National Repository of Grey Literature 33 records found  beginprevious23 - 32next  jump to record: Search took 0.01 seconds. 
Data and Information Communication in Small and Medium Companies
Daniel, Petr ; Daniel, Jan (referee) ; Dydowicz, Petr (advisor)
This work analyze computer network and information system working in one nameless travel agency. Comes with improvement suggestion and Microsoft Small Business Server R2 information system implementation to improve work effectiveness, quicker data exchange and more email reliability. My goal is to create the system that will make easy and uniform communication, will cover backup and data security and will secures complete company network against outside or inside attack. Bachelor work shows hardware solution as are clients pc, network infrastructure and server, and also solution as is economic point of view.
Draft of company IS/IT security policy.
Kuliš, Ota ; Princová, Irena (referee) ; Ondrák, Viktor (advisor)
The presented bachelor's thesis analyses problems of IS/IT security in the factual environment of a middle-sized Czech company and suggests a solution to these problems and its practical implementation. Taking into account the scope of security issues, the thesis is focused on the company security policy.
Company´s Security Policy
Novotná, Ivana ; Hlavenka, Jiří (referee) ; Ondrák, Viktor (advisor)
Presented Bachelor’s thesis comprehensive analyses problems of IT security of concrete Czech company medial size and suggests integrated solution of this sphere including practical implementation at the same time. According to the extent of problems I choose section of company’s security policy.
Information System Assessment and Proposal for ICT Modification
Řezáč, Michal ; Smrž,, Pavel (referee) ; Koch, Miloš (advisor)
This diploma work deals with the information system assessment and proposal for its modification. The theoretical part describes the basic concepts and issues related to information systems. The analytical part of assessing information system according to the methods for determining the current state. The design part is based on the analytical part and the main goal of this section is to design changes to improve the current situation with the subsequent economic evaluation.
Information System Assessment and Proposal for ICT Modification
Kubala, Michal ; Pieczka, Marian (referee) ; Koch, Miloš (advisor)
This Master's thesis deals with appraising information system of a company and suggesting its changes. In theoretical part are described basic issues and terms related to information systems. In analytic part is the information system assessed by methods for detecting actual situation. Proposal part is based on the analytic part and its main objective is to design changes to improve current situation with subsequent economic evaluation.
Concept of E-shop
Morávek, David ; Valenta, Jiří (referee) ; Dvořák, Jiří (advisor)
This thesis deals with a creation of a company´s electronic shopping. On the basis of the knowledge and information acquired from a theoretical part, the suggestion involves the best possibilities of electronic shopping that will lead to a stable and firm position on this kind of market, and to increase of the capital as well as the reputation of the company with potential customers.
Decision-making about cloud service providers with respect to data security
Račanský, Jan ; Matuštík, Ondřej (advisor) ; Böhmová, Lucie (referee)
Organizations that during the past years become accustomed to run its services on its on-premise solution, have increasingly to decide if they will in these days continue to operate their IT services in this way, or take advantage of new opportunities for cloud-based solution. However, the transition to this new technology, which entrusts their data into the hands of external companies, accompanied by a fear of security of their sensitive data. The main objective of this thesis is to propose a reference model that will assist organizations in their selection process of cloud service providers with respect to data security. In conclusion the quality and usefulness of this reference model is validated by knowledge and information, which are obtained during interviews with IT specialists.
Project migration of user data in a multinational company in the transition from Windows XP to Windows 7
Plzák, Vojtěch ; Bruckner, Tomáš (advisor) ; Nový, Josef (referee)
This work deals with user data migration in large companies. The actual content is preceded by a theoretical part, which summarizes the terms in the field of projects, migration and corporate directives. The practical part contains information which provides comprehensive knowledge gained from a realized project. The following chapters include defining the scope of the project and ensuring the security of data during implementation. Data security is conceived from both the perspective of stealing data from a hard drive and from the perspective of data loss caused by, for instance, improper handling. The fourth chapter is devoted to the migration process itself, recorded exactly as I applied it myself. A part listing the critical factors that I have met and suggestions for addressing them follows. Conclusion is devoted to a summary of the whole work.
Biometric data security in medicine
Horňáková, Anna ; Šárek, Milan
The paper analyzes the current status of the use of biometrics in computer security. It offers an overview of the most commonly used anatomical, physiological and behavioral biometric identification methods. The result of the work should be a new complex of methods that will allow reliable identification of the user in the most comfortable way. The resulting application of new security principles will be used to increase the protection of specialized medical record. Furthermore, there is generally conceived to extend the concept of the EHR MUDR other application areas.
Analyse of security risk in a holding company
Kaiser, Petr ; Mészáros, Jan (advisor) ; Buchalcevová, Alena (referee)
The main goal of the bachelor essay is to analyze security of information technology in holding company. Partial goal is to describe common risk of information technology in company and suggest appropriate solution. The essay is dedicated on information technology or security of data in current world. Every company, especially holding company, with many branch offices must have the data security on first place. The goal was reached by author's knowledge about company and consultation with other administrators in conjunction with theory about security in information technology. That theory was get on internet and in books dealing with those issues. Most of information is from many sources, because the essay must be as much independent as possible and verified of course. You can see in the essay that information world accelerates and the requirements for IT security are very important. The first part of the bachelor essay focus on theory about security of information technology. You can find information about history, types and attack details there. Of course there is information about types of security solution. In next part there is analyzed IT security of company. In last part are solutions of security threads that were found in the analysis. The analysis is revealed that company is trying to implement security solutions, but many of them are ignored.

National Repository of Grey Literature : 33 records found   beginprevious23 - 32next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.