Security Service
82 Followers
Recent papers in Security Service
The period of the eighties is the main subject of my story. The aim is to analyze the crisis in the functioning of the Belgian State and society, which culminated at the end of 1985, and to provide background facts. This is a crisis that... more
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
The article examines in detail the process of setting up the security services of Latvia in the period prior to and after regaining full independence. The author emphasizes that a successful transition towards a consolidated democracy... more
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
Obóz Pracy w Świętochłowicach był, obok obozu w Mysłowicach, największym obozem w powojennym województwie śląskim. Od końca lutego do 20 listopada 1945 r. w obozie zmarło co najmniej 1855 osadzonych (tyle aktów zgonu więźniów,... more
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more
Artykuł zawiera analizę 150 akt tajnych współpracowników aparatu bezpieczeństwa z lat 1945–1956 zachowanych w zasobie archiwum IPN w Katowicach. Omówiona została specyfika tych akt jako źródeł historycznych – ich niekompletność,... more
E-Governance is basically the use of internet expertise as a tool for exchanging information, providing services and transacting with people, businesses and other areas of government. E-Governance provides a sound approach to reinforce... more
The article examines in detail the process of setting up the security services of Latvia in the period prior to and after gaining full independence with the dissolution of the Soviet Union. The author emphasizes that a successful... more
Józef Lebenbaum z Lund i Andrzej Wirga z Moguncji, którzy przekazali księdzu Blachnickiemu informacje na temat działalności Gontarczyków mieli również przekazać komplet dokumentacji świadczącej o ich wywiadowczym charakterze. Albo ten... more
In most commercial electronic contract management applications available today, different customized code base has to be developed, deployed and operated to support each tenant. Few advanced commercial electronic contract management... more
In most commercial electronic contract management applications available today, different customized code base has to be developed, deployed and operated to support each tenant. Few advanced commercial electronic contract management... more
SOSE is a novel software development paradigm that results in flexible, loose-coupled and end-to-end applications. However, the adoption of this innovation is slowed by security challenge. Apparently, the use of only TLS (transport layer... more
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and... more