National Repository of Grey Literature 2 records found  Search took 0.00 seconds. 
Verification methodology for Web services testing with SoapUI
Jirmusová, Radka ; Buchalcevová, Alena (advisor) ; Sobotka, Petr (referee)
This study is focused on web services testing with SoapUI tool, particularly on verification methodology for Web services testing with SoapUI. The main objective of this thesis is to verify the methodology. Specific goals include introduction to basic concepts and principles related to web services, a description of the testing process including types of the tests and specifics of testing web services, introduction of methodology for Web services testing with SoapUI, practical verification of the methodology on the real information system and a suggestion of how to adapt the methodology on the basis of the verification. The theoretical part summarizes basic knowledge of the web services technology and web services testing. Especially it is devoted to description of the methodology for Web services testing with SoapUI and to the introduction of the SoapUI tool. The practical part consists of the introduction of the test system in Česká pojišťovna, a. s. and Generali pojišťovna, a. s., where the methodology is verified. Next the methodology for Web services testing with SoapUI is verified. Based on this verification, there are suggestions of how to adapt or extend the methodology.
The relationship between malware attacks and the popularity of operating systems
Jirmusová, Radka ; Gála, Libor (advisor) ; Čermák, Igor (referee)
The Bachelor thesis deals with the issue of malware and operating systems. The scope of the work is to prove or disprove the relationship or dependence between the number of malware attacks and different operating systems using statistical calculations. The goal of this thesis is achieved on the basis of methodology of analysis. The thesis presents the result of the analysis used to summarize the conclusions. The work is divided into four main parts. The first part introduces the issue of malware to the reader. The second section intoduces operating systems used in the analysis. The third part defines the relationship between the malware and information technology. The final section deals with statistical calculations and achieved results. Own contribution of the thesis is to evaluate the dependencies in the monitored areas.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.