• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 152
  • 87
  • 38
  • 26
  • 13
  • 7
  • 7
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 391
  • 86
  • 55
  • 53
  • 44
  • 39
  • 38
  • 38
  • 32
  • 32
  • 32
  • 32
  • 31
  • 30
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Brand management regionálních značek / Brand Management of Regional Brands

Štočková, Tereza January 2017 (has links)
The aim of the thesis is to introduce and evaluate regional branding occurring in the Czech republic, other countries of the European Union and the EU as a whole. On the basis of the information, the strategies of individual brand programs in the Czech Republic are evaluated and possibilities for improvement are presented. The basic methods of qualitative research used in the practical part of the thesis are the analysis of secondary data and field research. Using identified facts, own regional product is designed to meet the required criteria of the selected territory. In the form of a case study that is created as a manual, its communication activities are designed and the most appropriate branding program, including an explanation of the certification process, has been chosen.
42

Nápravná opatření k výsledkům auditu ve firmě / Nápravná opatření k výsledkům auditu ve firmě

Horálek, Jan January 2008 (has links)
Principal objective of my thesis is to create Report about review of the usability, adequacy and effectiveness of the system of the management of quality and environment in compliance with ČSN EN ISO 9001:2001 and ČSN EN ISO 14001:2005 for the year 2007. The thesis is divided in two parts which contain both theory and Report which rose from the concrete company. The result of my thesis should help to the company to regain the certificate about accomplishment of the requirement of the standard ČSN EN ISO 9001:2001 and ČSN EN ISO 14001:2005.
43

Aggregating Certificate Transparency Gossip Using Programmable Packet Processors

Dahlberg, Rasmus January 2018 (has links)
Certificate Transparency (CT) logs are append-only tamper-evident data structures that can be verified by anyone. For example, it is possible to challenge a log to prove certificate inclusion (membership) and log consistency (append-only, no tampering) based on partial information. While these properties can convince an entity that a certificate is logged and not suddenly removed in the future, there is no guarantee that anyone else observes the same consistent view. To solve this issue a few gossip protocols have been proposed, each with different quirks, benefits, assumptions, and goals. We explore CT gossip below the application layer, finding that packet processors such as switches, routers, and middleboxes can aggregate gossip passively or actively to achieve herd immunity: (in)direct protection against undetectable log misbehaviour. Throughout the thesis we describe, instantiate, and discuss passive aggregation of gossip messages for a restricted data plane programming language: P4. The concept of active aggregation is also introduced. We conclude that (i) aggregation is independent of higher-level transparency applications and infrastructures, (ii) it appears most prominent to aggregate Signed Tree Heads (STHs) in terms of privacy and scalability, and (iii) passive aggregation can be a long-term solution if the CT ecosystem adapts. In other words, not all sources of gossip must be encrypted to preserve privacy. / HITS, 4707
44

Tvorba bezpečného podniku ve vybraném průmyslovém odvětví / Creating a Secure Company in the Selected Industry

Kyselka, Petr January 2021 (has links)
This diploma thesis deals with the investigation of possible dangers threatening human health+ that may arise during activities in the construction company P&P Stavební společnost and the health and safety management system in the company. The introductory chapter introduces the construction company and its focus. The next chapter presents the theoretical background and concepts occurring in the thesis. In the following chapter, the risks of a specific company order were identified and quantified using the FMEA method, and the completed "Check-list" required to obtain the Safe Company certificate is given. Lastly, there are proposed solutions to reduce the identified risks and to successfully obtain the Safe Company certificate.
45

Bezpečný přístup do webového rozhraní / Secure access to web interface

Kazik, Milan January 2009 (has links)
This document contains basic principles and processes regarding secure access to web information system. It consists of theoretic and applied part. These are mainly written together in thesis’s chapters. Theoretic informations were tested on simple web application created in PHP computer language on Apache web server using MySQL database. In the beginning, there is an analysis of used programming environment, especially it’s advantages and disadvantages. The main part of this document is simple characterization of many security problems which can be found on many websites all around the world. In the first place it’s a handling problem of inputs and outputs in the web applications. Password disputableness is solving separatelly. Theory of a problem is analysed first of all. Then a couple of solving methods are suggested and the one which is practically realized is described in detail. There is a notification system created which is used to inform user about errors appeared in web application. In the last section there is a client and server certificates described. This document contains fully characterization of used scripts and connection between them. They are supplemented with many pictures and screenshots which are used to better understanding the disputableness of web security.
46

