File:NLC416-12jh005022-44617 從歷史和軍事觀點評論日寇侵華戰略.pdf
Original file (795 × 1,427 pixels, file size: 1.22 MB, MIME type: application/pdf, 33 pages)
Captions
Summary[edit]
從歷史和軍事觀點評論日寇侵華戰略 ( ) | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Author |
楊傑著 |
|||||||||||||||||||||||
Title |
從歷史和軍事觀點評論日寇侵華戰略 |
|||||||||||||||||||||||
Publisher |
[出版者不詳] |
|||||||||||||||||||||||
Description |
本書評論了日寇侵華的16個戰略:「從蠶食式戰略到函數式戰略」、「日本大陸政策,意在滅亡中國」、「唯恐中國不亂,冀圖趁火打劫」、「三次出兵山東阻止北伐大業」、「荒木式的梯次躍進」、「以誘降為中心的假鯨吞式戰略」、「誘降之術失敗,製造傀儡組織」、「平沼的置藩式戰略」、「無法曲解主義日寇命運悲慘」、「日閥嚴重危機在於經濟貧乏」、「阿部米內合演的傀儡戰」、「敵圖利用漢奸迷惑無知愚民」、「中國抗戰意志益形堅強」、「近衛的新戰略」、「到處碰壁黔驢技窮」。曾發表於1942年7月7日重慶時事新報 無目錄 |
|||||||||||||||||||||||
Language | Chinese | |||||||||||||||||||||||
Publication date | [1942] | |||||||||||||||||||||||
Source |
institution QS:P195,Q732353
(民國時期文獻 民國圖書) |
|||||||||||||||||||||||
館藏信息 InfoField | MG/E313.9/16 | |||||||||||||||||||||||
主題 InfoField | 侵華-戰略 戰略-侵華 | |||||||||||||||||||||||
中圖分類 InfoField | E313.9 | |||||||||||||||||||||||
載體形態 InfoField | 30頁 |
Licensing[edit]
This image is in the public domain because it is a mere mechanical scan or photocopy of a public domain original, or – from the available evidence – is so similar to such a scan or photocopy that no copyright protection can be expected to arise. The original itself is in the public domain for the following reason:
This tag is designed for use where there may be a need to assert that any enhancements (eg brightness, contrast, colour-matching, sharpening) are in themselves insufficiently creative to generate a new copyright. It can be used where it is unknown whether any enhancements have been made, as well as when the enhancements are clear but insufficient. For known raw unenhanced scans you can use an appropriate {{PD-old}} tag instead. For usage, see Commons:When to use the PD-scan tag. Note: This tag applies to scans and photocopies only. For photographs of public domain originals taken from afar, {{PD-Art}} may be applicable. See Commons:When to use the PD-Art tag. |
This image contains digital watermarking or credits in the image itself. The usage of visible watermarks is discouraged. If a non-watermarked version of the image is available, please upload it under the same file name and then remove this template. Ensure that removed information is present in the image description page and replace this template with {{Metadata from image}} or {{Attribution metadata from licensed image}}.
Caution: Before removing a watermark from a copyrighted image, please read the WMF's analysis of the legal ramifications of doing so, as well as Commons' proposed policy regarding watermarks. If the old version is still useful, for example if removing the watermark damages the image significantly, upload the new version under a different title so that both can be used. After uploading the non-watermarked version, replace this template with{{Superseded|new filename|version without watermarks}} .Bahasa Indonesia ∙ italiano ∙ eesti ∙ sicilianu ∙ Deutsch ∙ català ∙ magyar ∙ čeština ∙ română ∙ español ∙ português ∙ English ∙ hrvatski ∙ Plattdüütsch ∙ français ∙ Nederlands ∙ polski ∙ galego ∙ slovenščina ∙ suomi ∙ svenska ∙ Ελληνικά ∙ беларуская (тарашкевіца) ∙ български ∙ македонски ∙ русский ∙ українська ∙ മലയാളം ∙ ไทย ∙ 日本語 ∙ 中文 ∙ 中文(简体) ∙ 中文(繁體) ∙ עברית ∙ العربية ∙ فارسی ∙ +/− |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 10:58, 11 June 2023 | 795 × 1,427, 33 pages (1.22 MB) | PencakeBot (talk | contribs) | Upload 從歷史和軍事觀點評論日寇侵華戰略 (1/1) by 楊傑著 (batch task; nlc:data_416,12jh005022,44617; 民國圖書.7; 從歷史和軍事觀點評論日寇侵華戰略) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Conversion program | Foxit GSDK - Foxit Software Inc. |
---|---|
Encrypted | no |
Page size |
|
Version of PDF format | 1.7 |