National Repository of Grey Literature 4 records found  Search took 0.02 seconds. 
The Introduction of Information Security Management System in IT Enterprise
Riegl, Tomáš ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This thesis deals with the introduction of information security management system in IT enterprise. It includes theoretical knowledge which are necessary for the understanding of this issue and their application for the analysis of the current state of information security, risk analysis and risk management. Last but not least for the actual implementation of information security management system in the company. The implementation of ISMS was divided into two phases. This thesis details the first phase.
Computer Network Design of High School
Riegl, Tomáš ; Čermáková, Hana (referee) ; Ondrák, Viktor (advisor)
This thesis deals with design of universal computer network. Includes analysis of current network status and the requirements of the school. Describes the technical solution of cabling system and appropriate placement of active elements. This solution comes out of a theoretical koncept based on corresponding standarts.
Computer Network Design of High School
Riegl, Tomáš ; Čermáková, Hana (referee) ; Ondrák, Viktor (advisor)
This thesis deals with design of universal computer network. Includes analysis of current network status and the requirements of the school. Describes the technical solution of cabling system and appropriate placement of active elements. This solution comes out of a theoretical koncept based on corresponding standarts.
The Introduction of Information Security Management System in IT Enterprise
Riegl, Tomáš ; Sedlák, Petr (referee) ; Ondrák, Viktor (advisor)
This thesis deals with the introduction of information security management system in IT enterprise. It includes theoretical knowledge which are necessary for the understanding of this issue and their application for the analysis of the current state of information security, risk analysis and risk management. Last but not least for the actual implementation of information security management system in the company. The implementation of ISMS was divided into two phases. This thesis details the first phase.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.