首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   483篇
  免费   36篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   26篇
  2010年   34篇
  2009年   31篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   14篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有535条查询结果,搜索用时 15 毫秒
441.
当前,面对新的形势、新的任务和新的要求,认真分析并解决公安现役高等院校在新的历史条件下一些带有方向性、根本性的重大问题,使公安现役高等教育在更高的起点上实现全面协调可持续发展。要实现这一目标。前提条件是不断解放思想,根本要求是内涵发展,基本途径是走特色之路。  相似文献   
442.
在全面建设小康社会的新形势下,将“以人为本”、“和谐思维”、“开拓创新”理念融入警卫部队建设,对促进警卫部队科学发展,高质量完成警卫任务,进而实现其现代化的发展道路具有重要意义。  相似文献   
443.
无论是执行外宾警卫任务还是首长警卫任务,警卫人员都会在警卫对象出现的相关场合经常性的“露脸”。警卫人员的礼仪修养将直接体现中国的文明程度,同时也直接影响首长在人民群众中的形象,提高警卫人员的礼仪修养刻不容缓。  相似文献   
444.
讨论了导航装备数字维修平台的网络传输安全性问题,分析其安全需求,提出采用Java安全技术来解决堆修平台的安全性.从工程项目实际需要的角度出发,阐述了在导航装备数字维修平台中的Java安全机制以及实现技术.  相似文献   
445.
随着全球导航卫星系统的广泛应用,其安全性问题也逐渐成为人们关注的焦点。为了对目前最具隐蔽性的诱导式欺骗技术进行检测,提出一种对两路导航信号同时进行处理的combo-signal模型,并提出基于这种信号处理模型来对诱导式欺骗信号进行检测的方法;分析了该方法的检测门限;采用北斗的B1I 和B1C信号在实现了combo-signal处理模型的软件接收机上对该检测方法进行了验证,实验结果证明该方法可以有效地对诱导式欺骗进行检测,统计得到的检测概率跟前面的分析结果一致。  相似文献   
446.
Alex Neads 《战略研究杂志》2019,42(3-4):425-447
Military capacity building (MCB) is as problematic as it is ubiquitous, with the British experience in Sierra Leone providing a rare example of ostensible success. This article critiques the dominant conceptualisation of MCB as purely a principal–agent (PA) problem, using military change scholarship to examine the impact of wartime British intervention on the Sierra Leonean armed forces. Here, indigenous military change was both externally driven and fundamentally adaptive in nature, allowing MCB to bypass some of the difficulties predicted by PA models. However, this adaptive approach nonetheless failed to reconcile Western military values with prevailing Sierra Leonean culture, complicating post-war stabilisation efforts.  相似文献   
447.
Given the advances made in conventional weapon capabilities, precision should by now be the accepted and expected norm in cyberspace as well. In this article I argue that developing precision cyber weapon systems, to be used during a lawful conflict, can be an important part of a responsible national security strategy to reduce the amount of violence and physical destruction in conflicts. I first describe a precision cyber weapon system in a military context. I then present three compelling rationales for the development of precision cyber weapon systems based on ethical, operational, and financial considerations. To support the position, I address several arguments that have been levied against their development. Thereafter I present several recommendations for a way ahead.  相似文献   
448.
This article discusses roles and missions of the United States Navy with a particular focus on the Baltic Sea. That particular sea has gained renewed political and military attention following Russia's resurgent and increasingly hybrid-offensive foreign policy. Baltic nations, uncertain of what the future holds, ought to look at sea power and maritime missions in the Baltic, as well as US naval presence in Europe, to draw lessons for future posture.  相似文献   
449.
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.  相似文献   
450.
ABSTRACT

German security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号