National Repository of Grey Literature 3,439 records found  beginprevious3420 - 3429next  jump to record: Search took 0.20 seconds. 

The Internet and private international law
Vágnerová, Alena ; Pauknerová, Monika (advisor) ; Dobiáš, Petr (referee)
This thesis deals with issues raised by the emergence of the Internet and e-commerce for the private international law. Using the Internet to conduct business brings up new situations that must be reflected and dealt with by law. It is to be solved whether just accommodation of current rules will be enough or new regulation will have to be adopted. At first the thesis describes specific characteristics of the Internet, such as low costs of addressing users regardless of their geographic location or possibility of performing contracts in digitalized form and legal consequences of these characteristics. The following chapter deals with principles from which stems the difference in between jurisdictional rules in common law and civil law states. It examines jurisdictional rules stated in Brussels I Regulation in relation to e-commerce, especially consumer contracts. These firm rules are aimed to secure predictability of forum and in times of the Internet they have to overcome some difficulties through autonomous definitions of European Court of Justice. The next chapter describes the approach of US courts to Internet related disputes. Since they have wide discretion they are able to react much more flexibly to technological developments. Their decisions therefore may be an inspiration for the...

A bill of exchange or promissory note as a securing instrument
Žánová, Veronika ; Horáček, Vít (advisor) ; Horáček, Tomáš (referee)
My thesis is focused on a hedging bill. There are already detailed publications on this topic written by authorities in this area. That is why I tried to shift the content of my thesis to comparison of a hedging bill with other hedging instruments. In my opinion in this way this thesis can close one gap in current literature. It is very easy to find a description and detailed information about single hedging instruments. But it is not already so easy to find a comparison in order to be able to choose the one for particular situation or relationship. In this way my thesis is divided into three main chapters. The first one deals with payment instruments, hedging instruments and instruments that stand for both (payment and hedging). It was necessary just in the beginning decide based on which factor I will be dividing instruments among these three categories. I decided for the primary purpose the instrument is intended to be used for. In this way I described single main instruments from each category and made an introductory comparison among them. Second chapter deals with a bill. A bill is well-known instrument used in the whole world. Czech Republic is not an exception. However it is more common in the rest of the world to use a bill as a means of payment, Czechs prefer its role as a hedging...

Building and using small computer networks
Koller, Martin ; Pinkas, Otakar (advisor) ; Šmejkal, Ivo (referee)
This paper is about small home computer networks. It describes history of computer networking and types of computer network's topologies. Another part is dedicated to referent model ISO/OSI and network architecture with using family of protocols TCP/IP. There are also passive and active elements of building computer networks including wireless networks and its security(e.g. cables, connectors, routers, switches etc.). In practical part there is analysis of available hardware equipment. After the analysis there is a design for home network for common family (including description about useful services). In the paper there is also complete realization of this design with all the needed tests to prove functionality. In the end, the paper gives some types, which can be used as improvements current home network. And also there is a little information about business networks.

Ancient-DNA analysis of teeth and skeletal remains with utilization of miniSTR loci.
Kvítková, Dana ; Brouček, Jaroslav (advisor) ; Dobisíková, Miluše (referee)
During the last twenty years, immense progress occurred in the area of analysis of DNA extracted from historical material. Considering the common level of preservation of tissue material, this analysis is usually executed on samples procured from bones and teeth. The analysis of soft mummified tissue is possible only in rare cases. Limiting factor of these analyses is a high degree of degradation and small amount of DNA extractable from this kind of material. First researches concentrated only on short sections of mainly mitochondrial DNA. Today, the analysis of the complete mitochondrial genome of both contemporary and extinct organisms was made possible. In case of analyses conducted on human remains, sections of nuclear DNA are far more valuable, because they can reveal information including not only subject's sex, but also possible kinship between subjects found e.g. in the same grave. Fundamental component of the whole analysis is the process of extracting DNA from cells. Probably every laboratory working with historical DNA uses a differently modified extract protocol. The main requirement for methods of extraction is to secure enough DNA with such a level of purity that would allow its use for following steps of the analysis. Taking in consideration high fragmentation of DNA, it is necessary...

