National Repository of Grey Literature 61 records found  beginprevious52 - 61  jump to record: Search took 0.00 seconds. 
Concept of E-shop
Morávek, David ; Valenta, Jiří (referee) ; Dvořák, Jiří (advisor)
This thesis deals with a creation of a company´s electronic shopping. On the basis of the knowledge and information acquired from a theoretical part, the suggestion involves the best possibilities of electronic shopping that will lead to a stable and firm position on this kind of market, and to increase of the capital as well as the reputation of the company with potential customers.
Anti-Error Coding Systems with Block Codes
Pacher, Jakub ; Zezula, Radek (referee) ; Němec, Karel (advisor)
This work deals with selection and proven suitable error-correcting code securing aggregating errors. First we give analysis anti-error coding system and requirements rapid/fire at them. The next text is focusing on survey and characteristics often used codes, mainly Fire, Hamming and two BCHs codes. After an explanation of Hamming code use, the text describes verification of proper function anti-error system in the MathCad enviroment.
Decision-making about cloud service providers with respect to data security
Račanský, Jan ; Matuštík, Ondřej (advisor) ; Böhmová, Lucie (referee)
Organizations that during the past years become accustomed to run its services on its on-premise solution, have increasingly to decide if they will in these days continue to operate their IT services in this way, or take advantage of new opportunities for cloud-based solution. However, the transition to this new technology, which entrusts their data into the hands of external companies, accompanied by a fear of security of their sensitive data. The main objective of this thesis is to propose a reference model that will assist organizations in their selection process of cloud service providers with respect to data security. In conclusion the quality and usefulness of this reference model is validated by knowledge and information, which are obtained during interviews with IT specialists.
Security of mobile devices running Android
Novotný, Josef ; Pecinovský, Rudolf (advisor) ; Pavlíček, Luboš (referee)
The main subject of this thesis is the security of Android platform mobile devices. The goal of the thesis is to design and develop an application that will check given devices from the security point of view and to check the security of applications developed as the subject of theses created in the last few years at the University of Economics. In the first part of thesis there is an analysis of ways to secure the Android platform devices and applications and ways to attack them. Both the offline and the client/server architecture applications are also taken into consideration. The next part includes a security analysis of the selected application based on the beforehand determined criteria. An analysis and development of the application designated to examine the security of the given device is next. The outcome of the thesis is an easy to use application that can be launched on the mobile devices running Android 2.2 Froyo and higher.
Project migration of user data in a multinational company in the transition from Windows XP to Windows 7
Plzák, Vojtěch ; Bruckner, Tomáš (advisor) ; Nový, Josef (referee)
This work deals with user data migration in large companies. The actual content is preceded by a theoretical part, which summarizes the terms in the field of projects, migration and corporate directives. The practical part contains information which provides comprehensive knowledge gained from a realized project. The following chapters include defining the scope of the project and ensuring the security of data during implementation. Data security is conceived from both the perspective of stealing data from a hard drive and from the perspective of data loss caused by, for instance, improper handling. The fourth chapter is devoted to the migration process itself, recorded exactly as I applied it myself. A part listing the critical factors that I have met and suggestions for addressing them follows. Conclusion is devoted to a summary of the whole work.
Vulnerabilities of Institutional Repositories
Kovářová, Pavla
The aim of this paper is to introduce the problem concerning the threat to the data for the purposes of development and maintenance of institutional digital repositories. The paper points out to potential sources and targets of threat and security options. Therefore the goal is to raise awareness of stakeholders regarding the threatening situation. This is achieved by illustrative examples of threats that can be encountered in real situations and in particular by references to more sources of information concerning the topic.
Fulltext: nusl-_3 - Download fulltextPDF
Slides: nusl-_2 - Download fulltextPDF; nusl-_4 - Download fulltextPDF
Video: nusl-_1 - Download fulltextMP4
Analyse of security risk in a holding company
Kaiser, Petr ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
The main goal of the bachelor essay is to analyze security of information technology in holding company. Partial goal is to describe common risk of information technology in company and suggest appropriate solution. The essay is dedicated on information technology or security of data in current world. Every company, especially holding company, with many branch offices must have the data security on first place. The goal was reached by author's knowledge about company and consultation with other administrators in conjunction with theory about security in information technology. That theory was get on internet and in books dealing with those issues. Most of information is from many sources, because the essay must be as much independent as possible and verified of course. You can see in the essay that information world accelerates and the requirements for IT security are very important. The first part of the bachelor essay focus on theory about security of information technology. You can find information about history, types and attack details there. Of course there is information about types of security solution. In next part there is analyzed IT security of company. In last part are solutions of security threads that were found in the analysis. The analysis is revealed that company is trying to implement security solutions, but many of them are ignored.
Security in Oracle database
Lukanič, Michal ; Čermák, Igor (advisor) ; Pour, Jan (referee)
The amount of electronically stored data is constantly growing. That's why we should consider the data security. Most electronic information is stored in the database. This thesis is concerned with ensuring data security in the Oracle database. First of all, I describe some of the available security surveys, to make it clear why we need to ensure the data security. In addition, I also describe the main aspects of information security. The aim is to introduce what we mean by security of information. Then I examine the recommendations of ISO 17799 standard, which is one of the sources for the measures described in the main part of this thesis. The next part is dedicated to finding the important security threats, which are used as a basis for following description of security tools. The aim of described recommendations and threats is to discover what is needed to ensure the data security. In the main part of this thesis I discuss the various security tools and procedures. The main objective of this thesis is the description of tools and procedures to ensure data security, following the recommendations of international standards and typical security threats. All described tools are part of the Oracle database. I place emphasis on the user access control.
Data Security in Biomedicine
Horňáková, Anna
This thesis analyzes current state of use of biometrics in computer security. It provides an overview of the most commonly used anatomical-physiological and behavioral biometric identification methods. The result of the work will be a new set of methods, which allows reliable identification of the user in the most comfortable way. These new principles of data security will be used to enhance the protection of specialized health record. This will contribute to expansion of generally conceived EHR MUDR concept to other application areas.
Fulltext: content.csg - Download fulltextPDF
Plný tet: 0364973 - Download fulltextPDF
Data security in computer systems
Matejka, Ján
The author put emphasis on the explanation of some marginal aspects of the Czech Electronic Signature Act and outlined the possible legal impact of some activities related to the application of electronic signature in practice. The authors' ambition was also to outline the systematic interpretation of some questions concerning the legal adaptation of electronic signing with the private and public law points of view. One of the main aims of this work was also to compare some terms in the Directives and the Act. The author also tried to discuss several controversial and not very appropriate legal implementations in the Czech Republic.

National Repository of Grey Literature : 61 records found   beginprevious52 - 61  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.