Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "security communication" wg kryterium: Temat


Tytuł:
LoRaWAN Communication Implementation Platforms
Autorzy:
Szewczyk, Joanna
Nowak, Mariusz
Remlein, Piotr
Głowacka, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/2200714.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Long-Range (LoRa)
intelligent building
LPWAN
wireless network
security communication
Smart City
IoT
Opis:
A key role in the development of smart Internet of Things (IoT) solutions is played by wireless communication technologies, especially LPWAN (Low-Power Wide-Area Network), which are becoming increasingly popular due to their advantages: long range, low power consumption and the ability to connect multiple edge devices. However, in addition to the advantages of communication and low power consumption, the security of transmitted data is also important. End devices very often have a small amount of memory, which makes it impossible to implement advanced cryptographic algorithms on them. The article analyzes the advantages and disadvantages of solutions based on LPWAN communication and reviews platforms for IoT device communication in the LoRaWAN (LoRa Wide Area Network) standard in terms of configuration complexity. It describes how to configure an experimental LPWAN system being built at the Department of Computer Science and Telecommunications at Poznan University of Technology for research related to smart buildings.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 841--854
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Probability timed automata for investigating communication processes
Autorzy:
Piech, H.
Grodzki, G.
Powiązania:
https://bibliotekanauki.pl/articles/331047.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
protocol logic
probabilistic timed automata
communication security
Opis:
Exploitation characteristics behaves as a decreasing valors factor (DVF) which can be connected with degradation processes. It is a structure that consists of independent attributes which represent situations generally connected with a given exploitation factor. The multi-attribute structure contains attributes directly and indirectly referring to the main factor. Attribute states, by definition, can only maintain or decrease their values. Such situations are met in security, reliability, exploitation, fatigues and many complex one-directed or irreversible processes. The main goal refers to protocol security analysis during the realization of the communication run that specifies the assessment of the level of current and oncoming threats connected with cryptography authentication. In the communication run, the operations of different protocols mutually interleave. Our concept is based on the algorithm of attributes correction during exploitation process realization (Blanchet et al., 2008). The monitoring and correcting procedures make it possible to provide forecast information about possible threats on the basis of the structure of the current attribute values.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2015, 25, 2; 403-414
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SOCIAL MEDIA SECURITY RISKS AND COMMUNICATION SECURITY SYSTEMS
Autorzy:
Prokhorov, Mykola
Powiązania:
https://bibliotekanauki.pl/articles/483984.pdf
Data publikacji:
2016
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
social media
social networks
communication security
security risks
security systems
Opis:
The article reveals the idea that popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be used for professional networking and job searches, as a means to increase sales revenue, as a tool to keep the public informed of safety and other issues or as a way to reconnect with friends from way-back-when. Social networking has changed the way we interact with friends and associates. While social networks, like Facebook, Twitter, YouTube, FourSquare, and Google+, play a significant role in our lives, they are also a high risk for security threats. With hundreds of millions of users online, these tools not only attract friends and family wanting to stay in touch, but they also attract people wanting to know about you for the wrong reasons. Be aware of the security threats currently out there to help you stay safe online. In Europe, concerns about privacy linked to security are particularly acute, as evidenced by proposals for a new cyber security directive that link privacy and security. The proposals aim to impose EU-wide reporting requirements on companies that run large databases, including social networking firms. Although the final wording of the directive remains to be seen, the proposals are a good indication of just how seriously European authorities view data security breaches
Źródło:
Ante Portas – Studia nad Bezpieczeństwem; 2016, 2(7) Obrona Terytorialna i jej rola we współczesnych systemach bezpieczeństwa; 381-389
2353-6306
Pojawia się w:
Ante Portas – Studia nad Bezpieczeństwem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Problematyka tak zwanych dopalaczy na tle ochrony bezpieczeństwa w komunikacji w prawie karnym i prawie wykroczeń
The issues of the so-called legal higs against the background of security protection in communication in criminal law and misdemeanor low
Autorzy:
Buczek, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/1596058.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
legal higs
drug-related crime
security in communication
dopalacze
przestępczość narkotykowa
bezpieczeństwo w komunikacji
Opis:
Niniejsze opracowanie poświęcone zostało problematyce dopalaczy, a ściślej – ustaleniu, czy zachowania uczestników komunikacji będących użytkownikami tych środków są przedmiotem zainteresowania norm polskiego prawa represyjnego. W pracy omówiono normy sankcjonowane zawarte w kodeksie karnym oraz kodeksie wykroczeń, które mogą swym zakresem obejmować takie zachowania, a następnie, w głównej części artykułu, ustalono znaczenie problematycznych prima facie znamion, podkreślając przy tym problemy wykładnicze oraz dowodowo-procesowe. Ogólnym wnioskiem jest stwierdzenie, iż polski system prawny jest zasadniczo gotowy do walki z użytkownikami dopalaczy na analizowanym gruncie, choć posiadana broń do tejże walki wymaga pewnych doszlifowań.
