National Repository of Grey Literature 220 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
Testing Environment via Cluster Solution
Hostačný, Peter ; Kočí, Radek (referee) ; Smrčka, Aleš (advisor)
Testos is a project that aims to create a set of tools supporting automated software testing. One of its components is computational cluster whose main goal is to execute parallel tasks and provide computational resources to other tools in the project. This work details the process of its design, implementation and integration with the Testos project. It is expected that the resulting system will be in use after Testos bus is completed.
Data-efficient security of cloud storages
Elis, Martin ; Fujdiak, Radek (referee) ; Člupek, Vlastimil (advisor)
This work is focused on problematics of a cloud solution, especially on its security side. It describes the current security trends and approaches used by security engineers when creating sophisticated designs of secure cloud systems. As part of it there is a risk analysis and an overview of the most common types of attacks led against the cloud solutions. Also, this document deals with the possibilities, principles, advantages and negatives of different types of cloud distributions. Another text deals with the usual methods used for accessing the cloud. This thesis contains author’s own design of possible realization. In the next part of the document, process of building a safe cloud data storage is described together with principles of ensuring its security. In the conclusion, the author focuses on comparison of cryptographic algorithms and their behavior depending on the length of a used keys.
Testing Applications Using Linux Containers
Marhefka, Matúš ; Rogalewicz, Adam (referee) ; Smrčka, Aleš (advisor)
This thesis discusses software containers (Docker containers in particular) as a variant of server virtualization. Instead of virtualizing hardware, software containers rest on top of a single operating system instance and are much more efficient than hypervisors in system resource terms. Docker containers make it easy to package and ship applications, and guarantee that applications will always run the same, regardless of the environment they are running in. There is a whole range of use cases of containers, this work examines their usage in the field of software testing. The thesis proposes three main use case categories for running software systems in Docker containers. It introduces aspects for applications running in containers, which should give a better overview about an application setting within containers infrastructure. Subsequently, possible issues with testing software systems running inside Docker containers are discussed and the testing methods which address the presented issues are proposed. One proposed testing method was also used in the implementation of the framework for testing software running in Docker containers which was developed within this work.
Communication infrastructure virtualization platform
Stodůlka, Tomáš ; Martinásek, Zdeněk (referee) ; Uher, Václav (advisor)
The thesis deals with selection of infrastructure virtualization platform focusing on containerization with sandboxing support and with following examination of its difculty. The work begins with an explanation of the basic technologies such as: virtualization, cloud computing and containerization, along with their representatives, that mediate the technology. A special scope is defned for cloud computing platforms: Kubernetes, OpenStack and OpenShift. Futhermore, the most suitable platform is selected and deployed using own technique so that it fullflls all the conditions specifed by thesis supervisor. Within the difculty testing of the selected platform, there are created scripts (mainly in the Bash language) for scanning system load, creating scenarios, stress testing and automation.
Cyber game for the OpenStack platform
Píš, Patrik ; Holasová, Eva (referee) ; Martinásek, Zdeněk (advisor)
This bachelor's thesis presents matters of penetration testing and ethical hacking with primary focus on binary exploitation. The main goal of this bachelor's thesis was to design and implement a cyber game which focuses on combining various exploitation techniques and presenting them in educative and engaging way. The theoretical part of this thesis concentrates on penetration testing methodology and provides a detailed analysis of a given vulnerability's mechanics and technologies that were crucial for the game's development. Practical part of this thesis consists of a detailed description of the game's design and implementation to OpenStack and cyber arena platforms. Additionally, the practical part of this thesis focuses on development of vulnerable applications, methodology and steps necessary for their successful exploitation. Due to the character of cyber game, a few protection mechanisms were necessary to deploy, and their description takes place in practical part of this bachelor's thesis as well.
Summary Administration of Virtual Machines in the OVirt Project
Macko, Samuel ; Fiedor, Tomáš (referee) ; Rogalewicz, Adam (advisor)
This thesis tackles the idea of virtualization and virtual machines. Theoretical part covers basics of virtualization from various aspects. It introduces a concept of virtualization and various architectures used to achieve it. The thesis also examines most popular implementations of mentioned architectures as well as commercially available virtualization solutions using those implementations. The aim of its practical part is to design and implement desktop application for administrator level overview over virtual environment running on oVirt. The main goal is to solve some of its known issues regarding accessibility of its data.
Virtualization of virtualization software
Holovová, Simona ; Ilgner, Petr (referee) ; Lieskovan, Tomáš (advisor)
The bachelor thesis deals with virtualization. The main goal is to compare selected virtualization platforms and describe their functioning. The theoretical part describes the theoretical basis for virtualization, its fundamentals as well as various types and security threats. The practical part contains the description and the way of performing the tests as well as the used tool. Subsequently, the results obtained are interpreted and compared. The thesis is further dealing with nested virtualization and measuring its effectiveness.
Design and implementation of a call back system utilizing JBoss and unix clustering
Vakula, Juraj ; Heriban, Pavel (referee) ; Roupec, Jan (advisor)
The thesis is focused on use and implement High Availability cluster in the productive environment, where is needed to concentrate on business critical application. The main aim of this thesis is to create the environment for callback system, which consist from many software products, for example database, web, java and etc. A company has to consolidate every application in an flexible environment resistent to hardware failure, human error in order to be running 24/7.
Enterprise network management
Vaclík, Michal ; Zeman, Václav (referee) ; Novotný, Vít (advisor)
Master’s thesis discusses the design and implementation of network infrastructure for computer laboratory in Department of Communications. Thesis focuses on VLAN definitions and deployment of server virtualization, including network monitoring station.
Virtualization of computing machines and operating systems
Kadlíček, Jan ; Burget, Radim (referee) ; Novotný, Vít (advisor)
This bachelor thesis is about virtualization of machines and learning how to work with virtualization technologies, such as VirtualBox, VMware, Hyper-V, Docker Container, this paper also compares their parameters. Important part of this paper is to choose the best virtualization technology for tracking on Department of Telecommunications, based on results of tests.

National Repository of Grey Literature : 220 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.