National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Analysis of cycling in Lipno region
Jelínková, Petra ; Mervart, Michal (advisor) ; Mauric, Jakub (referee)
The aim of diploma thesis is to analyze actual condition and development of cycling transport in the Lipno region. There is a description of cycling and the explanation of basic terms and types of cycling transport in the first part of diploma thesis. Next part is focused on National strategy of cycling in the Czech Republic and other projects of cycling. There is the description of the Lipno region, current conditions of cycling, density, quality and connectivity to other regions and other services in the following text. SWOT analysis defines strengths, weaknesses, opportunities and threats of the whole Lipno region in context with cycling. In the text, there are mentioned actual projects, ideas for progress, opportunities and reduction of threats. The SWOT analysis shows, that the Lipno region is a popular location for cyclists with many strong aspects and with great potential for development.
The cloud computing and virtualization technologies in the enterprise practice
MAURIC, Jakub
This work reports on virtualization and cloud computing technologies. It evaluates their strengths and weaknesses as well as describes the examples of its deployment. The document serves as a concise and comprehensive guide, describing the necessary theory along with the practical use. It is all demonstrated on a real project. The practical part refers to the data environment of the Fire Rescue Service of South Bohemia Region and represents the usage of studied technologies. The analysis also includes project´s financial and technical aspects.
IDS system SNORT
MAURIC, Jakub
This work deals with Intrusion Detection Systems. It divides them into categories and describes their functions. It describes examples of their using. It deals primary with IDS System Snort, content of them and with an example of their implementation into an existing system. This document will be used like a short compact manual which describes a necessary theory of Intrusion Detection Systems and possibilities of their practical using.

See also: similar author names
2 MAURIC, Jakub
Interested in being notified about new results for this query?
Subscribe to the RSS feed.