National Repository of Grey Literature 219 records found  beginprevious138 - 147nextend  jump to record: Search took 0.01 seconds. 
Design Changes to a Computer Network for Teplárny Brno, a.s.
Procházka, Marek ; Falt, Jakub (referee) ; Ondrák, Viktor (advisor)
The subject of my thesis is the analysis and design of upgrading the computer network to data transfer between different sources of heat and exchangers stations for the company Teplárny Brno, a.s.
Wireless Fidelity Networks
Řezníček, Milan ; Taft, Karel (referee) ; Koch, Miloš (advisor)
In this bachelor´s thesis I deal with the problems of wi-fi networks, concretely their security. The results of surveying are mentioned in the practical part of my work, in which I wanted to find out if at least 50% of wi-fi networks in several cities of Břeclav region are secured by WEP or WPA. Proposals how to improve wireless network security by some types of networks are mentioned in conclusion of my thesis.
Wireless Fidelity Networks
Bradáč, Dušan ; Slezák, Vít (referee) ; Koch, Miloš (advisor)
This document generally concerns of wireless networks. This job suggest building-up access point (surching for the place, economic part and technical part). Consequently suggest solutions clients stations (type of facilities, way of installations, financial and technical parts). Lastly it focus on servis in sence of repairs and renovation both access point and clients part.
Proposal for implementation of SQL database as means to improve of in-house communication
Bednář, Martin ; Tofel, Otakar (referee) ; Kříž, Jiří (advisor)
This Bachelor´s thesis is aimed to project an intranet electronic notice-board for simplification and improved effectiveness of in-house communication via Windows SharePoint Services 3.0. This thesis contains techniques used for realization of the project and techniques for its implementation in the company.
WiFi network design in the building of Labour office in Prostějov
Slunský, Tomáš ; Koutný, Vladimír (referee) ; Ondrák, Viktor (advisor)
This bachelor’s thesis analysis the present situation of the net infrastructure in the chosen organisation. Based on this analysis it is considered possibility to extend this net by the WiFi net including the choice of the suitable technologie and the proposal of the wireless net structure including the implementation of this solution into the organisation.
Project of Client-based VPN Remote Access Solution for the worldwide Retail Business Company in the region of Central Europe
Ondrák, Richard ; Havlín, Petr (referee) ; Kříž, Jiří (advisor)
The aim of this Thesis is to project and describe new Client-based Remote Access Solution for the Tesco Stores retail company in the region of Central Europe. Based on facts that the all present Tesco’s Remote Access Systems have not any longer met the increasing requirements and needs of corporate users and suppliers it is clear that the main scope is to find and implement such Solution that will meet and exceed all requirements. The main Project Aspects are to be the ease of use, security of the solution, unexacting administration of the system and user groups, and one unified Solution for the all Countries from the region of Central Europe that is suitably integrated in the Tesco IT infrastructure.
Network Infrastructure Project
Veselík, Tomáš ; Veselík, Martin (referee) ; Ondrák, Viktor (advisor)
The object of this Bachelor’s thesis is to analyze current status of network infrastructure in a chosen firm and to review possibilities of improving this network, or complete network-type change. As the result of this analysis will be the project of wireless network, including implementation in firm itself.
Modern trends in Wi-Fi IEEE 802.11 networks security
Lieskovan, Tomáš ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work treats the matters of wireless networks, Wi-Fi. The paper describes the various principles of coding, such as WEP, WPA and WPA2. At first the WEP security method is analyzed with the view of the fact that it doesn´t meet contemporary safety requirements, further its successor WPA, namely TKIP and AES authentication methods, and last but not least WPA2 which nowadays serve as a safety standard. The work assesses the safety risks of individual security methods and makes several recommendations to achieve maximum security for wireless networks. In the work a commercially available hardware and for free dissemination available software (Open Source) are used.
Apple iOS security
Zahradníček, Zdeněk ; Martinásek, Zdeněk (referee) ; Hajný, Jan (advisor)
Bachelor´s thesis deals with the iOS operating system security and creating applications for this system. Describes the basic features of the system, security, encryption, and classes for secure file storage. Another area that deals with the work is that access to the Internet and the protection of transmitted and received data. The work is described Xcode programming package, used by developers for iOS platform. Furthermore, the compiled application to examples of work with this programming package and its subsequent testing in a virtual device simulator which is part of this package. I did application that uses large numbers of 1024bit value and then use these numbers for calculations. The output of application was average time of measuring duration of calculating the mathematical operations.
The security of operating systems for mobile devices
Kolář, Jakub ; Babnič, Patrik (referee) ; Rosenberg, Martin (advisor)
This term paper explains the concepts related to security of mobile devices. The first chapter acquainted with how to develop mobile operating systems and what types are found on the market today. Then the work explains the basic types of attacks and security vulnerabilities. Further work is discussed in the most famous and most popular operating systems, from their basic descriptions, architecture, and then security. In the eighth chapter of this work is a basic description and explanation of the function code itself created by malicious applications. The chapter contains weaknesses of the Android operating system used by the application, opportunities spread of malware and protect against possible attack. In the last chapter is contained laboratory task that acquaints students with the Android operating system and focuses on knowledge inappropriately protocols used to communicate with the Internet applications.

National Repository of Grey Literature : 219 records found   beginprevious138 - 147nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.