National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Analysis of Automated Generation of Signatures Using Honeypots
Bláha, Lukáš ; Barabas, Maroš (referee) ; Drozd, Michal (advisor)
In this paper, system of automatic processing of attacks using honeypots is discussed. The first goal of the thesis is to become familiar with the issue of signatures to detect malware on the network, especially the analysis and description of existing methods for automatic generation of signatures using honeypots. The main goal is to use the acquired knowledge to the design and implementation of tool which will perform the detection of new malicious software on the network or end user's workstation.
Detail in architecture. Visual art aspects of modern architecture and its application to contemporary contexts of art education
Hanuš, Jiří ; Bláha, Jaroslav (advisor) ; Slavík, Jan (referee) ; Sedláková, Radomíra (referee)
Architecture is an integral part of the (not only) visual world and human existence. Its position expands between utilitarian areas and artistic functions. But what are the specific characteristics that connects it to the visual arts? Is the current architecture visually and experientially inspiring? Dissertation develops a reflection on how, by working with architectural detail to convey a modern architecture to students at schools and permanently integrate it into the education. The goal is the linking with theoretical basis of the author's individual view of the aesthetic qualities of architectural detail with intention of finding didactic bases. As a medium to approach and grasp this phenomenon is used photography, which is seen as a smooth transition between two- dimensional and three-dimensional world. At the same time, however, it works completely autonomously. The research method is based on the principle of interpretative phenomenological analysis, in which, through the interpretation of respondent's works of art and comparison of the individual artistic creation, looking for points of contact and new possibilities for art education. The architectural detail is treated as an artistic language and also as the medium, which offers a number of alternatives, but has so far not found its full...
Optimalization of the organization of the T.G. Masaryk Library of Social Science's book collection (with emphasis on open access shelves)
Slabochová, Jitka ; Drobíková, Barbora (advisor) ; Stöcklová, Anna (referee)
This master thesis deals with an issue of optimizing organization of the library shelves in the T.G. Masaryk Library of Social Sciences in Jinonice. The first part focuses on theory and defines basic concepts of organizing open access shelves. The next part provides a comparison of open access collections in selected libraries with particular emphasis on methods of books shelving. The core part describes rearrangement of the Library's collection on the basis of implementing new categorization scheme ordered in a subject-territory manner. The thesis also presents results of a survey asking whether this new arrangement enables more effective searching in the Library's open access collection.
Analysis of Automated Generation of Signatures Using Honeypots
Bláha, Lukáš ; Barabas, Maroš (referee) ; Drozd, Michal (advisor)
In this paper, system of automatic processing of attacks using honeypots is discussed. The first goal of the thesis is to become familiar with the issue of signatures to detect malware on the network, especially the analysis and description of existing methods for automatic generation of signatures using honeypots. The main goal is to use the acquired knowledge to the design and implementation of tool which will perform the detection of new malicious software on the network or end user's workstation.
IDS system SNORT
MAURIC, Jakub
This work deals with Intrusion Detection Systems. It divides them into categories and describes their functions. It describes examples of their using. It deals primary with IDS System Snort, content of them and with an example of their implementation into an existing system. This document will be used like a short compact manual which describes a necessary theory of Intrusion Detection Systems and possibilities of their practical using.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.