This study is devoted to the issues of legal highs, or more precisely – determining whether the behavior of users of such means in the context of communication are the subject of interest to the norms of Polish repressive law. As a consequence, in the paper first are outlined the sanctioned norms contained in the Penal Code and the Code of Petty Offenses, which may cover such behaviors. In the main part of the article, the importance of problematic prima facie marks was established, while emphasizing exponential and evidential-process problems. The general conclusion is that the Polish legal system is basically ready to fight with users of legal highs on the analyzed ground, although the weapon possessed for this fight requires some polishing.
Źródło:
Acta Iuris Stetinensis; 2018, 22, 2; 77-97
2083-4373
2545-3181
Pojawia się w:
Acta Iuris Stetinensis
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploration of a fragmented discourse. Privacy and data security in Süddeutsche Zeitung: 2007–2017
Autorzy:
Meissner, Florian
von Nordheim, Gerret
Powiązania:
https://bibliotekanauki.pl/articles/691344.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
Internet, digitization, privacy, data security, information security, surveillance, Snowden, risk communication, journalism.
Opis:
The goal of this exploratory case study is to identify different facets of news reporting on surveillance, privacy and data security, and more specifically, how risks in this context are portrayed. The theoretical foundation consists of two elements: 1) the concept of mediatized risk culture, and 2) the discursive arena model of risk communication, which provides the normative background for assessing news reporting. A text-mining approach (topic modeling) is applied to analyze relevant coverage of the German quality newspaper Süddeutsche Zeitung. The study yields a total of seven topics which belong to three categories: violation of privacy norms, power and law enforcement, and datafication. The results show that despite the de-mystification of digital technology after the Snowden leaks, coverage has recently become more affirmative and less focused on risk. We conclude that this may indicate a normalization of mass surveillance and data harvesting even in Germany, a society which traditionally values privacy. In order to add more context to our findings, however, further qualitative analyses were needed. The paper serves as a starting point for further research on media reporting of surveillance, privacy and data security.
Źródło:
Mediatization Studies; 2018, 2
2451-1188
Pojawia się w:
Mediatization Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Głos człowieka i głos android. Eksperyment porównawczy
Human voice and android voice. Comparative experiment
Autorzy:
Zimnak, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1941250.pdf
Data publikacji:
2020-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
głos
android
bezpieczeństwo komunikacji
sztuczna inteligencja
etyka
voice
communication security
artificial intelligence
ethics
Opis:
Artykuł prezentuje założenia, przebieg i wyniki eksperymentu, opartego na wskazaniu przez uczestników głosu człowieka bądź głosu androida na podstawie przedstawionych próbek. Uczestnicy eksperymentu – studenci kierunków związanych z nowymi mediami – osiągnęli wyniki znacznie przekraczające połowę trafnych wskazań. Decyzje podejmowali wyłącznie na podstawie niewerbalnych cech wypowiedzi. W tekście zostaje podkreślona waga zagadnienia w obliczu rozwoju sztucznej inteligencji – dla pełnego bezpieczeństwa przyszłej koegzystencji obu odmian inteligencji niezbędne będą odpowiednie regulacje.
The article presents the assumptions, course and results of the experiment, based on the participants indicating the human or android voice according to the presented samples. The participants of the experiment – students of faculties related to new media – achieved results significantly exceeding half of the correct indications. They made decisions solely on the basis of the non-verbal features of the utterance. The text emphasizes the importance of the issue in the face of the development of artificial intelligence, if it is not accompanied by appropriate regulations.
