National Repository of Grey Literature 48 records found  beginprevious29 - 38next  jump to record: Search took 0.02 seconds. 
The safety of seniors in the Internet cyberspace
Burešová, Martina ; Ondrušová, Jiřina (advisor) ; Cimrmannová, Tereza (referee)
DIPLOMOVÁ PRÁCE The safety of seniors in the Internet cyberspace Ing. Martina Burešová Praha 2015 This thesis focuses on issues of use of Internet environment by seniors. I deal with benefits and risks of the cyberspace. I describe how the Internet environmet can affect the quality of life. Specific risks and actions to prevent them are defined theoretically. The theoretical description is afterwards enhanced by actual experience from my long-term work of teaching courses on computers to seniors and handicapped people. I present examples of good practice. In the practical part, I concentrate on research of safe manners of seniors in the Internet cyberspace. I organized the research as secondary activity of the education itself. I used questionnaires, tests, interviews and observation for the research. The goal of the research was the evaluation of seniors' compenences of safety manners in the cyberspace. I assume from the results of the research that seniors' competences are insufficient. I believe, subject to my observation and in compliance with safe off-line communication analysis and following evaluation of hypotheses, that safe manners may be taught to seniors using appropriate method of education.
The Entry "Fashion" in Czech Encyklopedias
Schambergerová, Lucie ; Hlobil, Tomáš (advisor) ; Jarošová, Helena (referee)
The thesis "Entry "Fashion" in Czech Encyclopedias" analyses an evolution of aesthetic viewpoint of the entry "fashion" since its first appearance (the first Encyclopedia in Czech language from 1866) until recently (the Entry Fashion in 2001). The thesis research method is based on Jan Mukařovský's theory of function, value and norm of the aesthetics and his commentaries on fashion, which I made a subset to my own term aesthetic viewpoint. For better orientation I first decided to summarize particular analyses of each entry into a spreadsheet which makes development, way of characterisation and terminological variability of aesthetic viewpoint apparent in a more complete way. The main goal is to answer the following reasearch questions: 1. Do authors distinguish between fashion as a norm and fashion as a form of clothing? 2. Which terms are being used to thematize the aesthetic viewpoint? 3. What is the context of the aesthetic viewpoint of fashion?
Identity Management Design in Company
Sladovník, Lukáš ; Župka, Petr (referee) ; Ondrák, Viktor (advisor)
The bachelor's thesis deals with the issue of identity management in a company. It analyzes how the company manages identities and access and how the company audits data. Then it suggests proposals for improvement including software implementation for auditing and reporting.
Passwords and their quality
Šebková, Alena ; Pícka, Marek (advisor) ; Martínek, Tomáš (referee)
This thesis is about computer passwords and their quality. The main aim of this work is find out if a quality of the passwords depends on age, education and professes. It was created a questionnaire which was given out to many respondents. Respondents were different age and different professions. The work is divided to two parts. Theoretical part is about statistic methods, creating questionnaires and all about passwords. Practical part includes computings and results of statistic analysis.
Password Recovery of RAR, BZIP, and GZIP Archives Using GPU
Mikuš, Dávid ; Holkovič, Martin (referee) ; Hranický, Radek (advisor)
This thesis describes cryptographic protection and the implementation of file password of RAR, GZIP, BZIP formats. For password recovery multi platform Wrathion tool is used, the tool can obtain a password from an encrypted file by using its modules and password generators. The module provides parsing of input file and storing data, which are later used for password validation. To accelerate calculations, graphics card and OpenCL framework is used. The core of thesis is the implementation of Wrathion's modules for password recovery of the formats denoted above and measuring the speed and comparision with competeting tools.
Czech-French pocket dictionnaries: choice of entries vs. lemma frequency in corpora
ANTOŠOVÁ, Tereza
The aim of this dissertation is to critically evaluate the set of chosen dictionaries, concretely the set of five Czech-French contemporary pocket dictionaries. The evaluation concerns not only the overall composition but mainly the choice of respective entries in order to determine to which extent they satisfy supposed users and meet their requirements. The data are analyzed from the point of view of frequency based on the chosen corpus as well as from the point of view of potential user's needs. Besides the study, the present dissertation also includes the theoretical part which presents typology of dictionaries and the key terms from the field of lexicography are explained. This part also focuses on questions concerning dictionary composition. Furthermore the chapters about corpuses and frequency dictionaries are included. The theoretical observations from the first part are taken into consideration in the second part as well as in the overall evaluation of results.
Safety Management System Design for Company Terminal Station
Steciuk, Alexander ; Grešša, Pavol (referee) ; Ondrák, Viktor (advisor)
Bachelor’s thesis "Safety Management System for Company Terminal Stations" deals with the problems of security for terminal stations in the company at both the administrative level and at the personal. I focus more on internal than external risks. Essentially every computer user in the company. I will specify procedures to ensure information security and define authority and responsibility system for staff.
Draft of Changes Identity Management System in a Firm
Vokálek, Vojtěch ; Makara, Vladimír (referee) ; Ondrák, Viktor (advisor)
The subject of the Master thesis is to explore the integration of Identity Management System with the Information Security Management System based on theoretical knowledge and analysis of the current situation. Notify the company to gaps and make proposals for improvement.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Analysis of the Possibility of Password Break through for RAR, ZIP and 7z Formats
Prustoměrský, Milan ; Přikryl, Zdeněk (referee) ; Hruška, Tomáš (advisor)
This Thesis deals with analysis of the possiblity of password breakthrough for common compression formats and password extraction from self-extraction archives used for malicious software. Structure of compression programs, ciphers and connection between cipher and archives is described. Common and specialized attacks on archives and ciphers are described. Structure of self-extracting archives and password location is used to create extractor of passwords in self-extracting archives.

National Repository of Grey Literature : 48 records found   beginprevious29 - 38next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.