No exact match found for Burda, Josef, using Burda Josef instead...
National Repository of Grey Literature 20 records found  1 - 10next  jump to record: Search took 0.10 seconds. 
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.
Design of the laboratory task for attack on fingerprint authentication
Spurný, Jiří ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
This thesis deal with personal fingerprint authentication and contains basic types of fingerprint readers included their principles of working. In this thesis are collected published attempts to this type of biometric authentication and in detail described way, how these attempts were realized . Realization of lab measurement is mentioned in practical part of thesis, is designed based on collected and evaluated information. Tendency for realization was to use materials and procedures which are available on market as well as computer technology. So no special equipment is needed for realization. Practical part describes in detail procedures for papillary lines capturing and their electronic processing. Described is also way to break through optical finger print sensor. For confirmation of procedure was made 12 artificial finger casts from Lukopren material. There casts were used to attempt on optical sensor Microsoft Fingerprint Reader with 100% success. Based on realized tests to produce artificial casts was proposed procedure for realization of laboratory measurement. This procedure is described in main part of this thesis. Proposed procedure has been confirmed in 90 minutes time limit, based on requirement to achieve time limit of school training session.
Location of attacker attempting unauthorized access to operating system
Pokorný, Josef ; Burda, Karel (referee) ; Komosný, Dan (advisor)
My master thesis estimates physical location of potential operating system attacker. It deals with basic methods of attack against operating system: spam and viruses, searching the Internet, port scanning and operating system detection. The thesis disserts about a port scanner Nmap, a port scanning detector Scanlogd and about a system log watch Swatch. The thesis deals with geolocation methods of potential operating system attacker. These geolocation methods are divided into an active and a passive types. The active methods measure delay in the Internet. The passive methods query the database. I mentioned a freely accessible Whois database and MaxMind databases. There is a program developed and practically tested. The program simulates an attacker beginning an attack by scanning ports of target machine. The program works with dataset of real IP addresses. The program also detects the attack against operating system. The real and evaluated location of an attacker is got and then shown in a map. At the end there is a review of results and data comparison with colleagues.
Firewall Security Analysis
Cigánek, Josef ; Burda, Karel (referee) ; Hajný, Jan (advisor)
The bachelor essay is about security analysis and stress testing of firewalls. The main goal is to create a testing environment for eavesdropping of all communication of the firewall, on the principal of security analysis of the hardware firewall and stress testing with device Spirent Avalanche. The theoretical part of the essay is informing the readers about the problems surrounding firewall, security audits and penetration tests. The following practical part consists of commenting on the results of chosen security analysis and stress testing, applied in a laboratory for the hardware firewalls Hillstone SG-6000-G2120 and SG-6000-M7260.
Firewall Security Analysis
Cigánek, Josef ; Burda, Karel (referee) ; Hajný, Jan (advisor)
The bachelor essay is about security analysis and stress testing of firewalls. The main goal is to create a testing environment for eavesdropping of all communication of the firewall, on the principal of security analysis of the hardware firewall and stress testing with device Spirent Avalanche. The theoretical part of the essay is informing the readers about the problems surrounding firewall, security audits and penetration tests. The following practical part consists of commenting on the results of chosen security analysis and stress testing, applied in a laboratory for the hardware firewalls Hillstone SG-6000-G2120 and SG-6000-M7260.
Mouse Gestures
Burda, Milan ; Krajíček, Václav (referee) ; Pelikán, Josef (advisor)
In the presented work, we design and implement a mouse gesture recognition application. The program integrates transparently with the operating system, thus allowing existing unmodi ed Windows applications to be controlled by gestures. In an editor provided, the user is able to de ne a custom set of gesture patterns that the program automatically learns to recognize. The recognition algorithm is based on a preprocessing phase and two di erent gesture classi ers: back-propagating arti cial neural network and k-nearest neighbors. The user is allowed to con gure both general and application specifi c gesture mappings. These specify the commands to be triggered by the individual gestures. Several new features and improvements have been proposed for further development.
