Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl
Ograniczanie wyników
Czasopisma help
Lata help
Autorzy help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2097

Liczba wyników na stronie
first rewind previous Strona / 105 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  security
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 105 next fast forward last
EN
The vast array of responsibilities assigned to local self-government include also public security. This is all the more important as it must be ensured at every tier of administration, including in the regions. The local self-government, as the basic form of decentralised public administration, is situated closest to citizens and is therefore most responsive to their needs, with security needs being fundamental needs that must be addressed on a continuous basis. The jurisdiction of local and regional government bodies in the field of public security concerns many areas, but it is the local government which holds most of these responsibilities while the regional government is entrusted with less responsibility in this matter. This characteristic covers the institution of emergency states, crisis management, or issuing public order regulations.
3
100%
EN
Air transportation as a fast-growing transport mode provides the constantly innovating constructions. Security is an integral factor in determining the movement of the aircraft. The paper contains an analysis of landing operations including emergency states. Describes the flight rules with inoperative engine. All these parameters have a direct impact on ensuring safety of passengers and crew members.
EN
In this paper the architecture of system managing security of scattered computer resources is presented. The maine functions of monitoring module are characterized, also its model and implementation is presented.
EN
In this article, the author analyses types of Europeanisation: top-down, bottom-up, horizontal, circular, and looks at Latvian involvement in the EU CSDP capability project - EU Battlegroups. Additionally, the author analyses the EU CSDP strategies in 2003 and 2016 with emphasis on key threats and key directions of action for the security of the EU. If it is necessary, EU Battlegroups can become involved to secure the EU. In the article, the author examines Latvian involvement in EU Battlegroups and changes in political planning documents and legal acts regarding EU Battlegroups. The author shows that for the future, it is necessary to involve an EU Battlegroup in real action in the area of operations, and that it is necessary to initiate discussions on a possible review and evaluation of the format of the EU Battlegroup.
EN
Information security is one of the essential issues in contemporary computer systems. One of the main risks appearing in the networks is to obtain the access to the transmitted data. There is no data encryption mechanism in the TCP/IP protocol standard. The SSL protocol is one of the known method to ensure the security of the transmitted data. Employing the SSL protocol is the universally accepted tool to grant security in the computer management systems. This paper deals with the influence of using the SSL protocol on the response time to the query sent to the computer management system by a user located in The Wide Area Network. The results of the measurement in the real environment are presented.
PL
Bezpieczeństwo przesyłania informacji jest jednym z ważniejszych zagadnień we współczesnych systemach komputerowych. Jednym z podstawowych zagrożeń występujących w sieci jest uzyskanie dostępu do przesyłanych danych przez osoby niepowołane. Protokół TCP/IP nie zawiera w standardzie żadnych mechanizmów szyfrowania danych. Jednym z powszechnie stosowanych mechanizmów zwiększających bezpieczeństwo przesyłania danych jest protokół SSL służący do bezpiecznej transmisji zaszyfrowanego strumienia danych. SSL, jest protokołem typu klient serwer umożliwiającym nawiązanie bezpiecznego połączenia z użyciem certyfikatów i będącym powszechnie stosowanym narzędziem zwiększającym bezpieczeństwo systemów wspomagających zarządzanie. W artykule przedstawiono wyniki przeprowadzonych eksperymentów, których celem było oszacowanie wpływu mechanizmów zwiększających bezpieczeństwo przesyłania informacji na czas odpowiedzi systemu wspomagającego zarządzanie w sieci rozległej. Badania przeprowadzono pomiędzy stacją klienta znajdującą się w niezależnej sieci lokalnej posiadającej własne łącze internetowe i systemem wspomagającym zarządzanie (Fig. 4), przy zastosowaniu protokołu SSL w wersji 3.1 algorytmu szyfrowania RSA z kluczem asymetrycznym o długości 1024 bity. Zastosowanie protokołu SSL, jako mechanizmu bezpiecznego przesyłania danych w systemie wspomagającym zarządzanie, powoduje nieznaczne wydłużenie czasu transmisji danych (Fig. 5, 6). Stosunkowa niewielka różnica pomiędzy tymi wartościami, skłania jednak do pewnych refleksji. Użycie protokołu SSL, w sposób oczywisty, powinno wydłużyć czas transmisji danych. Sam sposób nawiązywania połączenia, podczas którego następuje przesłanie między innymi certyfikatu serwera, klucza publicznego serwera oraz klucza sesji, powoduje konieczność przesłania większej liczby informacji, niż ma to miejsce w przypadku zwykłego połączenia TCP. Wszystkie przesyłane informacje są szyfrowane z użyciem klucza sesji, co powoduje zwiększone użycie zasobów serwera. Zapytania klientów do systemu wspomagającego zarządzanie badanego obiektu najczęściej powodują przesłanie od 500 kB do 2,5 MB (do przypadku zastosowania algorytmu SSL w konkretnym systemie wspomagającym zarządzanie).