Źródło:
Cywilizacja i Polityka; 2020, 18, 18; 214-239
1732-5641
Pojawia się w:
Cywilizacja i Polityka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CLASSIFIED INFORMATION IN THE MEDIA SPOTLIGHT AND THE TRUST OF STATE
INFORMACJE NIEJAWNE W CENTRUM ZAINTERESOWANIA MEDIÓW I ZAUFANIA PAŃSTWA
Autorzy:
VITKO, PAVOL
SZABO, STANISLAV
Powiązania:
https://bibliotekanauki.pl/articles/550701.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Biznesu i Przedsiębiorczości w Ostrowcu Świętokrzyskim
Tematy:
information, data, information system, security risk, communication, crisis communication, leakage of classified information
informacja, dane, system informacyjny, bezpieczeństwo, kryzys komunikacyjny, wyciek tajnych informacji
Opis:
The penetration of media and information technologies into the absolute majority of citizens' lives requires that, in defending and pursuing its intentions in the subject-matter area, the State should view it in the most erudite manner and should be capable of responding to it professionally. This fact is even more crucial in the post-socialist countries, where, in light of their totalitarian past, state bodies are often perceived through the lens of stereotypes as being deformed in the sense that the State performs more repressive than protective roles; that it is a bad owner in general terms; or even that it mismanages the tax payers’ money. The situation in the field of security is of special seriousness, where the State, being its principal guarantor, must seek to attain the highest possible level of credibility. However, one of the phenomena that may damage or weaken this credibility is a leak of State-classified information, as a result of which the credibility of an institution responsible for administering the security of classified information could be damaged significantly.
Obecność mediów i technologii informacyjnych w życiu dużej większości obywateli wymaga aby państwo w sposób profesjonalny reagowało na to zjawisko. Jest to szczególne ważne w byłych krajach socjalistycznych gdzie, w świetle ich totalitarnej przeszłości, rola państwa jest często rozpatrywana w kontekście władzy represyjnej a nie protekcyjnej. Jest to więc władza definiowana jako zły gospodarz, które źle zarządza publicznymi pieniędzmi. Szczególnie ważna jest kwestia bezpieczeństwa, której głównym gwarantem jest państwo osiągające wysoki poziom wiarygodności. Jednak jednym ze zjawisk, które mogą zniszczyć lub osłabić tę wiarygodność jest przeciek tajnych infor-macji. W skutek takiego przecieku, autorytet instytucji państwowych odpowie-dzialnych za utrzymanie bezpieczeństwa tajnych informacji, może zostać bardzo poważnie podważony.
Źródło:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne; 2015, 6(2)/2015; 123-138
2300-1739
Pojawia się w:
Acta Scientifica Academiae Ostroviensis. Sectio A, Nauki Humanistyczne, Społeczne i Techniczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secure web access to mini distributed control system
Niewielkie rozproszone systemy sterowania ze zdalnym dostępem przez sieć
Autorzy:
Rzońca, D.
Stec, A.
Trybus, B.
Powiązania:
https://bibliotekanauki.pl/articles/282114.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
sieciowe systemy sterowania
bezpieczeństwo komunikacji
sieci Petriego
rozproszone systemy sterowania
networked control systems
communication security
Petri nets
distributed control systems
Opis:
Small distributed control systems with remote web access are becoming fairly common. Sooner or later, security of such systems will become a precondition for some critical applications. However, limited computational power will reąuire some non-standard solutions. The paper describes secure web access to a prototype of small distributed control system programmed according to IEC 61131-3 standard. Security is provided by challenge-response authentication of web client and symmetric cryptographic primitives. Communication latency is analysed by means of a Timed Petri Net model.
Niewielkie rozproszone systemy sterowania ze zdalnym dostępem przez stronę www stają się coraz bardziej powszechne. Wcześniej bądź później w istotnych zastosowaniach będą wymagane zabezpieczenia takich systemów. Ograniczona moc obliczeniowa wymusza jednakże opracowanie niestandardowych rozwiązań. Artykuł opisuje bezpieczny dostęp internetowy do prototypowego niewielkiego rozproszonego systemu sterowania, programowalnego zgodnie z normą IEC 61131-3. Bezpieczeństwo oparte jest na uwierzytelnianiu challenge-response klienta webowego i kryptografii symetrycznej. Opóźnienie komunikacji zostało przeanalizowane bazując na modelu w czasowych sieciach Petriego.
