首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   189篇
  免费   2篇
  国内免费   2篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   4篇
  2018年   7篇
  2017年   17篇
  2016年   13篇
  2015年   8篇
  2014年   20篇
  2013年   89篇
  2012年   4篇
  2011年   8篇
  2010年   14篇
  2009年   2篇
  2008年   2篇
  2005年   1篇
  1991年   1篇
排序方式: 共有193条查询结果,搜索用时 468 毫秒
1.
结合笔者工作实践,对武警部队实施财务信息化管理的现状和问题进行了简要归纳和总结,并着重对武警部队如何顺利推进财务管理信息化提出了建议和意见。  相似文献   
2.
杨未强  李荧  宋锐  何锋 《国防科技》2018,39(5):086-090
美国空军研究实验室是一个在空中、太空和网络空间领域处于全球领先地位的科研机构,承担着美国空军国防高技术项目的规划、管理和实施工作,是美国空军保持技术优势的重要研究力量。本文剖析了美国空军实验室的使命任务、组织管理和科研规划,总结了实验室在人才培养和科研任务制定方面的经验和方法。  相似文献   
3.
ABSTRACT

Recent nuclear-weapons-related consultation in NATO within the framework of the Defence and Deterrence Posture Review sheds light on historical experiences with nuclear consultation in NATO. In the early years of the Nuclear Planning Group (NPG), which became the main forum for multilateral nuclear consultation in the alliance, developing a nuclear weapons first use doctrine was of particular importance. This process led to the adoption of the Provisional Political Guidelines (PPGs) on the threat to initiate the use of nuclear weapons. With a focus on West Germany as the primary addressee of the NPG, it will be postulated that nuclear consultation functioned and may still be seen as an essential tool to manage the credibility of US extended nuclear deterrence in the framework of NATO.  相似文献   
4.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   
5.
通过对2005~2009年《武警学院学报》5年间的载文、作者及引文情况进行统计分析,研究其载文量、栏目设置以及著者、发文地区和著者系统分布,并统计出合作度、合作类型、引文量、篇均引文数、引文语种及引文类型等,以期描述学报在改为月刊后的出版状况,从中发现一些带有规律性的问题,并客观评价其办刊特色,为刊物的进一步发展及相关学科动向提供理论依据。  相似文献   
6.
在最新颁布实施的《中华人民共和国人民武装警察法》中,共有3条6处规定了武警部队在执行国内安全保卫任务时对其他机关的“协助”,但是这些协助性任务的性质并不是很明确。本文通过对行政协助构成关键点的剖析,探究该法律中的“协助”是否是真正意义上的行政协助。  相似文献   
7.
在新形势下,学院要按照第十五次全军院校会议和武警总部党委的指示精神,扎实推进任职教育取得新成绩,就要认真总结学院任职教育的经验,找出存在的不足,通过准确把握任职教育的本质,深化对任职教育的研究,增强使命意识,真抓实干,加快学院任职教育教学改革步伐,推进任职教育创新发展。  相似文献   
8.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
9.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
10.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号