7
80%
EN
Background: Border protection is an extremely important area in ensuring the national security of each country. Objectives: The purpose of this article is to show the role of the Polish Border Guard in the area of Poland’s national security. The Border Guard in Poland is responsible for ensuring state security and responding to emerging threats using available methods and tools. Methods: To identify the role of the Border Guard in maintaining state security, an analysis of the literature on the subject was made. Results: The role of the Border Guard in ensuring state security is extremely important. Conclusions: Today, security issues have become very important both from the point of view of the individual and the country.
8
Content available The power and the security – Selected issues
80%
EN
In this article, the author presents some common areas for the categories of power and security. Diagnosis of the security environment of a political unit should include both A qualitative and quantitative approach to the assessment of its power and that of neighbouring countries. Such comparisons of balance of power between the countries give the security assessment a broader range. it may be used, in addition, by design for the foreign and security policy of a state.
9
Content available Hidden message techniques in e-commerce
80%
EN
The rapid growth in e-commerce applications via the Internet in recent decades is the reason why both small office and corporation users have a need to protect their data transactions through the Internet. These data transactions include sensitive document transfer, digital signature authentication and digital data storage. The use of digital steganography for information security in various e-commerce applications through the Internet are discussed in detail in this article. These applications include digital signature authentication and validation of electronic documents, digital data storage as well as secure communication of multimedia data through the open channels.
EN
The study presents information on the legislation on the cybersecurity system in selected European Union countries. The discussed laws in force in individual countries implement the NIS Directive concerning measures for a high common level of security of network and information systems across the Union. The NIS Directive specifies the institutions that should be established in all Member States; it regulates cooperation at the European level and imposes obligations in the field of network and information systems security, including the duty to adopt a national strategy on the security of network and information systems.
11
80%
EN
The article discusses the subject of security department officers and their impact on security in penitentiary establishments. It presents both the definitions of the security of the penitentiary unit, but also the analysis of the occurring events (disturbances) in their area. When characterizing the security department, many elements were taken into account, i.e. working time of officers, place of service, type of duties. Security department officers play an important role in the security of the penitentiary establishment.
EN
Security is one of the most appreciated values in the social and individual dimension. Ensuring public security of a given society is an essential condition for the development of both individuals and the state understood as an organized group of individuals. Every citizen has a constitutionally guaranteed right to their behavior. The Constitution also recognized the independence, the territorial integrity of the state and the inviolability of borders as the supreme value. Poland as a sovereign and democratic Member State of the UN, OSCE, NATO and the EU adopted the stable and continuous national security as a priority objective.
13
Content available Katastrofy budowlane zaistniałe w Polsce w 2013 r
80%
PL
W referacie przedstawiono wyniki, dokonanej w Głównym Urzędzie Nadzoru Budowlanego, analizy katastrof budowlanych, które wystąpiły w Polsce w 2013.
EN
In this paper presents the results, which were made in the General Office of Building Control, analysis construction disasters, that have occurred in Poland in 2013.
14
Content available remote Distributed Intrusion Detection Systems – MetalDS case study
80%
EN
The “Defence in depth” strategy for securing computer systems claims that technologies used to protect a network should fulfill the “Protect, Detect and React” paradigm. “This means that in addition to incorporating protection mechanisms, organizations need to expect attacks and include attack detection tools” [1]. This paper presents MetaIDS – the Intrusion Detection System developed in Poznań Supercomputing and Networking Center. It detects both attack attempts and successful attacks to the system. The paper highlights typical problems with intrusions detection, principle of the MetaIDS work and real attack example seen from the perspective of MetaIDS.
EN
This article is based on an overview of the legislation on access to firearms in Poland and European countries, as well as an overview of the figures on the number of gun crime. The aim of the article is to present the regulations governing access to firearms in Poland and selected European countries.