Źródło:
Automatyka / Automatics; 2012, 16, 2; 155-164
1429-3447
2353-0952
Pojawia się w:
Automatyka / Automatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Communication as an Element of Personal Security
Autorzy:
Ciekanowski, Zbigniew
Krawczyńska, Sylwia
Nowicka, Julia
Wyrębek, Henryk
Powiązania:
https://bibliotekanauki.pl/articles/15849666.pdf
Data publikacji:
2023-06-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
security
communication
organisation
supervisor
relationships
Opis:
The study refers to the role of building relations between the direct supervisor and employee teams, indicating the opportunities and threats resulting from conducting selected aspects of internal communication in the so-called uniformed organisations. The authors draw attention to the roles of communication competencies and their social overtones, seeing in these elements both opportunities and threats to the involvement of employees in the performance of official tasks, as well as their readiness to deepen relations with their direct superior. The presented results of empirical research concern the organisation of the Ministry of National Defence and the State Fire Service and are only an element of a larger research project. The aim of the research process was to determine the opportunities and threats generated by aspects of organisational communication in the context of maintaining a satisfactory state of personal security of the examined institutions participating in activities in the field of defence and protection of population, property and the environment.
Źródło:
Polish Political Science Yearbook; 2023, 2(52); 177-184
0208-7375
Pojawia się w:
Polish Political Science Yearbook
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Environment of Non-Verbal Communication – Security and Threats
Autorzy:
Czajkowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/1832487.pdf
Data publikacji:
2015
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
security
threat
non-verbal communication environment
Opis:
The subject of the work is the issue of analysis and interpretation of non-verbal behavior referenced to the security context and its threats. The fundamental thesis of the work is to prove the crucial role of knowledge and practical skills in the recognition and presentation of nonverbal behavior in crisis situations and emergencies. The author also points out the possibility of preparing and carrying out training in dealing with non-verbal messages for members of dispositional groups. In the analysis, the issue of the difference between the non-verbal and verbal behavior is discussed. Then the environmental issues of communication are analyzed in the form of importance of factors such as perception of situation, perception of time, presence of other people and architectural elements. In the same area dimensions of relations, knowledge on environment and people are located. The scope of non-verbal communication also includes close surroundings of a person and things possessed by him/her. Other important elements of the communication environment analysis are territory and personal space. Distinction is made between types of territory. In connection with the issue of space the author also introduced categorization of distance to the partner. In conclusion the need and usefulness of communication behavior model constructing, and conducting empirical research in this area are pointed out.
Źródło:
Security Dimensions; 2015, 16(16); 200-219
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Communication systems for safety and security of ships
Autorzy:
Korcz, K.
Powiązania:
https://bibliotekanauki.pl/articles/245291.pdf
Data publikacji:
2016
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
communication systems
maritime safety
maritime security
Opis:
The article assesses the technical and operational possibilities of the marine communications systems to ensure the safety and security of ships. The basic functional requirements for marine radio communication to ensure the safety and security of ships, resulting from the provisions of the International Convention for the Safety of Life at Sea (SOLAS), have been described. The article presents the marine radio communication systems responsible for the distress alerting. The operation and ways of alerting used in Inmarsat satellite systems, Cospas-Sarsat systems and Digital Selective Calling system (DSC) have been described. The analysis of the systems responsible for broadcasting to the vessels the Maritime Safety Information (MSI) has been made. In this context, the operation, methods and ranges of broadcast of the Maritime Safety Information by the NAVTEX system and Inmarsat SafetyNet system have been described. The systems performing the function of ships security have also been discussed. The operation, application and basic properties of the Ship Security Alert System (SSAS) and Long Range Identification and Tracking system (LRIT) have been presented. In the subsequent part, the article outlines the future of maritime communications systems used to ensure the safety and security of ships. In this context, two projects currently being implemented in the framework of the International Maritime Organization (IMO) by the Sub-Committee on Navigation, Communications, Search, and Rescue (NCSR) have been presented. The first of these projects under the name of e-navigation refers to the use of the latest information and communication technologies in shipping. The second one concerns the modernization of the Global Maritime Distress and Safety System (GMDSS).
