National Repository of Grey Literature 56 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Face Identification
Macenauer, Oto ; Drozd, Michal (referee) ; Chmelař, Petr (advisor)
This document introduces the reader to area of face recognition. Miscellaneous methods are mentioned and categorized to be able to understand the process of face recognition. Main focus of this document is on issues of current face recognition and possibilities do solve these inconveniences in order to be able to massively spread face recognition. The second part of this work is focused on implementation of selected methods, which are Linear Discriminant Analysis and Principal Component Analysis. Those methods are compared to each other and results are given at the end of work.
Monitoring and Analysis of Users Using DLP System
László, Peter ; Janoušek, Vladimír (referee) ; Drozd, Michal (advisor)
The purpose of this work is presenting Data Loss Prevention systems, describing each element of it and writing down advantages and disadvantages of these systems. This document contains required knowledge about filter drivers and I/O request packets. According to this knowledge it is possible to design a user application, which based on the principles of Data Loss Prevention systems is able to prevent sensitive data from leaks. Created application is a mini-filter driver, which allows tracking operations of marked files with monitoring and filtering IRP packets. This document also contains detailed desing, implementation, testing and reviewing of created program.
Detection of Honeypot Systems in Network
Teknős, Martin ; Drozd, Michal (referee) ; Barabas, Maroš (advisor)
This thesis is focusing on detection of honeypot systems in network. It presents different techniques for detection of honeypot systems and then focuses on three of them: TCP/IP fingerprinting, clock skew estimation and service exercising. A console application was created, to test these selected techniques. The thesis describes a design of the application, its implementation and also presents results of experiments with the application and selected techniques.
Unified Network Authentication for Linux
Zůna, Pavel ; Drozd, Michal (referee) ; Mlích, Jozef (advisor)
Tato práce se zabývá návrhem a implementací řešení pro jednotnou síťovou autentizaci pro operační systém Linux založeného na integraci systémových démonů WinBind a SSSD. Cílem je navrhnout takové řešení, které umožní autentizaci Linuxových klientů do domén spravovaných adresářovými službami Windows Active Directory a domén spravovaných adresářovými službami dostupnými na Linuxu současně. První dvě kapitoly seznámí čtenáře s autentizačními mechanizmy a technologiemi, které se pro tyto účely použivají na operačních systémech Windows a Linux. Třetí kapitola se zabývá jádrem práce a vysvětluje rozhodnutí učiněná při návrhu implementovaného řešení. Samotná implementace je pak popsána v kapitole čtyři. Poslední kapitoly popisují experimenty a testování pro vybrané případy užití s návrhy a popisem možných rozšíření do budoucna.
Monitoring and Analysis of Users Using DLP System
Pandoščák, Michal ; Hanáček, Petr (referee) ; Drozd, Michal (advisor)
The purpose of this masters thesis is to study issues of monitoring and analysis of users using DLP (Data Loss Prevention) system, the definition of internal and external attacks, the description of the main parts of the DLP system, managing of politic, monitoring user activities and classifying the data content. This paper explains the difference between contextual and content analysis and describes their techniques. It shows the fundamentals of network and endpoint monitoring and describes the process and users activities which may cause a data leakage. Lastly, we have developed endpoint protection agent who serves to the monitoring activities at a terminal station.
Penetration Testing Application for DoS Based Web Vulnerabilities
Vrána, Jaroslav ; Zbořil, František (referee) ; Drozd, Michal (advisor)
This work deals with a issue of a DoS vulnerability in web applications. At first, there are described principles of a computer security, general principles of the DoS and a penetration testing. Further text describes a OWASP Testing Guide v3 for the DoS in web applications. There is a design of own application on basis own experiences. This application is implemented and tested by the web applications.
Web Application for Managing and Classifying Information from Distributed Sources
Vrána, Pavel ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
This master's thesis deals with data mining techniques and classification of the data into specified categories. The goal of this thesis is to implement a web portal for administration and classification of data from distributed sources. To achieve the goal, it is necessary to test different methods and find the most appropriate one for web articles classification. From the results obtained, there will be developed an automated application for downloading and classification of data from different sources, which would ultimately be able to substitute a user, who would process all the tasks manually.
Analysis of Attacks Using Web Browser
Olejár, František ; Michlovský, Zbyněk (referee) ; Drozd, Michal (advisor)
Different attacks guided from web servers using web browsers are being analyzed and described in this Bachelor's thesis. A simulation environment is used to simulate the attacks. The environment was created using Browserider, using the web server Apache 2 and a virtual machine as well. On the basis of the analysis, the application ExploitAnalyzer was developed and implemented and can successfully record process's actions as well as IRP requests sent during an attack onto a web browser.
Reactive Audit
Hlísta, Juraj ; Drozd, Michal (referee) ; Hanáček, Petr (advisor)
The thesis deals with the proposal and the implementation of an extension for the audit system in Linux - the reactive audit. It brings a new functionality to the auditing in form of triggering reactions to certain audit events. The reactive audit is implemented within an audit plugin and its use is optional. Additionally, there is another plugin which stores some audit events and provides time-related statistics for the first plugin. As the result, the mechanism of the reactive audit does not only react to some audit events, it is also able to reveal anomalies according to the statistical information and set ofe the appropriate reactions. It is a fairly general mechanism that can be useful in various situations.
Selected Parts of the Construction Technology Project of the Psychiatric Clinic of the University Hospital Brno
Drozd, Michal ; Pražáková, Jana (referee) ; Mohapl, Martin (advisor)
The subject of my diploma thesis are selected parts of the construction technology project of the psychiatric clinic of the University Hospital Brno based on the provided project documentation. It is an extension of a new six-storey building to the existing buildings. The thesis contains a technical report to the construction technology project, the coordination situation of the construction, the situation of wider transport routes, time and financial plan by objects, study of the realization of the main technological stages, a site equipment design, a design of a machine set, technological regulation for monolithic structures, quality control and testing plan of monolithic structures, noise study and selected documents for LEED certification.

National Repository of Grey Literature : 56 records found   previous11 - 20nextend  jump to record:
See also: similar author names
6 Drozd, Martin
Interested in being notified about new results for this query?
Subscribe to the RSS feed.