Network attached storages
Laciný, Jakub ; Vokoun, Tomáš (advisor) ; Pavlík, Jan (referee)
Bachelor thesis follows up the possibilities of using NAS in small companies and households. Theoretical part is devoted to the definition of basic concepts, introduction of device, analysis of basic and extending functions. It focuses primaly on analysis of suported comunication protocols, commonly used file systems and principles of function disk arrays. One section is dedicated to data backup and NAS server protection, marginally to wireless security, which is closely related with the theme, especially in terms of data misuse. In practical part, the basic services and setings are described at the first. In further steps, the applications and functions are introduced for their subsequent use as common user as small company.

Cryptographic hash function
Čejka, Petr ; Ivánek, Jiří (advisor) ; Palovský, Radomír (referee)
The goal of this thesis is to create overview about cryptographic hash fiction. In the first part is explained what general hash function is with its use. Follows specification of cryptographic hash function with a description of the most common construction. The next chapter is focused on application of cryptographic hash function in practice with emphasis to digital signature. After this chapter is attention paid to security. At the end are presented the most popular and the most important representatives of cryptographic hash function.

Information systems security
Domány, Dušan ; Dokulil, Jiří (referee) ; Tykal, Jaroslav (advisor)
Present work studies di erent aspects of information systems security. It describes the information security goals, the designing process of the information system security, most common forms of risks and some basic methods of protection against them. Through the enclosed program it is possible to try out to design security of information system for an imaginary company and test this design through a simulation. The work contains description of this program including user guide, con guration les description, program structure and a short example of use.

Design methods for computer networks
Božek, Martin ; Stančík, Peter (referee) ; Hajný, Jan (advisor)
Bacherol‘s thesis deals with a topic of a suitable computer network design for a mid-sized infrastructure, its security and router and firewall realization. This boundary element is able to manage basic processes of network controlling between inner and outer network. There is a brief analysis of OSI model but we focused our attention on TCP/IP model more closely. Our project includes description and outlines an importance of the most common elements of the particular network type and their contribution to the security. Description of the three most frequent topologies of the infrastructure type follows. On the basis of the found information, we have chosen and analysed the most suitable topology from the security point of view. The result of the theoretical part is a network model proposal. In the practical part, some our findings are tested and implemented in a real setting. We used a technology of virtualization for the final realization and testing. Thanks to the virtualization used for realization and testing, we could configure the router and the firewall, which are boundary elements that separate the inner network from the Internet.

EU requirements for aviation security and its applicability to regional airports
Šumpela, David ; Janík, Radomír (referee) ; Šplíchal, Miroslav (advisor)
Diploma thesis is focused on summary of EU security requirements. Especially it is about EU regulations, security programs and international conventions. These regulations are applicated on Airport České Budějovice, which is now in the process of modernization and expansion. From this view is thesis concentrated on airport area segregation, their border, security check planing, capacity of each part of airport and comparison of appropriate security devices. It deals about possibility of deviation from common security rules and accept alternative security rules. There is a small mention about kinds of airport threats and theirs consequences.

Mutual relations of the European Union and Russia on energy security background
Drahotová, Veronika ; Bič, Josef (advisor) ; Buryan, Šimon (referee)
This thesis deals with the mutual relations between the European Union and Russia on energy security background. The aim of the study is to determine whether the mutual relations of the European Union and Russia are sustainable into the future. After a theoretical introduction describing energy security as a concept in terms of customer and supplier countries, in the second chapter I focuse on the current framework for energy relations between the EU and Russia, through which I will analyze the degree of interdependence between the two power blocs. Attention is also paid to the liquefied gas, which in the future could reduce dependence on Russian gas. The third chapter covers sustainability relations due to the continuing crisis in Ukraine. The reader is acquainted with the latest developments in relations between actors. I characterize the role assumed by Ukraine in relation to the European Union in the context of transportation of energy resources from Russia. They will be mentioned important transport routes, which are fossil fuels from Russia transported. In conclusion, attention is focused on two major energy projects, and it annulled the South Stream gas pipeline and alternative Turkish Stream.