Źródło:
Journal of KONES; 2016, 23, 1; 153-160
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Directions of the Polish migration policy in cyberspace
Autorzy:
Chmielecka, Paulina A.
Powiązania:
https://bibliotekanauki.pl/articles/2143051.pdf
Data publikacji:
2022-07-02
Wydawca:
Akademia Sztuki Wojennej
Tematy:
information security
cyberspace
migration
political communication
Opis:
A state cannot exist without a defined territory, a population living within it, and a government. It is not insignificant for the maintenance of security in the country to ensure the stability of borders, law and order, and the protection of the people residing in the country. The protection applies to nationals as well as to economic immigrants and refugees. It takes place in real-time and in the virtual information space, which is one of the research areas in the security sciences. This article aims to highlight the most important challenges for the Polish migration policy in cyberspace.
Źródło:
Cybersecurity and Law; 2022, 7, 1; 142-152
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
GOVSATCOM makes EU stronger on security and defence
Autorzy:
Borek, Rafał
Hopej, Kaja
Chodosiewicz, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/576417.pdf
Data publikacji:
2020-03-17
Wydawca:
Akademia Sztuki Wojennej
Tematy:
European Union
satellite communication
national security
Opis:
Publication identifies the meaning of Governmental Satellite Communication Govsatcom and presents a hypothesis related to the demand for this type of satellite communication. It describes engagement of main involved institutions i.e. European Space Agency, European Defence Agency, and European Commission, especially elaborating the PACIS projects running under ESA umbrella, which are one of the main preparatory actions for the IV EU Space Program. The theoretical research methods employed in this study are: synthesis, analysis, abstracting and generalization. It updates information about whole activites, which have taken place since the decision about its establishement. Describing preparatory actions and EU institutions involved. Moreover considers about future relations between related parties and possible Poland's engagement explaining what kind of benefits it would deliver. The conclusion is that the future EU space program creates proper environment for cooperation between community members and deliver opportunity to use safe and secure satellite communication for members who cannot afford possess own capabilities.
Źródło:
Security and Defence Quarterly; 2020, 28, 1; 44-53
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Introduction to multivariate modeling of the strategy of securities portfolio choice
Wstęp do wielowymiarowego modelowania strategii wyborów portfela papierów wartościowych
Autorzy:
Sitek, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/469823.pdf
Data publikacji:
2016-09-01
Wydawca:
Wyższa Szkoła Gospodarki Euroregionalnej im. Alcide De Gasperi w Józefowie
Tematy:
Security
securities portfolio management
intercultural communication
Opis:
Purpose: The purpose of the article is to present the issue of securities as a form of investment, using the strategy of securities portfolio choice. Methods: In order to make a comprehensive analysis of the strategy of choices modeling of equity portfolio in the context of the integration of financial markets and European integration, the following research instruments were introduced: 1) analysis of the system of securities, 2) institutional approach, 3) systemic approach. In this paper legal-dogmatic method was applied primarily which helped to conduct the analysis of legal standards currently in force and security institutions. Results: The full picture of the investment decision is obtained using valuation models based on sequential valuation or sensitivity analysis. These methods, adapted to analyze portfolios of debt instruments, take into account factors relating to both changes in yield curves, as well as due to the passage of time to maturity (Szafarczyk, 2006). However, they are much more complex. The presented article is only an introduction to the topic.
Źródło:
Intercultural Communication; 2016, 1, 1; 166-176
2451-0998
Pojawia się w:
Intercultural Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Linguistic communication in the perspective of political invective
Autorzy:
Dankiewicz, Malwina
Rodasik, Radosława
Skórzak, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1878612.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
communication
political invective
security culture
aggressive linguistic
Opis:
The paper presents the problem of security culture in the public communication, especially in political invective.. The sources of aggressive language in political life, the specificity of political invective and linguistic means for insulting political opponent were presented. There were described the social and ethical consequences of using aggressive linguistic means against a political opponent. Verbal fencing, and often brutal battle of words have been written in the ritual of governance, which involves a more or less excited listeners, readers, viewers, because for them the language games are organized.
Źródło:
Security Dimensions; 2014, 11(11); 115-120
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies