National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Case Study of Selected Network Vulnerabilities
Kolajová, Jana ; Kačic, Matej (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to deal with databases of vulnerable code bases and vulnerable applications, and to implement a tool for autonomous search and saving data from those databases to a local one. The thesis is divided into theoretical and practical parts. The theoretical part deals with my current knowledge of the main topic and creates a foundation for the implementation. Various kinds of vulnerabilities and network attacks are described in detail in this part. The practical part describes implementation of the tool and its real use.
Analysis of Application Firewalls in Online Social Networks
Zítka, Radim ; Malinka, Kamil (referee) ; Januš, Filip (advisor)
The thesis describes ways to attend social networks using automatic robots, meaning of this approach and the reasons leading social networks to use protection against automated robots. The aim of this thesis is to analyze currently used protections against automatic robots of the most famous social networks (Facebook, Twitter, LinkedIn and YouTube). These informations are available for other developers, which may use these informations to improve their protection of own websites. The output of this bachelor thesis is description of currently used social network protections and propsal of protection that reveals automatic robots based on multiple identical behaviour.
Case Study of Selected Network Vulnerabilities
Kolajová, Jana ; Malinka, Kamil (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to deal with databases of vulnerable code bases and vulnerable applications, and to implement a tool for autonomous search and saving data from those databases to a local one. The thesis is divided into theoretical and practical parts. The theoretical part deals with my current knowledge of the main topic and creates a foundation for the implementation. Various kinds of vulnerabilities and network attacks are described in detail in this part. The practical part describes implementation of the tool and its real use.
Změny hejnové hierarchie ryb jako citlivý indikátor bioaktivních látek
MACKOVÁ, Barbora
The study is a compilation of behavioural ecology knowledge, namely focused on social behaviour of fish school. It considers possible opportunity of usage of a novel, highly specific analytic method for detection of change in water chemism. The method is based on observation of changes in behavioural manifestations of Puntigrus tetrazona. Chosen parameters of behaviour are compared for a control school and for a school after intoxication with 1.5 and 2.5 vol. ? concentration of ethanol.
Analysis of Application Firewalls in Online Social Networks
Zítka, Radim ; Malinka, Kamil (referee) ; Januš, Filip (advisor)
The thesis describes ways to attend social networks using automatic robots, meaning of this approach and the reasons leading social networks to use protection against automated robots. The aim of this thesis is to analyze currently used protections against automatic robots of the most famous social networks (Facebook, Twitter, LinkedIn and YouTube). These informations are available for other developers, which may use these informations to improve their protection of own websites. The output of this bachelor thesis is description of currently used social network protections and propsal of protection that reveals automatic robots based on multiple identical behaviour.
Case Study of Selected Network Vulnerabilities
Kolajová, Jana ; Kačic, Matej (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to deal with databases of vulnerable code bases and vulnerable applications, and to implement a tool for autonomous search and saving data from those databases to a local one. The thesis is divided into theoretical and practical parts. The theoretical part deals with my current knowledge of the main topic and creates a foundation for the implementation. Various kinds of vulnerabilities and network attacks are described in detail in this part. The practical part describes implementation of the tool and its real use.
Case Study of Selected Network Vulnerabilities
Kolajová, Jana ; Malinka, Kamil (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to deal with databases of vulnerable code bases and vulnerable applications, and to implement a tool for autonomous search and saving data from those databases to a local one. The thesis is divided into theoretical and practical parts. The theoretical part deals with my current knowledge of the main topic and creates a foundation for the implementation. Various kinds of vulnerabilities and network attacks are described in detail in this part. The practical part describes implementation of the tool and its real use.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.