EN
Possibilities for the use of biometric data are growing and hence their practical application is also increasing. Therefore, an important element to be considered in the design, construction and exploitation of systems using biometrics is the question of identifying a specific person and assigning him or her to the relevant data contained in the documents or databases. The ability and, in some cases, the need to use biometric data results from the growing use of information technology in everyday life and the ever increasing attempts to steal the identity of those using these technologies. Modern IT systems often have a high level of security in terms of protection and access to data, and in particular the management of security systems. The article presents an outline of the theory related to the possibility of using and applying biometric data to provide security and have the ability to inspect officers of various departments. The subject of analysis also considered the possibility of using security measures in the form of biometric data identification for the purpose of securing the security services.
EN
The article discusses the most important issues related to cultural identity. It defines cultural identity and determines its place on the global cultural map. The author of the article also deals with defining the level of relation between cultural identity and security, both from the collective and individual perspective. In the article, appear questions about the future of culture in the world that is subject to dehumanization processes.
EN
All Database Management Systems used in the industry provide secure access to data at the server level. The level of security is influenced by technology, security model, password encryption method, password strength and others. The human factor – unreasonable behaviour of users – also has a significant impact on safety. Developers of database applications often implement their security policy by limiting the risk caused by users. This implementation has a disadvantage – it does not work outside of the application. A large number and variety of applications that work with the database server may then create a security gap. The paper presents the authors’ extensions of the functional features implemented in the Oracle database server, increasing the security of data access. The implemented methods of controlling the time of user access to data and limiting the use of serial and modular passwords are also discussed.
19
Content available remote Modern security paradigm
80%
EN
Knowledge about the surrounding world, social reality, its functioning consists of many different theories, laws, notions and concepts of the surrounding world. In this respect, the security paradigm as a toll of knowledge has many explanatory functions. The point is that only some of them are true and only in particular, often accidental circumstances. Hence differentiating whether they are true or not carries a risk and possibility of an error. The consequences manifest themselves in any aspect of human activity and it concerns also the security paradigm of a subject and their activities. The article rise up those issues and try to bring answers. Trying to describe reality, in order to systematize it and give it an understandable form, is as much tempting, due to the bulk of the challenge, as it is discouraging, because of the idea of activities which should or may be connected with this task. The purpose of this type of activities may be easily questioned by indicating the number of determinants which should be taken into consideration and inability to include them all in the undertaken discussion. Hence what makes one face this challenge? Paradoxically, the image of reality is like an image in a toy telescope, in which, when one looks against the light, images overlap and change while keeping some of their own features. So does the reality which, while undergoing changes, possesses its own, unique and at the same time repetitive features. Although during observation they may be distorted, the impression of some repeatability remains, which is underlying for understanding of what surrounds us. It is the basis for understanding which leads to cognition and explanation of events, phenomena, processes as well as megatrends which create human social reality. This link between cognition and understanding, or rather the willingness to notice it in the area of broadly understood subject’s security has become the basis for this discussion.
PL
Znajomość współczesnej rzeczywistości, a w niej zagadnień bezpieczeństwa, jest istotna zarówno ze względów poznawczych, jak i utylitarnych. W tym zakresie paradygmat bezpieczeństwa stanowi swoiste narzędzie poznania i eksplanacji. Rzecz w tym, że tylko niektóre obszary poznania i formy eksplanacji są prawdziwe i tylko w określonych okolicznościach. Zawsze występuje ryzyko błędu, a konsekwencje tego występują w różnych odniesieniach do podejmowanych przez człowieka działań. Artykuł ukazuje powyższe zagadnienia i stara się – przynajmniej w przypadku niektórych – udzielić odpowiedzi.
20
Content available Space as an element of economic security
80%
EN
Shaping a safe space is an extremely complex and multi-faceted process. To large extent, it is based on the cooperation with various entities of the local community, participating in mutual interdependencies within local economies and above all, in the local socio-economic development. In modern realities, activity geared toward making changes in physical space and initiating programs to promote mobilization of society to improve safety takes on particular importance. Crime prevention strategies through shaping space are presented from the perspective of typical bodies which are to ensure safety and the local government as the main entity coordinating these processes in the local section. The article assumes the thesis that spatial conditions determine safety. The objective of this article is to show the importance of a safe space in the local context.
first rewind previous Strona / 105 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.