Investing in sports talent
Burda, Pavel ; Strouhal, Jiří (advisor) ; Krause, Josef (referee)
The aim of this thesis is to evaluate investments in the sports talent of the young tennis players and assess the risks of the investment. The theoretical part focuses on the key concepts related to the work and the methods which are applied in the thesis. The practical part contains an evaluation of the effectiveness of investments and significance of risk factors that affect investment. This thesis uses traditional dynamic methods for evaluating investments and Monte Carlo simulation method to evaluate the significance of risk factors for investment. Part of the collection of information for the purpose of this thesis is structured conversation and expert estimation. Result of the investigation of this thesis demonstrates the suitability of an investment decision to support sporting excellence. Based on the evaluation results of the investigation of the thesis are recommended measures to eliminate risk and diversify their consequences.
Location of attacker attempting unauthorized access to operating system
Pokorný, Josef ; Burda, Karel (referee) ; Komosný, Dan (advisor)
My master thesis estimates physical location of potential operating system attacker. It deals with basic methods of attack against operating system: spam and viruses, searching the Internet, port scanning and operating system detection. The thesis disserts about a port scanner Nmap, a port scanning detector Scanlogd and about a system log watch Swatch. The thesis deals with geolocation methods of potential operating system attacker. These geolocation methods are divided into an active and a passive types. The active methods measure delay in the Internet. The passive methods query the database. I mentioned a freely accessible Whois database and MaxMind databases. There is a program developed and practically tested. The program simulates an attacker beginning an attack by scanning ports of target machine. The program works with dataset of real IP addresses. The program also detects the attack against operating system. The real and evaluated location of an attacker is got and then shown in a map. At the end there is a review of results and data comparison with colleagues.
Design of the laboratory task for attack on fingerprint authentication
Spurný, Jiří ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
This thesis deal with personal fingerprint authentication and contains basic types of fingerprint readers included their principles of working. In this thesis are collected published attempts to this type of biometric authentication and in detail described way, how these attempts were realized . Realization of lab measurement is mentioned in practical part of thesis, is designed based on collected and evaluated information. Tendency for realization was to use materials and procedures which are available on market as well as computer technology. So no special equipment is needed for realization. Practical part describes in detail procedures for papillary lines capturing and their electronic processing. Described is also way to break through optical finger print sensor. For confirmation of procedure was made 12 artificial finger casts from Lukopren material. There casts were used to attempt on optical sensor Microsoft Fingerprint Reader with 100% success. Based on realized tests to produce artificial casts was proposed procedure for realization of laboratory measurement. This procedure is described in main part of this thesis. Proposed procedure has been confirmed in 90 minutes time limit, based on requirement to achieve time limit of school training session.
Software support for cryptography education
Stančík, Peter ; Vyoral, Josef (referee) ; Burda, Karel (advisor)
The main aim of this thesis was to study, choose and decribe techniques eligible for cryptography education. A pedagogically appropriate presentation for the selected techniques' principles was to be chosen. Another goal was to create an integrated modular web interface containing a calculator focused on cryptographic operations. The eligibility of techniques was assessed accordingly to the computing processes implied by these techniques and also accordingly to the ability of being presented in an illustrative way. A program simplifying calculations used in symetric and asymetric cryptography was designed and implemented. It disposes of a web interface and one of its parts is focused on steganographic techniques. On the other hand, any pedagogically appropriate presentation interconnecting this program with theoretical findings from this field was not found.

National Repository of Grey Literature : 20 records found   1 - 10next  jump to record:
See also: similar author names
3 BURDA, Jakub
3 BURDA, Jiří
3 Burda, Jakub
13 Burda, Jan
1 Burda, Jaroslav
3 Burda, Jiří
Interested in being notified about new results for this query?
Subscribe to the RSS feed.