全文获取类型
收费全文 | 695篇 |
免费 | 8篇 |
国内免费 | 6篇 |
专业分类
709篇 |
出版年
2025年 | 1篇 |
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 1篇 |
2021年 | 17篇 |
2020年 | 10篇 |
2019年 | 29篇 |
2018年 | 32篇 |
2017年 | 36篇 |
2016年 | 38篇 |
2015年 | 23篇 |
2014年 | 68篇 |
2013年 | 105篇 |
2012年 | 28篇 |
2011年 | 40篇 |
2010年 | 43篇 |
2009年 | 37篇 |
2008年 | 37篇 |
2007年 | 27篇 |
2006年 | 27篇 |
2005年 | 28篇 |
2004年 | 17篇 |
2003年 | 20篇 |
2002年 | 6篇 |
2001年 | 6篇 |
2000年 | 2篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有709条查询结果,搜索用时 15 毫秒
11.
Peter Gastrow 《African Security Review》2013,22(1):39-43
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS. 相似文献
12.
Chris M.A. Kwaja 《African Security Review》2013,22(2):153-161
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors. 相似文献
13.
Robert Ayanian 《Defence and Peace Economics》2013,24(2):99-112
Standard economic concepts of production and cost minimization subject to a production constraint are used to derive the conditions of optimal deployment of home and forward military forces for the production of home security. United States' participation in the NATO alliance is then analyzed in the context of a two‐ally (U.S. and Western Europe) optimal force deployment model of NATO. Next, U.S. force‐basing policy is adduced as an enforcement mechanism for the “transatlantic contract.” Lastly, statistical evidence on burden sharing within Western Europe, and the effectiveness of the U.S. contract enforcement policy, is presented. 相似文献
14.
Şebnem Udum 《The Nonproliferation Review》2013,20(2):365-377
As worries have grown about global warming and the sustainability and price of fossil fuels, the demand for nuclear energy has increased, and nuclear power is increasingly viewed as a reliable and clean resource. However, the so-called nuclear renaissance coincides with an international security environment in which the norms of nuclear nonproliferation seem to be eroding. Turkey, a non-nuclear weapon state, plans to generate nuclear power to meet future energy demands, but it is aware of and concerned with regional proliferation trends. Questions have also been raised regarding Ankara's rationale for using nuclear energy, as well as its potential motivations and capabilities regarding future proliferation. This article will provide an overview of Turkey's nuclear energy history and plans, as well as the proliferation-related questions that could arise; it will also look at the domestic debate on nuclear energy and Turkey's status as a non-nuclear weapon state. 相似文献
15.
Charles Streeper 《The Nonproliferation Review》2013,20(3):531-550
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources. 相似文献
16.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。 相似文献
17.
Gonzalo F-de-Córdoba 《Defence and Peace Economics》2016,27(4):549-570
This paper develops a Dynamic Stochastic General Equilibrium model where national security is an argument in the agent’s utility function and the government chooses optimally the level of military spending to maximize social welfare. National defense depends on military expenditure and on the strategic environment reflecting a potential hostile external threat. We use aggregate data on consumption, investment, and military spending for the US economy to estimate the parameters of the model. Estimation results suggest that consumption and national defense are complements and that military spending variability is mainly explained by external threat shocks although it also depends on the macroeconomic conditions. We compute impulse response functions of the main macroeconomic variables to several shocks: a total factor productivity shock, a defense technology shock, and a strategic environment shock. Surprisingly, we find that the optimal response to an increase in the external threat (a worsening in the strategic environment) will rise output by reducing consumption and increasing investment. 相似文献
18.
首先提出了改进信息熵的作战效能评估方法,将作战过程划分为若干作战节点,节点的效能发挥受若干因素影响,并用不确定性自信息量来描述影响的不确定程度。在影响因素选取上,引入了未知因素,有效解决了具体作战中难以全面考虑节点效能发挥的所有影响因素问题。其次基于综合反隐身作战中的信息流关系建立了信息流图,并构建了对应的作战效能评估指标体系,最后计算了不同传感器组合和不同作战方式组合下的作战效能,并得出了结论:反隐身作战中,越多样化的传感器组合和越综合化的作战方式,作战的不确定性自信息量越小,作战效能越大。 相似文献
19.
杨增金 《中国人民武装警察部队学院学报》2005,21(3):58-60
公安边防部队的士官学历教育尚在起步阶段,任重而道远。各级领导应着眼部队长远建设,确立优先发展的战略地位;应立足部队现实需要,设置学科专业;应根据岗位任职需求,确定课程体系,突出实用性;应适应教学任务的要求,完善管理与保障体系。 相似文献
20.
杨隽 《中国人民武装警察部队学院学报》2007,23(3):5-8
公安现役高校在公安教育体系中处于重要位置,承担着人才培养、科学研究和服务部队的重要任务,对构建和谐社会责无旁贷。准确定位公安现役高校在构建和谐社会中所扮演的角色,可以充分发挥职能作用,为构建和谐社会做出应有贡献。 相似文献