National Repository of Grey Literature 1,352 records found  previous11 - 20nextend  jump to record: Search took 0.03 seconds. 
Secure, reliable and adaptive network based on Cisco devices
Lefler, Přemysl ; Komosný, Dan (referee) ; Kubánková, Anna (advisor)
This bachelor thesis deals with design of secure, reliable and adaptive network using Cisco network devices. Thesis includes design of a network with description of each individual technology, that were used in the design to meet requirements for safety, reliability and adaptivity. The last chapter describes frequently occuring network attacks along with a description of their execution followed by implementation of defense against them.
Web Services Security for a Service Consumer
Novotný, Petr ; Weiss, Petr (referee) ; Rychlý, Marek (advisor)
The objective of this project was to introduce to a reader different possibilities of a web security and its authentication. Another part of this project was to create a client application communicates with the web service. The client part should at the some time serve the web services developer for checking chosen web securities.
Digital certificates and certificate authorities
Lepa, Ondřej ; Hajný, Jan (referee) ; Člupek, Vlastimil (advisor)
This diploma thesis deals with certification and certification authorities, certification path PKI and principles of its validation and security. Also deals with structure of certificate itself and possible misuse of included information. Moreover, possibility of misues of third party certificates and proclamation of untrusted certificate to client's system.
How to Get a Secure Information System HZS JMK
Sečkařová, Hana ; Příkaský, Petr (referee) ; Dvořák, Jiří (advisor)
The concept model for the safe operation of the information system (IS) at the level of management control in Fire and Rescue Brigade (HZS) Southern Region (JMK).
Home Security and Monitoring System
Valach, Lukáš ; Crha, Adam (referee) ; Šimek, Václav (advisor)
The thesis elaborates on an implementation of wireless home security system. The wireless communication utilizes IEEE 802.15.4 radios and ZigBee communication protocol. The beginning of the thesis provides specification of the intended system followed by an evaluation of usable energy harvesting solutions and later by consideration of single board computer systems suitable for implementation of the control node of the sensor network. The rest of the thesis describes design, implementation and testing of particular components of the security system. Conclusion evaluates the achieved goals and offers suggestions for future work. The end products of the thesis are physical devices implementing wireless sensor nodes, control unit of the security system as well as a graphical user interface for the system management.
Secure data transmition using bar codes
Kratochvíl, Martin ; Herout, Adam (referee) ; Beran, Vítězslav (advisor)
The goal of this thesis was to create a system for visual data transmition using bar codes. It focuses mainly on the protection of the system against abuse. A mechanism was designed for the data transmition itself and the various security concepts. The most appropriate bar code for data transmition was selected on the basis of the analysis.
The model of direct payments in the internet business
Svobodová, Kateřina ; Dvořák,, Jiří (referee) ; Dvořák, Jiří (advisor)
Diploma thesis is sighting to function direkt payments in electronic scene. Diploma thesis is determining model, which helping with direct payments in the internet business. The aim of diploma thesis is proposal model, which will have better conditions for direkt payments in e-shop. It was better for all companies, which use direct payments in their electronic business. Product of this thesis is abstractedly model, which is applicable for all internet business.
Secure reading of smart meters
Chaloupková, Denisa ; Mlýnek, Petr (referee) ; Kohout, David (advisor)
The work deals with the implementation of the secure push mode of the DLMS standard. It introduces the DLMS/COSEM standard, contains a theory for message security and describes how push works and its attributes. The Gurux library in Java is used and the example gurux.dlms.push.listener is modified. The Raspberry Pi platform is used as the server. Wireshark and the Gurux DLMS Translator available in Gurux GXDLMSDirector were used to verify security of a push message. Subsequently, push messages are compared in terms of their size according to the type of security used. The larger the content of the data sent in the message, the smaller the additional data needed to secure the messages in proportion to the total volume.
The protection of small village Světnov against rural zone water
Humlíček, Aleš ; Novotný, Jaroslav (referee) ; Milerski, Rudolf (advisor)
The aim of this thesis is to propose appropriate flood protection measures in the small village Světnov, calculate the critical flood of guideline for very small basin and insert the data into the program HEC-RAS 4.1.0, where they will be further treated in order to find the most appropriate and effective solutions. As flood control measures will be designed two dry polders east of the village. Dikes should be designed so to be able to accommodate 100-year flood, which will be calculated according of guideline for very small basin. Of the materials community, we know that we need to convert flood into the existing pipeline, which is able to accommodate 1 m3/s. The thesis will design solutions dams, sewage channels and function objects in the program AutoCAD 2008.
Behaviour-Based Identification of Network Devices
Polák, Michael Adam ; Holkovič, Martin (referee) ; Polčák, Libor (advisor)
Táto práca sa zaoberá problematikou identifikácie sieťových zariadení na základe ich chovania v sieti. S neustále sa zvyšujúcim počtom zariadení na sieti je neustále dôležitejšia schopnosť identifikovať zariadenia z bezpečnostných dôvodov. Táto práca ďalej pojednáva o základoch počítačových sietí a metódach, ktoré boli využívané v minulosti na identifikáciu sieťových zariadení. Následne sú popísané algoritmy využívané v strojovom učení a taktiež sú popísané ich výhody i nevýhody. Nakoniec, táto práca otestuje dva tradičné algorithmy strojového učenia a navrhuje dva nové prístupy na identifikáciu sieťových zariadení. Výsledný navrhovaný algoritmus v tejto práci dosahuje 89% presnosť identifikácii sieťových zariadení na reálnej dátovej sade s viac ako 10000 zariadeniami.

National Repository of Grey Literature : 1,352 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.