National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Analysis and risk assessment of construction technologies of structures in an integrated management system
Komárková, Jana ; Bednářová, Bronislava (referee) ; Vymazal, Tomáš (advisor)
This thesis deals with the analysis and evaluation of quality, environmental and safety risks and the application of appropriate methodologies to concrete construction work. For application are selected key construction technologies, which are classified according to the Classification of building structures and works (TSKP) in Chapter main building production (HSV). From ČSN EN 31010 Risk management – Risk assessment techniques were selected for work tools - Causes and effect analysis, Failure Modes and Effects Analysis (FMEA), Pareto diagram, Bow tie analysis. The aim of this thesis is to analyze and assess the quality, environmental and safety risks of selected construction technologies and conditions established an integrated management system to handle simple tools for the management andelimination.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Safety inspections in region Vysocina
Špaček, Jan ; Radimský, Michal (referee) ; Matuszková, Radka (advisor)
This thesis presents a safety inspection in selected places in the Vysocina region of the Czech Republic. Six intersections in rural and municipal areas, plus three rural road sections were selected for the inspection and an accident rate analysis. The places selected were compared in terms of the accident rate and one case of each group was then selected for a detailed safety inspection encompassing visual inspection and identification of possible hazards. By eliminating such safety hazards, it is possible to ensure a traffic fluency and to preclude traffic accidents or at least minimize the harm caused by it.
Safety inspections in region Vysocina
Špaček, Jan ; Radimský, Michal (referee) ; Matuszková, Radka (advisor)
This thesis presents a safety inspection in selected places in the Vysocina region of the Czech Republic. Six intersections in rural and municipal areas, plus three rural road sections were selected for the inspection and an accident rate analysis. The places selected were compared in terms of the accident rate and one case of each group was then selected for a detailed safety inspection encompassing visual inspection and identification of possible hazards. By eliminating such safety hazards, it is possible to ensure a traffic fluency and to preclude traffic accidents or at least minimize the harm caused by it.
Analysis and risk assessment of construction technologies of structures in an integrated management system
Komárková, Jana ; Bednářová, Bronislava (referee) ; Vymazal, Tomáš (advisor)
This thesis deals with the analysis and evaluation of quality, environmental and safety risks and the application of appropriate methodologies to concrete construction work. For application are selected key construction technologies, which are classified according to the Classification of building structures and works (TSKP) in Chapter main building production (HSV). From ČSN EN 31010 Risk management – Risk assessment techniques were selected for work tools - Causes and effect analysis, Failure Modes and Effects Analysis (FMEA), Pareto diagram, Bow tie analysis. The aim of this thesis is to analyze and assess the quality, environmental and safety risks of selected construction technologies and conditions established an integrated management system to handle simple tools for the management andelimination.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Testing e-commerce applications security
Trnka, Karel ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
The purpose of this bachelor's thesis is to describe concept of testing e-commerce applications security. The first part is dedicated to theoretical level. There are definitions of basic terms connected with the topic of this thesis followed by description of penetration testing. At the end of the first part of this bachelor's thesis there is introduction to project OWASP (Open Web Application Security Project) and documentation project Top Ten which describes ten most critical web applications security risks. Second part of this thesis is dedicated to practical penetration testing of three chosen e-commerce products. There is introduction to procedure and method of conducted and by the OWASP method standardized tests. Final report is included in next chapter also with possible solutions and recommendations based on the test results. Contribution of this thesis lies in finding vulnerabilities in selected e-commerce products. The final report will be sent to the developers of these applications together with proposals to address problems discovered.
The Influence of Both Legal and Illegal Migration on the Internal Security of the Czech Republic and the Crisis Management
HAVEL, David
The issue associated with the migration of foreigners, with the positive and negative aspects that inevitably bring, is a phenomenon that can not be left unnoticed by the authorities, regardless of whether they are migrants residing at the territory of the Czech Republic legally or illegally. Especially nowadays, when most countries are in the global economic crisis, it is the issue that deserves proper attention (with due regard for the possible impacts on the internal security of the Czech Republic, the economy, the social sphere and the citizens´ behaviour). The Czech Republic is aware of the risks associated with the high flow of immigrants. As a proof of that is, that this area has been evaluated as one of the possible non-military threats (or crisis situations) and as such it was defined in the crisis planning as a part of the Plan called {\clq},The Migration Wave of a Large Extent`` drawn by the National Security Council. This work on the topic of The Influence of Both Legal and Illegal Migration on the Internal Security of the Czech Republic and the Crisis Management contains an interpretation of the basic concepts and the development trends in the field of migration in the theoretical part and it also defines the authorities resposinble for solving of the individual issues related to the migration of foreigners. The practical part contains a situational analysis of the presence of foreigners in the South-Bohemian Region compared with the Czech Republic and also the rate of criminal activities committed by foreigners also compared with the Czech Republic as a whole. The research was conducted between the years of 2003 and 2009.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.