• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 5
  • 2
  • Tagged with
  • 60
  • 53
  • 13
  • 11
  • 10
  • 9
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Softwarové pirátství / Software Piracy

Zemančík, Adam January 2017 (has links)
Software piracy In this thesis I explore the current state of software piracy in the Czech Republic, which proves to be quite demanding due to its illegal nature and the lack of statistical data. I also take a look at the current legal protection which is awarded to the authors of computer software. Even with new trends in software piracy I conclude, that the current protection is satisfactory. I also explain how international treaties and european legislation influence czech laws.
2

Softwarové pirátství v modelu Cloud Computing / Software piracy in the cloud computing model

Klepetko, Radim January 2012 (has links)
The thesis focuses on software piracy mainly in the context of cloud computing. Its goals are to analyze contemporary software piracy with the focus on its forms, reasons leading to it and on antipiracy techniques. Second part of the thesis defines cloud computing and focuses on two basic interdependencies with software piracy: cloud as a pirates' tool and cloud as means to fight the piracy. Based on the findings of previous parts, concluding part of the thesis suggests set of recommendations for involved parties (especially software providers, cloud service providers and cloud service users).
3

Softwarové pirátství / Software Piracy

Henzlová, Sandra January 2019 (has links)
Software Piracy Abstract This master thesis deals with software piracy, and other phenomena that comes with it. The phenomena are primarily warez groups, crackers and hackers. The work itself is divided into five parts. First part sets out foundation that this thesis is based on, it also defines terms used in this work. It is focused on computer programs, videogames. Videogames are the main target of warez groups. Warez groups compete with other groups to be the first one to break the anti-piracy protection implemented into the videogame by game developers to prevent pirates from using their videogame illegally. Second part of the work analyzes Czech and international law that is applicable onto computer programs. Its main focus is Czech law; however, it is important to describe international as it is the base for Czech law. Main part of this section deals with intellectual property rights, but administrative law protection, and criminal law protection are mentioned as well. Third part analyzes software piracy as stand-alone phenomenon, points out its declining popularity. It also describes forms of software piracy. Fourth part of this work analyzes the production of pirated goods. It describes the process that is behind software piracy, how warez groups supply the public with illegal stuff. It describes...
4

Softwarové pirátství / Software piracy

Bělecký, Jiří January 2014 (has links)
Abstarct Sofware piracy is one of the serious problems related to the developement of information society. Aim of my thesis was to describe basic attributes of this social phenomenon, characterize some of the legal and extralegal aspects associated wiht it and provide closer insight to "behind the scenes" of software piracy. The paper itself is composed of four thematic areas. First part (chapter 2) provides introduction to the theme and is devoted to legal protection of computer programs provided by relevant provisions of Czech Copyright Act (No 121/2000). Second part (chaper 3) addresses the actual characteristics of the software piracy phenomenon. My effort here was focused on finding a suitable definition of this term, outlining possible causes and effects of software piracy and describing some of the means used for distribution of pirated digital goods. Besides the description of warez scene as a pirate community sui generis, this chapter also includes subsection devoted to related ilegal ativities, such as hacking, phishing, spamming and cybersquatting. Third part of my thesis (chapter 4) analyzes the liability under criminal, administrative, civil and copyright law. Finally the fourth and final part (chapter 5) covers the basics of secondary liability of internet service providers, based on type of...
5

Softwarové pirátství / Software piracy

Boubel, Marian January 2018 (has links)
Software piracy Abstract This diploma thesis is focused on the topic of "Software piracy", especially with regard to the legal regulation of the Czech legal order, primarily to the regulation of the Act No. 121/200 Coll., on Copyright and Rights Related to Copyright and on Amendment to Certain Acts (the Copyright Act), as amended. The main goal of this diploma thesis is to describe in complexity the software piracy, its types and present the individual kinds of malware, with regard to the two possible approaches to the topic. Formally, the thesis is divided into eight chapters which are further divided into individual subchapters. The first chapter is devoted to a brief outline of the history and current trends in software piracy. The second chapter deals with the definition of the term software and describes the basic properties of computer programme. In the third chapter, individual areas of the legal protection of computer programmes are described, i.e. areas of international law, European law, and copyright, administrative and criminal law of the Czech Republic. There are also briefly presented some other forms of legal protection of software, such as contract-based protection or patent protection of software. The fourth chapter discusses the categorization of software with regard to the individual...
6

