Претраживање
Приказ резултата 21-30 од 61
Institutionalization of cooperative security on the example of the European Union / Institucionalizacija saradnje u bezbednosti u Evropskoj uniji
(Ministarstvo unutrašnjih poslova Republike Srbije, Beograd, 2013)
At the end of the Cold War, a new concept of security - Cooperative Security Concept - developed within contemporary security studies, and it represented a new approach to achieving, preserving and enhancing security. Based ...
The academy of criminalistic and police studies female students morphological status models defined by multichannel bioelectrical impedance / Modeli morfološkog statusa studentkinja kriminalističko-policijske akademije definisani metodom multikanalne bioelektrične impedance
(Kriminalističko- policijska akademija, Beograd, 2013)
Multi-year impact of obesity and physical inactivity can lead to negative psychosocial and health consequences, especially for girls-women whose structure has a higher percentage of body fat mass compared with men. The ...
Implementation of activities of police management / Ostvarivanje poslova policijskog menadžmenta
(Institut za kriminološka i sociološka istraživanja, Beograd, 2013)
This paper presents the results of an empirical study on the implementation of activities of police management in the Republic of Serbia. The results will be exhibited at the following units: (1) to the current leaders in ...
Violence of crime street groups / Nasilje uličnih kriminalnih grupa
(Kriminalističko- policijska akademija, Beograd, 2013)
The article contains introduction, conclusion and three logically connected chapters. Introduction presents a short review of etymology meaning of the term "street crime group", "gang" and "clan". In the first chapter ...
Some possibilities of predicting the selection of the line of study / O vozmožnosti predikacii v vybore kursa obučenija
(Pedagoško društvo Srbije, Beograd, 2013)
In accordance with the omnipresent process of computerization of society, along with a permanent global economic crisis, there is a need for saving by avoiding wrong choices for study. It is the interest of both the students ...
Possibilities of biological weapons abuse for terrorist purposes / Mogućnosti zloupotrebe biološkog oružja u terorističke svrhe
(Ministarstvo unutrašnjih poslova Republike Srbije, Beograd, 2013)
For centuries, biological agents have been used in warfare, terrorist or criminal activities. It seemed that the signing of the convention on biological weapons would contribute to biological weapons to become just an ...
French court system control board and its contribution to the construction of the democratic legal state / Francuski sistem sudske kontrole uprave i njegov doprinos izgradnji demokratske pravne države
(Kriminalističko- policijska akademija, Beograd, 2013)
In this paper, attention is paid to the French system of judicial control of the administration, the so-called system of special administrative courts and its contribution to the building of a democratic state of law. The ...
Situational action theory: Assumptions, significance and prospects / Teorija situacijskog postupanja - postavke, značaj i perspektive
(Kriminalističko- policijska akademija, Beograd, 2013)
The article reviews basic assumptions, constructs and significance of Situational Action Theory (SAT), a recent integrated theoretical model aiming to provide an ecological perspective and approve itself as a truly general ...
Interview and Interrogation Tactics and Techniques in Serbia
(Ministry Interior Republic Slovenia, Ljubljana, 2013)
This article examines the distribution of officer opinions combined with personal statuses and perceived statuses of interviewed and interrogated people, types of successful tactics used by police, and types of defence ...
System for detection intrusions into information infrastructure / Sistem za detekciju upada u mrežnu infrastrukturu
(Kriminalističko- policijska akademija, Beograd, 2013)
Intrusion detection (ID) is an area of computer security that involves the detection of unwanted manipulations to computers and computer networks. ID is used to monitor and capture intrusions into computer and network ...