Projekt systému bezpečného podniku / Secure Enterprise System Project

Res, Dominik Unknown Date (has links)
Diploma thesis is focused on Safe company (original name „Bezpečný podnik“) program, which is in Czech Republic symbol for company´s extra care of safety workplace, protection of employee´s health and systemic conception of those sections. Thesis is split in more parts. Theoretical, where is stated general procedure of risk analysis, employer´s law obligations towards those risks and analysis of work accidents and its evolution in Czech Republic. In analytical part is introduced program itself, its origin, law sources, control areas, and then also its advantages and disadvantages. Realization of concrete company´s risk analysis comes as next. Practical part contains mainly student´s suggestions for provisions in field of risks rating and analysis for concrete workplaces of Teplárny Brno, a.s. Lastly, description of deficit removal from fractional inspections for upholding the certificate of complex Safe company´s audit is described.
47

Kedjebrev : Påkallande av en aktiebrevsreform med anledning av ny modern teknik

Qvist, Cecilia January 2020 (has links)
Today's paper-based system regarding share certificates has long been considered obsolete in relation to the technical development that characterizes an otherwise digital market. Especially in relation to the inconveniences the system is associated with for limited liability companies, as well as for the shareholders.  Despite it being a known fact, no changes have been made in cases where amendments to the law have been discussed through official government reports. The solutions presented in the reports have been either an implementation of a share register or an extended function of the share ledger, both requiring the abolishment of share certificates. The opinion yet remained that the positive aspects of the paper-based share certificate system overweighed the negative ones due to technological shortcomings. However, in light of recent development in modern technology, a solution might be found in blockchain technology. The overall question of this thesis is thus to what extent the paper-based system raises problems and whether satisfactory solutions can be found in new technology. In order to present effective and competitive solutions, the thesis looks beyond the national boarders, towards foreign judicial system to find alternative ways of handling the issue of share certificates. Through the international perspective, blockchain technology is presented as a potential solution. In order to assess its compatibility with the Swedish judicial system a short introduction is made regarding the underlying technology. This also helps create an understanding of its pioneering nature. The technical introduction is then followed by a theoretical application of a blockchain-based solution for handling the share certificates as well as the share ledger. This leads to the conclusion that a potential solution is found in blockchain technology which, combined with the overall assessment of the negative aspects of a paper-based system, advocates for a reform.
48

DPP: Dual Path PKI for Secure Aircraft Data Communication

Buchholz, Alexander Karl 02 May 2013 (has links)
Through application of modern technology, aviation systems are becoming more automated and are relying less on antiquated air traffic control (ATC) voice systems. Aircraft are now able to wirelessly broadcast and receive identity and location information using transponder technology. This helps reduce controller workload and allows the aircraft to take more responsibility for maintaining safe separation. However, these systems lack source authentication methods or the ability to check the integrity of message content. This opens the door for hackers to potentially create fraudulent messages or manipulate message content. This thesis presents a solution to handling many of the potential security issues in aircraft data communication. This is accomplished through the implementation of a Dual Path PKI (DPP) design which includes a novel approach to handling certificate revocation through session certificates. DPP defines two authentication protocols, one between aircraft and another between aircraft and ATC, to achieve source authentication. Digital signature technology is utilized to achieve message content and source integrity as well as enable bootstrapping DPP into current ATC systems. DPP employs cutting-edge elliptic curve cryptography (ECC) algorithms to increase performance and reduce overhead. T is found that the DPP design successfully mitigates several of the cyber security concerns in aircraft and ATC data communications. An implementation of the design shows that anticipated ATC systems can accommodate the additional processing power and bandwidth required by DPP to successfully achieve system integrity and security. / Master of Science
49

RISK FACTORS ASSOCIATED WITH PRETERM BIRTH IN THE UNITED STATES

Kaewluang, Napatsawan 13 February 2015 (has links)
No description available.
50

Developing a concept for handling IT security with secured and trusted electronic connections

Hockmann, Volker January 2014 (has links)
In this day and age, the Internet provides the biggest linkage of information, personal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies - both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to access the so-called "Triple-Play-Solutions" - Voice over lP, High-Speed-Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the Americas in 2007, and growth is likely to continue steadily in all three. As broadband moves into the mainstream, it is reshaping the telecommunications, cable and Internet access industrie [Beardsley, Scott and Doman, Andrew, and EdinMC Kinsey, Par, 2003]. Cisco [Cisco, 2012], one of the biggest network companies, will expect more than 966 exabytes (nearly 1 zettabyte) per year or 80.5 exabytes per month in 2015 and the "Global IP traffic has increased eightfold over the past 5 years, and will increase fourfold over the next 5 years. Overall, IP traffic will grow at a compound annual growth rate (CAGR) of 32 percent from 2010 to 2015" . More and more types of sensible data flow between different recipients. News from around the world are transferred within seconds from the one end to the other end of the world, and affect the financial market, stock exchange [Reuters, 2012] and also bring down whole governments. For instance, worldwide humoil might ensue if a hacker broke into the web-server of an international newspaper or news channel like N-TV in Germany or BBC in England and displayed messages of a political revolution in Dubai or the death of the CEO from Microsoft or IBM.

Page generated in 0.1371 seconds