National Repository of Grey Literature 52 records found  beginprevious33 - 42next  jump to record: Search took 0.00 seconds. 
Integration of SELinux Audit Logs into ABRT Tool
Vrabec, Lukáš ; Kačic, Matej (referee) ; Barabas, Maroš (advisor)
The main aim of the thesis is to introduce the security of Linux operating systems and the access control list mechanism. The thesis focuses on processing security messages produced by the security mechanism into logging services and on displaying those messages. In addition, the thesis includes a concept solution and its implementation, which integrates security messages into a centralized system, keeps them and reports bugs in the Linux community distribution Fedora and in the Linux commercial distribution Red Hat Enterprise Linux.
Integration of Apple Mac computers into corporate environment
Světlík, Martin ; Bruckner, Tomáš (advisor) ; Rathouský, Tomáš (referee)
Corporate informatics has undergone a number of changes in past few years. Used devices are becoming more independent from the OS, they rely more on provided services and the level of security. Cloud technologies are increasingly growing in significance and a large number of companies offer their employees BYOD (Bring Your Own Device). This thesis focuses on integration of Apple Mac computers into corporate environments, based on analysis of contemporary approaches and possibilities of dealing with integration. An important part of this thesis is research of chosen implemented solutions in the Czech republic. From both parts of this thesis it then offers recommendations, which are based on practical experience of companies that widely use and deal with integration of Mac computers.
Apple's Marketing
Prokůpek, Ondřej ; Havlíček, Zdeněk (advisor) ; Hřebejková, Jana (referee)
The theme of the thesis is the analysis of Apple's marketing tools. The main goal is to find out why the company sells their products in current quantity. The first part contains the theory of history and also contains current economic statistics. The next chapter demonstrates differences in the management of the company compared to other companies in the competitive environment. The last theoretical part describes main competitors in the market. The practical part via using the questionnaire finds out whether the theoretical knowledges are similar to practical data obtained in field research and online.
AUTOMATED TESTING OF 10GbE DEVICES
Avramović, Nikola ; Dvořák, Vojtěch (referee) ; Fujcik, Lukáš (advisor)
Tato práce se zabývá návrhem modelu pro funkční verifikaci a návrhem syntetizovatelného testru 10Gb Ethernet zařízení, které používají XGMII rozhraní. Pro popis modelu je použit programovací jazyk VHDL. Práce zahrnuje vytváření bus functional modelu a návrh testru, který se implementuje jako genericky self-test modul. Výsledný návrh umožňuje verifikaci a testování PHY a MAC vrstve. Pro implementaci testru byla použita vývojová deska DE5-Net osazena FPGA obvodem Stratix V GX od firmy Altera.
Modern access control system
Vomáčka, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
The thesis describes the design of scheme for access system with user authentication via smart cards. The first chapter explains various types of identification items used for authentication of users and different types of readers and terminals, followed by chapter 2 with a deeper insight on smart cards with focus on their types, what internal structure and principle of communication with card readers are used, etc. with primary focus on Java cards. The third chapter describes Java Card cryptography - especially elliptic curve cryptography used on this platform. The fourth part focuses on PACE protocol with subsections dedicated to the individual parts of the protocol and its applicability to smart cards environment. Chapter 5 explains the proposed design of the authentication scheme elaborated in the thesis, including a detailed description of specific parts, their funcionality and exemplary usage in the created applications.
Benchmarking Performance of WiFi Networks
Hrabčak, Miroslav ; Kašpárek, Tomáš (referee) ; Čejka, Rudolf (advisor)
This bachelor project discusses throughput problems of the WIFI networks. Project analyzes typical problems and factors, that affect decrease of their capacity and concentrates on typical problems of their signal path. Describes techniques of monitoring, detection and debugging causes, which affects decrease of network throughput. The project also includes the experimental testing and analyzes of standards 802.11b/g and 802.11n on the labs WiFi network.
Application for Demonstration of Hash Algorithms SHA-1 and SHA-2
Siska, Josef ; Petrlík, Jiří (referee) ; Novotňák, Jiří (advisor)
In this thesis, the theory related to the hash algorithms SHA-1 and SHA-2 is presented, along with a description of possible implementation of an application that demonstrates how these algorithms work. The first part of this thesis describes the principles of construction of hash functions, their use and history of selected hash functions. The two following chapters present conventions and algorithms of the SHA-1 and SHA-2. The next chapter describes the general concepts related to the attacks on the hash functions and selected attacks are presented in more detail. The last two chapters outline the design and implementation of an application that was created as part of this work. In the end the evaluation of results of this thesis and proposals for its possible continuation are presented.
Comparison of Cryptographic Libraries in Linux Environment
Bartoš, Milan ; Malinka, Kamil (referee) ; Barabas, Maroš (advisor)
Bachelor's thesis deals with the comparison of the three cryptographic libraries used in the Linux environment. These are GnuTLS/nettle, NSS and OpenSSL. These are compared in terms of support for basic cryptographic functionality (symmetric and asymmetric ciphers, hash algorithms, SSL/TLS), working with hardware tokens and SSL/TLS. Libraries are also compared in terms of API design with a focus on stability and work with certificates and the possibility of more independent use of the library in a single process.
Modelling and Reliability Analysis of Campus Network at the BUT
Kraus, Zdeněk ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis informs about technologies and architecture of computer network at BUT.  It describes chosen technologies and some of theirs variants.  Further, it contains simulation model design of a network switch device.  That is followed by the model implementation with detailed description of model parts. Then, the model is tested on a set of simulation scenarios and it is evaluated in comparison with theoretical basis and real devices.  In conclusion, thesis suggests future model development and improvements.
An Analysis of Selected Layer 2 Network Attacks
Lomnický, Marek ; Ráb, Jaroslav (referee) ; Ryšavý, Ondřej (advisor)
This MSc Thesis focuses on principles, practical performability and security against four attacks used in contemporary local-area networks: CAM Table Overflow capable of capturing traffic in switched networks, ARP Man-in-the-Middle, whose target is to redirect or modify traffic and against two variants of VLAN Hopping attack allowing a hacker to send and capture data from VLANs he has no access to.

National Repository of Grey Literature : 52 records found   beginprevious33 - 42next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.