Počítačová kriminalita / Computer criminality

Vyhnálek, Aleš January 2007 (has links)
Diploma thesis characterises the most important kinds of computer crime, economically evaluates incurred harms, presents factual examples and a prognosis of the possible way of developement of this kind of crime in the future. Thesis includes legislation regarding the computer crime and possible ways of defending against it. In the end, in the form of a questionary, the thesis monitors the knowledge of students of the Faculty of management in Jindřichův Hradec about the field of computer crime and interprets these results using graphs.
7

Přístupy ke konsolidaci programové a datové základny

Stankay, Michal January 2008 (has links)
In this diploma thesis, I conduct a research into approaches to consolidating data base and source code base of the Techno.cz webserver, which is the subject of the consolidation. By consolidation I mean bringing the server into the state where documentation is produced according to given requirements, data base is changed in order to improve data structure and consistency and source code base is reorganised in order to unify source code upon one platform, improve file system organization and remove problematic characteristics of the source code in general. The goals of this thesis are to create and describe general process of consolidation, sequence and contents of its steps; to describe contents of consolidation in given areas: documentation, data base and source code base; to describe actual steps made to achieve the final state of the server. My approach to accomplishing these goals is the study of relevant literature and usage of my practical experience in the field of web development. My contribution to the topic is the creation of the general consolidation process that has a potential to be reused by similar projects. Another contribution may be the description of handling the risks and problems that emerged during the consolidation process. This topic may find itself as a valuable source of knowledge for fellow developers facing similar issues. The thesis is divided into eight chapters. After the introduction chapter 2 follows. Chapter 2 describes parameters of the Techno.cz webserver. Chapter 3 discusses software engineering methodologies in order to create suitable consolidation process. Chapter 4, 5, 6 discuss particular fields of consolidation: documentation, data base and source code. In chapter 7 I am trying to assess suitability of created processes and approaches for usage in future development. In the conclusion I summarize the thesis according to required structure.
8

Metodika pro výběr a nasazení CASE nástrojů

Hradecká, Petra January 2008 (has links)
The goal of this master’s thesis is to develop a methodology for CASE tool selection. This work consists of two parts. The first part is about software engineering, methodologies for IS development and its categorization, CASE tools and meta-modeling. The rest of the part is about methodological framework and current situation on the CASE tools market. The second part contains the methodology for selection of CASE tool. It is an open methodology and it offers a set of recommendations and procedures that are derived from best practices gathered from available resources and other similar methodologies. The main idea of this work is to devise a methodology for the CASE tools selection. The selection process is divided into several different segments that are analyzed in detail. The methodology distinguishes between both situations when the company either owns an existing CASE technology or it does not use CASE technology yet. The methodology suggests intensive internal communication during the selection and emphasizes the involvement of future users in the process. It is important to increase chance for smooth implementation and successful acceptance of the CASE in the company. The importance of considering differences in structure, character and the scope of projects, requirements for project management and maturity level of processes during the CASE tool selection process is highlighted.
9

Obrana programů před reverzním inženýrstvím

Šálek, Jiří January 2017 (has links)
This thesis deals with illegal distribution of programs. It describes methods of licencing programs and ways their restrictions. It focuses on description basic tools and techniques used to program cracking. Farther this work describes structure of executables files on MS Windows. The work is completed with malware analysis for clarification techniques masking of code. This work is complemented by a demonstration application for program code masking.
10

Autorskoprávní ochrana počítačových programů / Copyright protection of software

Stehlík, Petr January 2016 (has links)
The title of this diploma thesis: Copyright protection of computer programs The general purpose of this thesis is to describe the most important aspects of the legal protection of computer programs, particularly the aspects of copyright protection. In this thesis I describe the form in which a computer program is protected, the activities that are permitted by law in relation to a computer program and what activities constitute an unauthorised intereference with author's rights. In addition to the copyright regime I also briefly described patent protection of computer programs, since it recently was subject to heated discussions in Europe and we can anticipate further development in this matter in the future, especially with regard to the decision-making practice of the European Patent Office and possible legislative establishment of patent protection of software at EU level. I have analyzed the above mentioned aspects under the Czech law (in close relation to the law of EU) but also under the law of the USA. Therefore, another aim of this thesis was to compare the legal protection of software in the USA and in the Czech Republic (EU respectively). Finally, this thesis also describes the issue called "software piracy", i.e. illegal distribution and use of computer programs. More specifically, I...

Page generated in 0.0443 seconds