National Repository of Grey Literature 197 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Graphical Interface for the NetLoiter
Ščupák, Marian ; Smrčka, Aleš (referee) ; Rozsíval, Michal (advisor)
The aim of this work is to create a graphical user interface that simplifies working with the NetLoiter tool. The chosen form for implementing the user interface is a web application. The created user interface allows the user to fill out forms, which validate their input and convert it into configuration files. The generated configurations can be used to run the NetLoiter tool via the SSH protocol and subsequently monitor the output in a user-friendly manner in real-time. The interface also provides users with the ability to perform basic statistical analyses on the data generated by the NetLoiter tool. The result of the work is increased efficiency in managing the NetLoiter tool and easier interpretation of its outputs.
Administrativní rozhraní pro Q řazení
Kováčik, Jakub ; Beran, Vítězslav (referee) ; Herout, Adam (advisor)
This thesis focuses on the development of an administrative interface in the form of a web application that allows the creation and management of card decks for Q-methodology, while enabling efficient research management. Q-methodology is a research approach used in the social sciences to analyse the subjective perspectives of participants. The application allows the management of multiple versions of card decks and the implementation of repeated research cycles with the ability to send email notifications to participants, supporting a dynamic and iterative approach to research. The application allows the sharing of card decks and research, which greatly supports collaboration and knowledge sharing between users.
Web Application for Managing a Community Greenhouse
Tsiareshkin, Ivan ; Materna, Zdeněk (referee) ; Bažout, David (advisor)
Tato práce se zabývá vývojem webové aplikace pro správu komunitního skleníku. Hlavním cílem je vytvoření manažerských funkcí, které jsou doplněny o intuitivní rozhraní odpovídající potřebám různých typů uživatelů. Práce podrobně popisuje všechny kroky vývojového procesu, včetně průzkumu a analýzy požadavků, návrhu, vyhodnocování uživatelského rozhraní, samotného vývoje a závěrečného testování. Diskutovány jsou také různé koncepty vývoje webových aplikací a je odůvodněn výběr konkrétních technologií. Celá aplikace je implementována v jazyce TypeScript s použitím Express.js a PostgreSQL pro back-end a Next.js pro front-end. Výsledkem je testovaná a optimalizovaná aplikace, která umožňuje uživatelům pohodlnou správu komunitního skleníku.
Denial of Service detection methods
Horský, Milan ; Zeman, Václav (referee) ; Sikora, Marek (advisor)
This bachelor thesis deals with a methodology for detecting and describing the Denial of Service (DoS) condition on a web server. The aim of the thesis is to develop and implement methods that enable effective detection of DoS attacks in an experimental network. The theoretical part focuses on the analysis of different types of DoS attacks, including their detection on the application server and network side, and discusses possible reasons for false positives. In the practical part, software tools for monitoring and analyzing server and network resources were developed and then tested against different types of DoS attacks. As a result of the work, the proposed methodology has been validated and implemented in an experimental network, which provides useful tools for improving the security and stability of web servers.
Development of a user interface for the needs of management and registration when stopping vehicles
Kuric, Christian ; Dvořák, Jan (referee) ; Šeda, Pavel (advisor)
The bachelor thesis focuses on the development of a web application for the management of records of stopped vehicles in road traffic. The server side je implemented in Java and uses the Spring framework to process logic and communicate with the PostgreSQL database. The client side is implemented using Next.js, which is built on React and TypeScript. The application enables efficient manipulation and management of vehicle records, users, receive messages via mqtt protocol and work with them.
A software tool for checking the secure settings of the parameters of the selected database
Hlavica, Adam ; Štůsek, Martin (referee) ; Šeda, Pavel (advisor)
This thesis deals with the design and implementation of a software tool for best practice database configuration checking. The theoretical part describes database technologies, their applications and existing solutions in the field of automated database configuration checking. Furthermore, possible configurations of the PostgreSQL database system are presented with a focus on security. The practical part shows the design of a program with the necessary requirements and its implementation in Python. The final chapter focuses on a practical demonstration of the program deployment.
Webová aplikace pro efektivní anotaci atributů objektů ve videu
Pernický, Michal ; Kohút, Jan (referee) ; Hradiš, Michal (advisor)
The goal of this work is to develop a web application for annotating video object attributes that combines an efficient user interface with an assistant classifier providing predictions. In contrast to currently available tools, the solution focuses directly on objects without assigning them to the original videos. The ability to filter objects according to their attributes and to confirm or reject predicted attribute values in bulk is important. Testing on users has been found to reduce the time spent working by up to half. This shows that further work with this annotation principle is worthwhile.
Password Leaks Automated Processing
Dvořák, Jakub ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
The aim of this thesis is to find databases of leaked data and to create an application capable of processing the data, storing it in a suitable database and enabling searching of the data on the basis of significant data. Among other things, the work deals with database research and measurement of uploading and data retrieval speeds, in order to select a suitable database used in the final solution. The resulting application is able to detect the encoding of the input file, the data format and stored items. Using the web interface, it also allows data to be searched based on filtering conditions from a database that has 5 157 229 040 records of leaked data at the time of theses submission. The results of this thesis provide a tool for processing and analysing databases of leaked passwords.
Analysis and Visualization of Beekeeping Big Data
Čásar, Jozef ; John, Petr (referee) ; Hynek, Jiří (advisor)
The aim of this master's thesis is to design and create a web application for beekeepers and the general public using a dashboard tool. The application analyses large datasets from the system ApiVčelař 4.0, originating from modern beekeeping devices such as scales, temperature sensors, humidity sensors, and others. The analysed data are linked with other open source data, which are then visualized for the user. The web application is implemented using the Ionic framework with the utilization of the React framework for the user interface. The chosen database system for data storage is PostgreSQL, and the data are processed using Django technology. The selection of technologies is based on the existing application to ensure compatibility with the system ApiVčelař 4.0. The result is an application that provides new insights and information derived from large datasets for users.
Web Application for Evaluation of Security Testing Tools
Moravec, Vojtěch ; Lieskovan, Tomáš (referee) ; Ilgner, Petr (advisor)
The bachelor thesis focuses on the design, development, and implementation of an intentionally vulnerable environment in the form of a web application. The resulting web application encompasses vulnerabilities across categories outlined in the OWASP Top 10 project, specifically following its 2021 version. Through this application, it is possible to assess and compare automated tools for penetration testing, as well as tools for static code security analysis. The thesis is divided into five chapters. In the introduction, the OWASP Foundation, which oversees the OWASP project, is described. The analysis of selected intentionally vulnerable web applications is then presented. Subsequent chapters delve into the design of the custom intentionally vulnerable web application, detailing the technologies used in its development and outlining all vulnerabilities present in the application. In the conclusion of the thesis, testing of the resulting vulnerable application is conducted using the aforementioned tools, and a summary of the achieved results is provided. Apart from the aforementioned testing and comparison of automated tools in the fields of penetration testing and static analysis, the application can also be utilized for educational purposes. This is primarily facilitated by the attached fixes and explanations, which accompany each vulnerability within the application.

National Repository of Grey Literature : 197 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.