首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   254篇
  免费   11篇
  国内免费   10篇
  2021年   1篇
  2020年   14篇
  2019年   24篇
  2018年   24篇
  2017年   27篇
  2016年   20篇
  2015年   3篇
  2014年   27篇
  2013年   66篇
  2012年   8篇
  2011年   5篇
  2010年   7篇
  2009年   6篇
  2008年   4篇
  2007年   5篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   3篇
  2001年   4篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有275条查询结果,搜索用时 0 毫秒
151.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
152.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
153.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
154.
Irrespective our views on the rationality of our opponent's continuing to conduct operations against us, unless utterly extirpated, he retains a vote on when and how conflict will end. This is because war is about power — compelling another actor to do something he would not otherwise do, or to cease doing something he would otherwise prefer to do. In planning for conflict termination we should account for the peculiarities of opponents who may decide not to quit when we have beat them fair and square. We do not desire that they cease conventional fighting, but that they cease fighting altogether.  相似文献   
155.
A nation's structure and culture of civil-military relations are important and largely overlooked factors in explaining the performance of armed forces involved in complex expeditionary operations. The US model of ‘Huntingtonian’, divided civil-military structures and poor interagency cooperation, makes the US military less suited for complex expeditionary operations. British civil-military relations involve a Defence Ministry that conscientiously integrates military and civilian personnel, as well as extensive interagency cooperation and coordination. This ‘Janowitzean’, integrated form of civil-military relations makes the British military more likely to provide for the planning and implementation of comprehensive campaigns that employ and coordinate all instruments of power available to the state, as well as troops in the field displaying the flexibility and cultural and political understanding that are necessary in complex expeditionary operations.  相似文献   
156.
This article assesses the existing literature on logistics in war, concluding that there is no satisfactory conceptual definition of logistics. It proposes a concept of logistics derived from Clausewitz's theory of war to fill that void. This is presented as a derivation because Clausewitz's distinction between (1) the use of the fighting forces (tactics and strategy) and (2) all other activities in war that were required so that forces could be taken as a given. The latter, left unnamed by Clausewitz, corresponds to a concept of logistics that proves to be an analytical peer to Clausewitz's categories of politics, tactics and strategy.  相似文献   
157.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   
158.
The strategy of ‘winning hearts and minds’ is considered key to successful counterinsurgency, but it often works at the expense of political control over the course of war. This happens when the strategy requires the counterinsurgent to work with a local nationalist group that takes advantage of its lack of access to civilians. This exposes the counterinsurgent to a dilemma inherent in the strategy; because working with the group is a crucial part of the strategy, victory would be impossible without it. Yet when the strategy is implemented through the group, it compromises the policy it serves. I show how this dilemma undermined British political control during the Malayan Emergency.  相似文献   
159.
160.
Counterinsurgency is often characterized by large numbers of small fire-fights interspersed with a few larger battles. Heavy firepower contributes to the outcome of the larger battles but the smaller contacts are often fought by infantry without heavy weapons support. Infantry combat performance in these fire-fights is therefore a key concern. It has been fashionable to discuss soldier combat performance in terms of ‘firers’, ‘non-firers’, and ‘posturers’, but we argue that other factors have a greater impact. We provide a detailed statistical analysis of a selection of combat factors, using combat data collected by the 1st Australian Task Force (1ATF) during the Vietnam War. An accepted measure of soldier lethality is the ‘shots per casualty’ ratio. Using this measure we are now able to describe the combat performance of the Australian infantry section in Vietnam in much greater detail than has hitherto been possible.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号