首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   459篇
  免费   23篇
各国政治   52篇
工人农民   41篇
世界政治   44篇
外交国际关系   22篇
法律   149篇
中国政治   4篇
政治理论   151篇
综合类   19篇
  2023年   2篇
  2022年   3篇
  2021年   4篇
  2020年   5篇
  2019年   10篇
  2018年   8篇
  2017年   10篇
  2016年   12篇
  2015年   14篇
  2014年   9篇
  2013年   95篇
  2012年   10篇
  2011年   11篇
  2010年   10篇
  2009年   13篇
  2008年   23篇
  2007年   11篇
  2006年   9篇
  2005年   12篇
  2004年   10篇
  2003年   15篇
  2002年   14篇
  2001年   13篇
  2000年   6篇
  1999年   12篇
  1998年   10篇
  1997年   10篇
  1996年   6篇
  1995年   6篇
  1994年   6篇
  1993年   4篇
  1992年   6篇
  1991年   7篇
  1990年   3篇
  1989年   12篇
  1988年   7篇
  1987年   5篇
  1986年   8篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   3篇
  1981年   4篇
  1980年   6篇
  1979年   4篇
  1977年   3篇
  1976年   3篇
  1974年   3篇
  1971年   2篇
  1970年   3篇
排序方式: 共有482条查询结果,搜索用时 15 毫秒
421.
422.
This article will first review the essential characteristics of the old exceptionalism in US foreign policy, then compare it with the specific features of the new strategy of the Bush administration and finally address the challenges and risks that this enterprise entails. The article provides an analysis of realist and liberal critiques of the Bush administration's foreign policy in terms of both objectives and results. It concludes that the war in Iraq constituted a truly imperial moment in US history. Preventive war is a flawed strategy, which runs against US principles in world affairs and against its security interests in the current international environment. For this reason, Bush's imperial policy will not last. The author writes here in a personal capacity, and not in the name of the European Union Institute for Security Studies.  相似文献   
423.
424.
425.
426.
427.
Generally, traces of Internet communications established by a citizen's computer are routinely recorded on and dated by Internet servers in so‐called ‘log files’. As far as the correct dating of the electronic offence is crucial for the potential identification of the author, convincing traces need to be date‐ and time‐stamped by a Trusted Third Party (TTP). Such a time stamp does not give any assurance about the correctness of the data and dates collected, but only proves that the traffic data were in a given state at a given date and time. If the Internet Provider (IP) address appears to be one used by the company, it is foreseeable that the system administrator within the company will be able to identify the computer owning a particular IP address. In others cases, only law enforcement agencies, in the circumstances and the conditions required by the law, are entitled to identify, with the help of Internet Access Providers (IAPs), the communication line suspected to have been used beside a given IP address. Putting together the traces left at the IAP side and in the log files of the attacked server site may lead, in the best cases, to an identified communication terminal. Nevertheless, in many cases, this will not be a formal authentication of a wrongdoer.  相似文献   
428.
Access to quality health care for victims of abuse is often limited by the attitudes of health care professionals. Data collected from female nursing students (n = 155) revealed that those students with more egalitarian sex-role beliefs and a greater sense of control over life events were more sympathetic to battered women than those students with more traditional sex-role attitudes and less perceived control. Sex-role egalitarianism was found to be the best predictor of attitudes toward victims of domestic violence. Implications for health care practitioners and policy makers are presented.  相似文献   
429.
430.
VICTORIAN STATUTORY CORPORATIONS IN THE 1980s   总被引:1,自引:0,他引:1  
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号