全文获取类型
收费全文 | 930篇 |
免费 | 11篇 |
专业分类
各国政治 | 25篇 |
工人农民 | 67篇 |
世界政治 | 28篇 |
外交国际关系 | 461篇 |
法律 | 310篇 |
中国政治 | 3篇 |
政治理论 | 44篇 |
综合类 | 3篇 |
出版年
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 17篇 |
2019年 | 11篇 |
2018年 | 16篇 |
2017年 | 17篇 |
2016年 | 11篇 |
2015年 | 13篇 |
2014年 | 51篇 |
2013年 | 102篇 |
2012年 | 70篇 |
2011年 | 83篇 |
2010年 | 66篇 |
2009年 | 86篇 |
2008年 | 49篇 |
2007年 | 47篇 |
2006年 | 46篇 |
2005年 | 50篇 |
2004年 | 52篇 |
2003年 | 53篇 |
2002年 | 45篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 5篇 |
1982年 | 5篇 |
1981年 | 2篇 |
1977年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有941条查询结果,搜索用时 0 毫秒
71.
Deborah D. Avant Author Vitae 《Orbis》2006,50(2):327-342
Images of private forces in Iraq—killed and mutilated in Fallujah, implicated in prisoner abuse at Abu Ghraib, and shooting up civilian vehicles—have provided a dramatic illustration of the role private security companies (pscs) now play in U.S. military operations. Though the United States’ use of contractors on the battlefield is not entirely new, the increased number of contractors deployed and the use of private security forces to perform an escalating number of tasks has created a new environment that poses important trade-offs for U.S. policy and military effectiveness and for U.S. relations with other states. This article outlines the history of U.S. contractors on the battlefield, compares that with the use of private security in Iraq, discusses the benefits and risks associated with their use, and proposes some trade-offs that decision-makers in the United States should consider while contemplating their use in the future. 相似文献
72.
73.
74.
The implementation of similar mass privatization programs in the Czech Republic and Bulgaria led to the emergence of hybrid voucher funds. The contradictions stemming from this hybrid nature gave rise to the evolution of the funds' nature and of their place in the national ownership structure. The dynamics of this evolution is apprehended through a comparative study of the portfolios of a sample of funds between 1998 and 2000. We show how the interaction between the strategies of economic actors have shaped two transformation paths of the initial funds: holding companies on one hand and more ordinary collective investment vehicles on the other, the Czech and Bulgarian evolutions being divergent. We also discuss to what a degree these mutations bring these funds closer to Western-type institutional investors, showing that there is some convergence, but also the emergence of original forms. 相似文献
75.
76.
77.
78.
79.
80.
Ida Madieha AzmiAuthor Vitae 《Computer Law & Security Report》2011,27(4):394-401
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics. 相似文献