National Repository of Grey Literature 225 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Virtualization and optimization of IT infrastructure in the company
Lipták, Roman ; Hladiš, Peter (referee) ; Ondrák, Viktor (advisor)
Master’s thesis deals with the use of virtualization and consolidation technologies in order to optimize IT infrastructure in a selected company. The analysis contains current state of IT infrastructure and requirements for future upgrade. The theoretical part contains description of technologies and procedures used in virtualization and consolidation. Subsequently, the proposal of optimization and expansion of IT equipment is created together with management, implementation and economic evaluation of the solution.
Analyzis of Parallel Honeypot Tools
Antal, Lukáš ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
This bachelor thesis analyzes the selected shadow honeypot tool. The thesis explaines the need for having tool for early detection of a new type of cyber-attack. Shadow honeypot tool analyzed in the thesis is called Argos. Argos is one of the results of the international project called European Network of Affined honeypots (NoAH). The thesis includes thorough analysis and testing of Argos tool. The paper also includes implementation of Argos log files parsing utility.
Presentation of data from a MySQL database in Windows Presentation Foundation
Polách, Michal ; Frolka, Jakub (referee) ; Lattenberg, Ivo (advisor)
In the thesis there is demonstrated and explained the creation of WPF MVVM design pattern based applications for brisk browsing, searching and editing of data in large library database stored on a MySQL server. Quick loading of data is achieved by using data virtualization using the paging method.
Automated Testing of Smart Cards
Yadlouski, Pavel ; Očenášek, Pavel (referee) ; Homoliak, Ivan (advisor)
Tato bakalářská práce se zabývá automatizovaným testováním podpory Smart Karet v RHEL. Problém manuálního testování je vyřešen vytvořením nové testovací knihovny. Tato knihovna je zodpovědná za konfiguraci testovacího prostředí a poskytuje testerovi rozhraní pro automatizovanou manipulaci s tímto prostředím. Jako výsledek jsme vytvořili univerzální knihovnu pro testování podpory smart karet. Primárním cílem je implementace samotné knihovny, pak následující převod existujících manuálních testů do kódu za pomoci teto knihovny a zprovozněni těchto testů ve vnitřní pipelině Red Hat.
Automatic verification of software packages with help of DNS
Sehnoutka, Martin ; Dvořák, Jan (referee) ; Jeřábek, Jan (advisor)
Tato diplomová práce se zabývá problémem bezpečné distribuce software. Je navrženo zlepšení s pomocí doménového systému, který je použit pro uložení verifikačních klíčů, potřebných pro ověření integrity balíků stáhnutých pomocí správce balíků. Navíc je navržena rozšířená verze, které se zabývá zabezpečením metadat repositářů. Obě verze jsou implementovány v jazyce Python a integrovány do správce balíků dnf. Tato implementace je otestována ve virtuálním prostředí, diskutována a zhodnocena z hlediska způsobené zátěže.
Testing Environment via Cluster Solution
Hostačný, Peter ; Kočí, Radek (referee) ; Smrčka, Aleš (advisor)
Testos is a project that aims to create a set of tools supporting automated software testing. One of its components is computational cluster whose main goal is to execute parallel tasks and provide computational resources to other tools in the project. This work details the process of its design, implementation and integration with the Testos project. It is expected that the resulting system will be in use after Testos bus is completed.
Data-efficient security of cloud storages
Elis, Martin ; Fujdiak, Radek (referee) ; Člupek, Vlastimil (advisor)
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.
Testing Applications Using Linux Containers
Marhefka, Matúš ; Rogalewicz, Adam (referee) ; Smrčka, Aleš (advisor)
This thesis discusses software containers (Docker containers in particular) as a variant of server virtualization. Instead of virtualizing hardware, software containers rest on top of a single operating system instance and are much more efficient than hypervisors in system resource terms. Docker containers make it easy to package and ship applications, and guarantee that applications will always run the same, regardless of the environment they are running in. There is a whole range of use cases of containers, this work examines their usage in the field of software testing. The thesis proposes three main use case categories for running software systems in Docker containers. It introduces aspects for applications running in containers, which should give a better overview about an application setting within containers infrastructure. Subsequently, possible issues with testing software systems running inside Docker containers are discussed and the testing methods which address the presented issues are proposed. One proposed testing method was also used in the implementation of the framework for testing software running in Docker containers which was developed within this work.
Communication infrastructure virtualization platform
Stodůlka, Tomáš ; Martinásek, Zdeněk (referee) ; Uher, Václav (advisor)
The thesis deals with selection of infrastructure virtualization platform focusing on containerization with sandboxing support and with following examination of its difculty. The work begins with an explanation of the basic technologies such as: virtualization, cloud computing and containerization, along with their representatives, that mediate the technology. A special scope is defned for cloud computing platforms: Kubernetes, OpenStack and OpenShift. Futhermore, the most suitable platform is selected and deployed using own technique so that it fullflls all the conditions specifed by thesis supervisor. Within the difculty testing of the selected platform, there are created scripts (mainly in the Bash language) for scanning system load, creating scenarios, stress testing and automation.
Cyber game for the OpenStack platform
Píš, Patrik ; Holasová, Eva (referee) ; Martinásek, Zdeněk (advisor)
This bachelor's thesis presents matters of penetration testing and ethical hacking with primary focus on binary exploitation. The main goal of this bachelor's thesis was to design and implement a cyber game which focuses on combining various exploitation techniques and presenting them in educative and engaging way. The theoretical part of this thesis concentrates on penetration testing methodology and provides a detailed analysis of a given vulnerability's mechanics and technologies that were crucial for the game's development. Practical part of this thesis consists of a detailed description of the game's design and implementation to OpenStack and cyber arena platforms. Additionally, the practical part of this thesis focuses on development of vulnerable applications, methodology and steps necessary for their successful exploitation. Due to the character of cyber game, a few protection mechanisms were necessary to deploy, and their description takes place in practical part of this bachelor's thesis as well.

National Repository of Grey Literature : 225 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.