You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Komentarz stanowi kompleksowe i praktyczne omówienie zagadnień dotyczących m.in.: • klasyfikowania i przetwarzania informacji niejawnych, • organizacji ochrony informacji niejawnych, • bezpieczeństwa osobowego, • kancelarii tajnych i środków bezpieczeństwa fizycznego, • bezpieczeństwa teleinformatycznego, • bezpieczeństwa przemysłowego. Autorzy publikacji wskazali na wątpliwości i trudności, które mogą pojawić się w związku ze stosowaniem przepisów komentowanej ustawy. W przystępny sposób je wyjaśnili oraz sformułowali szereg postulatów de lege ferenda, które wymagają dostrzeżenia przez ustawodawcę. Publikacja przeznaczona jest dla praktyków – adwok...
None
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
The international conference Intelligent Information Processing and Web Mining IIS:IIPWM’05, organized in Gda?sk-Sobieszewo on 13–16th June, 2005, was a continuation of a long tradition of conferences on applications of Arti?cial Intelligence (AI) in Information Systems (IS), organized by the Institute of Computer Science of Polish Academy of Sciences in cooperation with other scienti?c and business institutions. The Institute itself is deeply engaged in research both in AI and IS and many scientists view it as a leading institution both in fundamental and - plied research in these areas in Poland. The originators of this conference series, Prof. M. D?browski and Dr. M. Michalewicz had i...
None
Here is a collection of papers presented at the 11th On-line World Conference on Soft Computing in Industrial Applications, held in September-October 2006. This carefully edited book provides a comprehensive overview of recent advances in the industrial applications of soft computing and covers a wide range of application areas, including data analysis and data mining, computer graphics, intelligent control, systems, pattern recognition, classifiers, as well as modeling optimization.
This book is an attempt to give a systematic presentation of both logic and type theory from a categorical perspective, using the unifying concept of fibred category. Its intended audience consists of logicians, type theorists, category theorists and (theoretical) computer scientists.
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such examp...
This book contains the proceedings of the first International Workshop on Interval/Probabilistic Uncertainty and Non Classical Logics, Ishikawa, Japan, March 25-28, 2008. The workshop brought together researchers working on interval and probabilistic uncertainty and on non-classical logics. It is hoped this workshop will lead to a boost in the much-needed collaboration between the uncertainty analysis and non-classical logic communities, and thus, to better processing of uncertainty.