Now showing items 1-6 of 6

    • Alicja Jaruga in memoriam 

      Gierusz, Jerzy; Idzikowska, Gabriela; Jerzemowska, Magdalena; Kamela-Sowińska, Aldona; Kardasz, Andrzej; Messner, Zbigniew; Sawicki, Kazimierz; Sojak, Sławomir; Mackevicius, Jonas; Fedak, Zdzisław; Karmańska, Anna (Wydawnictwo Uniwersytetu Łódzkiego, 2012)
    • Implementation of the 8th EU Directive in Poland 

      Idzikowska, Gabriela; Owczarek, Zofia (Wydawnictwo Uniwersytetu Łódzkiego, 2004)
      That paper presents stages in the implementation of Polish regulations concerning chartered auditor's profession and chartered auditors' self-government. The authors made reference to the Eighth EU Directive, discussing ...
    • Metodologiczne problemy projektowania banku danych 

      Idzikowska, Gabriela (Wydawnictwo Uniwersytetu Łódzkiego, 1987)
      The first part of the artlcle deals with main concepts connocted with the data bank, and more precisely with its two elements i.o, data base and data base management system. In the second and main part of the article, ...
    • Metody kontroli funkcjonowania systemów informatycznych 

      Idzikowska, Gabriela; Owczarek, Zofia (Wydawnictwo Uniwersytetu Łódzkiego, 1992)
      The article contains a review of the methods of controlling the functioning of information systems. The use of these methods guarantees correctness of data contained in files, which is an indispensable condition for effective ...
    • Metody kontroli procesu projektowania i dokumentacji projektowej systemów informatycznych 

      Idzikowska, Gabriela; Owczarek, Zofia (Wydawnictwo Uniwersytetu Łódzkiego, 1992)
      The article deals with problems concerning the control of the process of designing information systems and of the design documentation connected with it. Such controls aim at increasing the reliability of information ...
    • Zagrożenia danych w systemach informatycznych 

      Idzikowska, Gabriela; Owczarek, Zofia (Wydawnictwo Uniwersytetu Łódzkiego, 1992)
      The article discusses the problem of threats connected with introduction of informatics to data processing. There are analyzed typical deliberate and non-deliberate threats (computer offences) and ways of counteracting them.