全文获取类型
收费全文 | 740篇 |
免费 | 10篇 |
专业分类
各国政治 | 16篇 |
工人农民 | 20篇 |
世界政治 | 5篇 |
外交国际关系 | 453篇 |
法律 | 204篇 |
中国政治 | 4篇 |
政治理论 | 48篇 |
出版年
2022年 | 1篇 |
2020年 | 2篇 |
2019年 | 6篇 |
2018年 | 11篇 |
2017年 | 12篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 40篇 |
2013年 | 73篇 |
2012年 | 58篇 |
2011年 | 92篇 |
2010年 | 59篇 |
2009年 | 73篇 |
2008年 | 37篇 |
2007年 | 38篇 |
2006年 | 40篇 |
2005年 | 45篇 |
2004年 | 46篇 |
2003年 | 45篇 |
2002年 | 38篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1977年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有750条查询结果,搜索用时 15 毫秒
21.
This article contends that it is time for the armed forces to revisit their schools, day rooms, wardrooms, squadron meeting places, headquarters, bases and posts to increase the level of awareness and the teaching of professional norms. 相似文献
22.
Anthony N. CelsoAuthor Vitae 《Orbis》2014,58(2):229-247
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout. 相似文献
23.
W. Andrew TerrillAuthor Vitae 《Orbis》2014,58(3):429-440
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support. 相似文献
24.
Andrew JointAuthor Vitae Edwin Baker Author Vitae 《Computer Law & Security Report》2011,27(4):407-415
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements. 相似文献
25.
26.
The adage that “it is always easier to fight the last war” is one that readily can be applied to the United States and its armed forces for not predicting the scale and type of operations encountered in the occupations of Iraq and Afghanistan. This article argues that the lack of preparation in the post-invasion phases arose from an institutional attachment to a preferred paradigm of warfare, as exemplified by the Persian Gulf War of 1991. This paradigm, though, has been substantially resurrected and re-configured to suit the fighting preferences of the American armed forces in its protracted encounters in Iraq and Afghanistan. Far from re-orienting its organization and mindset to meet the challenges of so-called counterinsurgency campaigns, as much current advocacy maintains, the military has reverted to the form of warfare it knows best. 相似文献
27.
This article explores the experiences of a small number of older women who work in university departments of education. The article starts with a brief review of some of the research that documents the experiences of women who work in departments of education. The article then considers the ways in which the older woman's body has become a focus for action, suppression and, above all, a site for constant work. Women are exhorted by the mass media to be vigilant in order to combat the embodied signs of passing time and to work on the project of the (ageing) body. The article then explores some of the ways that older women in education departments may be positioned/position themselves in relation to these pressures and some of the ways in which they disrupt these discourses. 相似文献
28.
Dominic Höglinger 《Swiss Political Science Review》2008,14(2):207-243
Dieser Aufsatz untersucht den Einfluss politisch‐institutioneller Kontextfaktoren auf die Artikulationschancen politischer Akteure in der Öffentlichkeit. Als empirische Grundlage dient eine Inhaltsanalyse der Schwangerschaftsabbruchdebatte in der Schweiz im Vergleich mit Deutschland und den USA über einen Zeitraum von drei Jahrzehnten. Es wird aufgezeigt, dass institutionell bedingte Machtdifferentiale ‐ vermittelt über mediale Selektionslogiken ‐ in hohem Masse die öffentliche Präsenz der Akteure, ihr mediales Standing, bestimmen. Dies benachteiligt insbesondere zivilgesellschaftliche Herausforderer, wie etwa soziale Bewegungen. Direktdemokratische Verfahren, so wird weiter argumentiert, wirken in der Schweiz diesem Effekt jedoch entgegen, indem sie den Aussenseitern Möglichkeiten zur Profilierung und Etablierung bieten. Davon profitieren ebenfalls die Parteien, welchen in der Schweiz ansonsten eine schwache institutionelle Stellung attestiert wird. Mit seinen Ergebnissen stützt der Aufsatz schliesslich die Forderung nach einer Kontextualisierung politischer Kommunikationsforschung im Sinne eines “institutional turn” und zeigt das Potenzial einer komparativen Vorgehensweise auf. 相似文献
29.
30.
Steven Grogan Author Vitae 《Orbis》2009,53(4):685-704
This article outlines Chinese strategic nuclear forces and the Chinese philosophical approach to nuclear security. It then focuses on the domestic conditions in China which could precipitate vulnerabilities to its nuclear forces. From information about internal security conditions in China, specific internal threats to Chinese nuclear security will be derived. Based on these threats, several outsider and insider scenarios will be outlined involving a variety of terrorist or terrorist related behaviors. These notional scenarios will include everything from overrun or attack, to diversion, to cyber terrorism, to sabotage. The article will then cover what these scenarios and the possible Chinese reaction to them may mean for the security, military and diplomatic strategies of the United States. 相似文献