Претраживање
Приказ резултата 81-90 од 204
Undercover operations of suborning to crime / Prikrivene operacije navođenja na krivično delo
(Beograd : Kriminalističko- policijska akademija, 2004)
It can be stated with good reason that today undercover investigation techniques are the most efficient police weapon in prevention and suppression of crime. They are characterized by conspiracy and pro-activity of action. ...
The role of biometric applications in air transport security / Biometrijske aplikacije u bezbednosti vazdušnog transporta
(Kriminalističko- policijska akademija, Beograd, 2016)
As the number of air passengers continues to increase worldwide, so do the security demands and challenges in the air transport industry, particularly in lieu of numerous recent terrorist attacks. One of the essential ...
Legal state and contemporary administration / Pravna država i savremena uprava
(Kriminalističko- policijska akademija, Beograd, 2008)
The paper points to different views of the notion 'legal state'. There are some concepts that greatly simplify this term. A greater number of concepts determine the legal state in formal sense, but there are some opinions ...
Contribution to issues regarding law enforcement in a legal state in the function of crime suppression / Prilog pitanju primene prava u pravnoj državi u funkciji suzbijanja kriminala
(Kriminalističko- policijska akademija, Beograd, 2009)
Issues related to the legal state have recently become topical again both among experts and in general public. The notion of the legal state can be approached from different aspects. However, it is necessary to point out ...
Comparative criminal law analysis of the practice of earprint identification / Uporedna kriminalističko-pravna analiza prakse traga otiska ušne školjke
(Kriminalističko- policijska akademija, Beograd, 2007)
The aim of this paper is to point out particular moments in comparative criminalistic and criminal law practice that could be improved, as well as critic of the existing state. The author presents the historical evolution ...
Understanding of security from ancient times to contemporary approach / Razumevanje bezbednosti od antičkih vremena do savremenih pristupa
(Kriminalističko- policijska akademija, Beograd, 2011)
The aim of this work is to give a comprehensive analysis of the notion of security from ancient to modern times as one of the central social sciences research topics, especially in the fields of philosophy, sociology, ...
Differentiating dolus eventualis from conscious negligence / Razgraničenje eventualnog umišljaja i svesnog nehata
(Kriminalističko- policijska akademija, Beograd, 2008)
As we have already explained, the author is trying to contribute to solving one of the most complicated problems related to criminal law, differentiating dolus eventualis from conscious negligence. It is evident that for ...
Parliamentary government in Serbia from 1888 to 1914: Between jus and politics / Parlamentarna vlada u Srbiji od 1888. do 1914. godine - između prava i politike
(Kriminalističko- policijska akademija, Beograd, 2018)
The paper analyses the institutions of modern constitutionality in the Kingdom of Serbia in the period since it became a parliamentary state by the adoption of the Constitution in 1888 until the end of the Great War which ...
Disciplinary sanctions for police officers in Croatia and in Serbia / Disciplinske mere za policijske službenike u Hrvatskoj i u Srbiji
(Kriminalističko- policijska akademija, Beograd, 2016)
The authors in the paper give a review and a description of legally proscribed disciplinary punishments for police officers in the legislations of the Republic of Croatia and the Republic of Serbia. With certain institutes ...
System for detection intrusions into information infrastructure / Sistem za detekciju upada u mrežnu infrastrukturu
(Kriminalističko- policijska akademija, Beograd, 2013)
Intrusion detection (ID) is an area of computer security that involves the detection of unwanted manipulations to computers and computer networks. ID is used to monitor and capture intrusions into computer and network ...