• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 3
  • 1
  • Tagged with
  • 18
  • 12
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Kapesní česko-francouzské slovníky: výběr hesel vs. frekvence lemmat v korpusu / Czech-French pocket dictionnaries: choice of entries vs. lemma frequency in corpora

ANTOŠOVÁ, Tereza January 2016 (has links)
The aim of this dissertation is to critically evaluate the set of chosen dictionaries, concretely the set of five Czech-French contemporary pocket dictionaries. The evaluation concerns not only the overall composition but mainly the choice of respective entries in order to determine to which extent they satisfy supposed users and meet their requirements. The data are analyzed from the point of view of frequency based on the chosen corpus as well as from the point of view of potential user's needs. Besides the study, the present dissertation also includes the theoretical part which presents typology of dictionaries and the key terms from the field of lexicography are explained. This part also focuses on questions concerning dictionary composition. Furthermore the chapters about corpuses and frequency dictionaries are included. The theoretical observations from the first part are taken into consideration in the second part as well as in the overall evaluation of results.
2

Distribuované generování hesel pomocí pravděpodobnostních gramatik / Distributed Password Generation Using Probabilistic Grammars

Mikuš, Dávid January 2019 (has links)
This thesis describes a process of cracking a password, existing types of attacks and generating passwords using probabilistic grammar. This grammar can be used as an attack that works on the basis of learning from an existing list of passwords and generating them by using constructed context-free grammar from the learning phase. The core of this thesis is the design and implementation of distribution solution for this type of attack. Implementation includes refactoring of existing solution and optimization to maximize use of every available resource.
3

Google ekonometrie: Aplikace na Českou republiku / Google Econometrics: An Application to the Czech Republic

Platil, Lukáš January 2014 (has links)
This thesis examines the applicability of Google Econometrics - the use of search volume data of particular queries as explanatory variables in time se- ries modeling - in the case of the Czech Republic. We analyze the contribu- tion of Google data by comparing out-of-sample nowcasting performance and in-sample fit with control variables in three related areas: using an auto- regressive model for unemployment, vector autoregression and logit models for GDP and household consumption, and Granger causality test for consum- er confidence. The improvement in quality of unemployment nowcasting is modest but statistically significant; sentiment index based on Google queries shows reciprocal relationship with the official Consumer Confidence Indicator, and it also provides superior nowcasts for household consumption as well as in- sample fit in logit models; its performance in GDP nowcasting is average among control variables. In overall, the results suggest that Google Econometrics is applicable also to the Czech Republic, despite the fact that the internet penetration rate and Google popularity was lower over the analyzed period compared with developed economies where these methods were usually tested. In the future, Google data may be used together with other leading and coincident indica- tors to...
4

Implementace OTP ve vybraném systému / OTP implementation in a selected information system

Jajtner, Petr January 2016 (has links)
At present, it is necessary to protect sensitive data against abuse, but also allow au-thorized persons to change these data. To increase the security of logging for authorized persons we often introduce a two-factors authentication, where the first step is verification of the user's identity and in a second step is required to insert a one-time password called OTP. This thesis deals with implementation of OTP and integration into the selected sys-tem. It also includes test and verification of the functionality of the selected solution.
5

Vylepšení architektury systému správy identit ve firmě / Corporate Identity and Access Management System Architecture Improvement Proposal

Nop, Dominik January 2019 (has links)
The master thesis focuses on assessment of current implementation of identity management system and proposal of a new implementation to increase level of stability and information security in the company, primarily regarding the systems that process financial data. In first part, basic theoretical knowledge related to identity management systems is defined. In second part, an analysis of current system state is performed. Based on this analysis, new organizational and technical solutions are proposed to the company. Finally, an implementation project proposal as well as with risk analysis and economic evaluation is completed in the end of this thesis.
6

Útoky pomocí programu Cain & Abel / Network attacks by Cain & Abel

Smékal, Lukáš January 2010 (has links)
This Master’s thesis is dealt in the local area network security, cryptographic algorithms, particular attacks on computer networks a practical application these attacks in local area networks. To application particular attacks is used the Cain & Abel program. The detailed manual for this program is created from the results of these attacks. This manual contains the exhibits of usage particular program tools and the attack application exhibits. This manual considers consequences of particular attacks and summarises achieved results during work with tools too. Master thesis closely deals with one of the program tools called RSA SecureID Token Calculator. Authentication via hardware tokens is contained in this Master thesis. Thesis contains the way of authentication using RSA SecureID Token Calculator without physical owning of the hardware token. Cain & Abel program shows and interprets why cashed passwords in operation system are dangerous and it shows methods how attacker can reveal this passwords from the operation system memory. This Master thesis is focused on sniffing credentials and passwords in local area networks and it is focused on cryptographic algorithms cracking for username and passwords revealing.
7

Bezpečí seniorů v internetovém prostoru / The safety of seniors in the Internet cyberspace

Burešová, Martina January 2015 (has links)
DIPLOMOVÁ PRÁCE The safety of seniors in the Internet cyberspace Ing. Martina Burešová Praha 2015 This thesis focuses on issues of use of Internet environment by seniors. I deal with benefits and risks of the cyberspace. I describe how the Internet environmet can affect the quality of life. Specific risks and actions to prevent them are defined theoretically. The theoretical description is afterwards enhanced by actual experience from my long-term work of teaching courses on computers to seniors and handicapped people. I present examples of good practice. In the practical part, I concentrate on research of safe manners of seniors in the Internet cyberspace. I organized the research as secondary activity of the education itself. I used questionnaires, tests, interviews and observation for the research. The goal of the research was the evaluation of seniors' compenences of safety manners in the cyberspace. I assume from the results of the research that seniors' competences are insufficient. I believe, subject to my observation and in compliance with safe off-line communication analysis and following evaluation of hypotheses, that safe manners may be taught to seniors using appropriate method of education.
8

Zdokonalení pravděpodobnostních metod pro lámání hesel / Enhancement of Probabilistic Methods for Password Cracking

Lištiak, Filip January 2019 (has links)
This thesis describes passwords cracking using probabilistic context-free grammars, specifically PCFG Cracker tool. The aim of the thesis is to design and implement enhancements to this tool, which reduce the size of output dictionaries while maintaining acceptable success rate. This work also solves critical parts in the tool that slow down the overall duration of the program. Another goal of the thesis is to analyze and implement targeted attack dictionaries that increase the scope and success rate of generated passwords.
9

Základy bezpečnostního povědomí pro žáky základních škol / Basics of security awareness for pupils at primary school

Přibyl, Aleš January 2020 (has links)
This diploma thesis looks at building educational modules that will serve to build a basic awareness of safety for children in primary schools. The theoretical part describes the basic information from this area. The next part describes the assignment of individual modules and also describes the schools where the teaching took place. The practical section contains detailed fillings of these education modules.
10

Návrh změn systému řízení identit ve firmě / Draft of Changes Identity Management System in a Firm

Vokálek, Vojtěch January 2016 (has links)
The subject of the Master thesis is to explore the integration of Identity Management System with the Information Security Management System based on theoretical knowledge and analysis of the current situation. Notify the company to gaps and make proposals for improvement.

Page generated in 0.0319 seconds