Search

Your search keyword '"Veber, Jaromír"' showing total 118 results

Search Constraints

Start Over You searched for: Author "Veber, Jaromír" Remove constraint Author: "Veber, Jaromír" Language czech Remove constraint Language: czech
118 results on '"Veber, Jaromír"'

Search Results

5. Cloud computing services in Czech republic

6. Hodnocení podmínek pro rozvoj cloud computingu v ČR.

11. Analysis of the current state of Internet of things wireless network's and it's future development

12. Use of Raspberry Pi in the home

13. Securing web applications using the offensive security methods

14. Internet of Things - intelligent housing infrastructure

15. Web application security testing

16. NFC payments using mobile phone

17. Využití Raspberry Pi jako centrály pro Apple HomeKit

18. Analysis of wireless network security in home area

19. GetSimple content management system security testing

20. Elektronický mýtný systém

21. Optimalization of PPC campaign

22. Information Security Management System in the company BluePool s.r.o

23. Methods for identification and preparation of incident solutions caused by malicious software

24. Internet of things and navigation applications

25. Analysis of mobile applications and platforms in selected directions

26. Analysis of the current state of cybercrime in the EU

27. Phishing in the gaming industry

28. Knowledge sharing applications and their safety

29. Analysis of security access to internet banking via mobile devices

30. Útoky typu odepření služby (denial of service)

31. E-mailový server a ochrana proti spamu

32. Internet in Cuba and Censorship

33. Security and Risk Analysis in Practice

34. Vulnerability assesment tools

35. IT risk management in trading company

36. Spam, risks and countermeasures from the position of selected banking entities od Czech Republic

37. Analysis of modern payment methods

38. Malware, hrozba internetu - typy a ochrana

39. Digitální forenzní věda a její aplikace při forenzním auditu účetnictví

40. Analysis of deal-of-the-day services market from the viewpoint of security

41. Vulnerability Management in the Corporate IT Infrastructure

42. Optimalizace práce s DOM

43. Bitcoin

44. Web Application Security Testing and implementation of fixes

45. Metody a nástroje malwarové analýzy

46. Security risks of smartphones

47. Anonymization on the Internet with focus on the end user

48. Requirements analysis and design of registration IS - case study

49. Censorship of internet in Russia

50. Malware - rizika a protiopatření

Catalog

Books, media, physical & digital resources