I系统满足军事需求的机制.提出了C3I系统体系结构的演化开发过程,它是体系结构开发在需求汇集、体系结构设计、建立可执行模型、体系结构评价等四个主要任务区域中循环迭代、逐步求精的过程.确定和论述了演化开发过程中各任务区域的主要活动. 相似文献
630.
以概率方法确定了飞机近距发射空空导弹时的安全性评估指标,分析了载机、导弹和目标三者初始状态,飞机轨迹等诸多因素对载机安全性的影响,同时给出了评估飞机运用空空导弹攻击目标时的安全性评估指标的原理框架。运用此模型可以解决新型飞机的安全性设计问题以及通过对现有飞机的安全性评估来改进飞机的安全性等级。 相似文献