Works matching IS 20805268 AND DT 2013 AND VI 5 AND IP 2
Results: 19
Identification of Emotional States Using Phantom Miro M310 Camera.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 207, doi. 10.5604/20805268.1094142
- By:
- Publication type:
- Article
Optimization of Border Managers' Explicit Psychological Impact on Subordinates.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 193, doi. 10.5604/20805268.1094140
- By:
- Publication type:
- Article
The Key Witness as an Instrument of the System of Control of Organized Crime in Poland.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 127, doi. 10.5604/20805268.1094133
- By:
- Publication type:
- Article
Diagnosis and Forecasting of Serious Accidents at Work in Poland.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 235, doi. 10.5604/20805268.1094145
- By:
- Publication type:
- Article
Working Time Effectiveness of Hydraulic Rescue Equipment for Firefighters.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 221, doi. 10.5604/20805268.1094143
- By:
- Publication type:
- Article
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 171, doi. 10.5604/20805268.1094138
- By:
- Publication type:
- Article
Some Peculiarities of Pretrial Agreement on Cooperation with a Person, Who Committed a Socially Dangerous Act in a State of Irresponsibility.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 163, doi. 10.5604/20805268.1094137
- By:
- Publication type:
- Article
Prevention of Money Laundering in the Fight Against Human Trafficking and Smuggling of Migrants.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 83, doi. 10.5604/20805268.1094127
- By:
- Publication type:
- Article
Concept of Combating Terrorism in Ukraine. Organizational and Legal Aspects.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 141, doi. 10.5604/20805268.1094134
- By:
- Publication type:
- Article
Fixation of Setting as a Method of Professional Selection and Psychological Correction of Police Officers.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 185, doi. 10.5604/20805268.1094139
- By:
- Publication type:
- Article
Statutory Regulations on Electronic Monitoring and Their Actual Application by the Judiciary in Poland.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 107, doi. 10.5604/20805268.1094132
- By:
- Publication type:
- Article
Special Features of the Extra-Procedural Interaction of the Courts with Each Other and with Auxiliary Body in the Judicial System of Ukraine.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 97, doi. 10.5604/20805268.1094130
- By:
- Publication type:
- Article
Organisation of Police Negotiations in the Polish Police Service.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 153, doi. 10.5604/20805268.1094136
- By:
- Publication type:
- Article
The Essence and Definition of Information Support for the Customs.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 77, doi. 10.5604/20805268.1094067
- By:
- Publication type:
- Article
Republic of Kosovo Regulations on the Marking of Weapons, Parts of Weapons and Ammunition from the Perspective of International Standards.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 51, doi. 10.5604/20805268.1094063
- By:
- Publication type:
- Article
Modern Military Missions as a Method of Resolving Conflict in Order to Maintain International Security.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 31, doi. 10.5604/20805268.1094059
- By:
- Publication type:
- Article
The House -- European Major Events Security.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 21, doi. 10.5604/20805268.1094058
- By:
- Publication type:
- Article
Preventing Fraud Using Computer Networks.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 63, doi. 10.5604/20805268.1094062
- By:
- Publication type:
- Article
Community Policing: Homogenous Societies are Actually Heterogenic -- Challenges to Diverse Community Needs.
- Published in:
- Internal Security, 2013, v. 5, n. 2, p. 7, doi. 10.5604/20805268.1094053
- By:
- Publication type:
- Article