首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   153篇
  免费   2篇
  国内免费   1篇
  2021年   1篇
  2020年   2篇
  2019年   11篇
  2018年   9篇
  2017年   20篇
  2016年   14篇
  2015年   4篇
  2014年   12篇
  2013年   55篇
  2012年   7篇
  2011年   6篇
  2010年   12篇
  2009年   1篇
  2008年   1篇
  1990年   1篇
排序方式: 共有156条查询结果,搜索用时 15 毫秒
1.
Assessing missile defence through the prism of offence–defence theory requires primarily an examination of legal and structural constraints on future development. New weapons technology is frequently cited as having the most critical impact on the offence–defence balance. Yet, the method for assessing the introduction of a new weapons technology tends to neglect projected maturity and instead focus excessively on the initial rudimentary capabilities. It is argued here that the North Atlantic Treaty Organisation’s (NATO’s) missile defence is set to incrementally become more advanced in terms of quality, quantity and mobility, which is supported by a strategy that is increasingly favouring offence. As the system gradually enhances the offensive advantage vis-à-vis Russia, NATO categorically rejects any legal or structural constraints on future deployments.  相似文献   
2.
杨未强  李荧  宋锐  何锋 《国防科技》2018,39(5):086-090
美国空军研究实验室是一个在空中、太空和网络空间领域处于全球领先地位的科研机构,承担着美国空军国防高技术项目的规划、管理和实施工作,是美国空军保持技术优势的重要研究力量。本文剖析了美国空军实验室的使命任务、组织管理和科研规划,总结了实验室在人才培养和科研任务制定方面的经验和方法。  相似文献   
3.
结合笔者工作实践,对武警部队实施财务信息化管理的现状和问题进行了简要归纳和总结,并着重对武警部队如何顺利推进财务管理信息化提出了建议和意见。  相似文献   
4.
反恐情报保障是反恐行动的重要组成部分和决策依据。针对新疆边境地区情报力量建设较弱、情报保障手段单一、与有关部门缺乏有效的交流机制等问题,公安边防部门应采取加强情报力量建设、完善情报保障机制、充分利用各种情报手段和加强情报交流与合作等有效措施,不断提高反恐情报保障能力,掌握反恐怖斗争的主动权。  相似文献   
5.
通过对2005~2009年《武警学院学报》5年间的载文、作者及引文情况进行统计分析,研究其载文量、栏目设置以及著者、发文地区和著者系统分布,并统计出合作度、合作类型、引文量、篇均引文数、引文语种及引文类型等,以期描述学报在改为月刊后的出版状况,从中发现一些带有规律性的问题,并客观评价其办刊特色,为刊物的进一步发展及相关学科动向提供理论依据。  相似文献   
6.
在最新颁布实施的《中华人民共和国人民武装警察法》中,共有3条6处规定了武警部队在执行国内安全保卫任务时对其他机关的“协助”,但是这些协助性任务的性质并不是很明确。本文通过对行政协助构成关键点的剖析,探究该法律中的“协助”是否是真正意义上的行政协助。  相似文献   
7.
在新形势下,学院要按照第十五次全军院校会议和武警总部党委的指示精神,扎实推进任职教育取得新成绩,就要认真总结学院任职教育的经验,找出存在的不足,通过准确把握任职教育的本质,深化对任职教育的研究,增强使命意识,真抓实干,加快学院任职教育教学改革步伐,推进任职教育创新发展。  相似文献   
8.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
9.
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners..  相似文献   
10.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号