首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   800篇
  免费   0篇
各国政治   3篇
工人农民   29篇
世界政治   3篇
外交国际关系   488篇
法律   240篇
中国政治   12篇
政治理论   19篇
综合类   6篇
  2020年   3篇
  2018年   5篇
  2017年   3篇
  2016年   2篇
  2015年   2篇
  2014年   43篇
  2013年   75篇
  2012年   57篇
  2011年   96篇
  2010年   63篇
  2009年   78篇
  2008年   66篇
  2007年   47篇
  2006年   42篇
  2005年   41篇
  2004年   56篇
  2003年   52篇
  2002年   38篇
  2001年   2篇
  2000年   2篇
  1999年   3篇
  1998年   1篇
  1997年   5篇
  1995年   2篇
  1994年   5篇
  1993年   3篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1982年   1篇
排序方式: 共有800条查询结果,搜索用时 31 毫秒
741.
742.
743.
744.
President Bush's surge strategy intends to use the might of the U.S. military to establish secure conditions in Iraq under which the promise of political progress will be realized. The U.S. military used this approach in the past when the U.S. Fallujah Offensive of late 2004 established security for the Iraqi Election Cycle in 2005. But the promise of political progress for insurgents was not fulfilled in 2006 upon formation of the Maliki government, and they resorted to extreme levels of violence in response, killing 1,080 U.S. troops during the 12 months ending September 2007, more than in any other comparable period. In the second half of Year 5, from September 2007 through the fifth anniversary of the war on March 19, 2008, U.S. forces in cooperation with Sunni insurgents and Shiite militias helped improve security conditions once again. But unless the surge's promise of political progress is fulfilled, the patience of the insurgents and militias is likely to dissipate and violence will increase once again in Year 6.  相似文献   
745.
There is little disagreement in Washington that the United States is losing the so-called Battle of Ideas, and there is a surprising consensus on what needs to be done: “reach out” to Muslim moderates. Bolstering moderate voices in the Muslim world is indeed crucial to the fate of the War on Terror, but “reaching out” to them is no solution. In fact, it is the last thing Muslim moderates need, since it deepens their legitimacy problems. The West's criticism may do more to help Muslim moderates become a political force to be reckoned with than its love ever could. This “cruel to be kind” rhetorical strategy can, and should, be combined with open material support for Arab and Muslim civil society, but crucially without regard to political orientation. Such a policy has its drawbacks and it will be a difficult sell, but it is the only way to make progress in the Battle of Ideas.  相似文献   
746.
747.
The outcome of ongoing debates over the future of American military strategy will play a critical role in shaping the foreign and military policies of the United States over the next decade. Traditionalists worry about the shift towards emphasizing counterinsurgency (COIN) operations and irregular warfare, believing that the use of force is often ineffective in COIN situations and the American military should concentrate on planning for conventional war. In contrast, COIN advocates argue that the United States must focus its efforts on preparing for the wars it is most likely to fight, irregular wars. However, both schools of thought rely on assumptions about the future security environment that may reveal another path forward. First, although it seems intuitive to view irregular warfare as the dominant future concern, it is exceedingly difficult to predict accurately the future security environment, as the last 20 years have clearly shown. Second, and perhaps most importantly, the character of emergent threats will depend on how the United States focuses its resources. Paradoxically, no matter what it emphasizes, the military threats the United States is or will be most capable of defeating are the ones it is least likely to face, since potential adversaries will be deterred and seek other ways of confrontation. However, with some smart and careful investments, including the recognition that not all parts of the military have to be optimized for the same task, the United States military can both lock in its conventional dominance and continue to improve its ability to succeed in the irregular wars most likely to dominate the landscape in the short to medium term.  相似文献   
748.
The United States has been negotiating with North Korea in an effort to have it renounce its nuclear program for over a decade, since Washington negotiated an Agreed Framework in 1994. In this time, North Korea has only amassed more plutonium. The negotiations are hindered by mutual distrust and hostility, but it is doubtful whether any change in Washington's attitude toward the dprk would help solve the nuclear issue. It is the Kim regime that is the core problem. Until the regime is removed, there can be no durable peace in the region. This article suggests that with the prospect for a negotiated resolution of the nuclear issue remote, and since any attempt to remove the Kim regime militarily would entail huge costs, Washington might consider a third option: directly engaging the North Korean people.  相似文献   
749.
New international order is a worldwide topic under unceasing discussion. It is related to a complex array of issues. People have consensus as well as differences about it. Our understanding about the new international order is also constantly changing and deepening.  相似文献   
750.
Wireless local area networks (WLANs) have enjoyed a rapid increase in usage in recent years. WLANs serve to connect users to the Internet by means of radio or infrared frequencies. The rise in WLAN usage has however served to highlight some of the inadequacies of the present laws governing unauthorised access to WLANs. At present, the legislation serves to make unauthorised access, modification or impairment of electronic communications illegal. It is clear that the provisions prohibit the hacking of computer systems and denial of service attacks. However, it is unclear whether the legislation extends to additional forms of unauthorised access such as wardriving (using software to identify and map freely available WLAN) and joyriding (accessing a network with no further damage to the connection). The liability of Internet Service Providers and those engaged in unauthorised access in public places also remains unclear. Finally, the relationship of the offence of unauthorised access to the tort of trespass and the laws of copyright remain untested. The objective of this paper is to consider the measures necessary to increase the effectiveness of WLAN laws. The paper will begin by considering the nature of WLAN technology and the policy discourse to date. This will be followed by an examination of the present Australian law and an identification of areas of uncertainty. Finally, the paper will consider the measures required to enhance the certainty and effectiveness of the laws governing unauthorised access to WLAN.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号