|
|
|
|
| LEADER |
00000ntm a22000007u 4500 |
| 001 |
zp3420 |
| 041 |
|
|
|a eng
|
| 100 |
1 |
|
|a Mlček, Viktor
|4 dis
|
| 245 |
1 |
0 |
|a Computer criminality prevention methods
|
| 246 |
|
|
|a Computer criminality prevention methods
|
| 260 |
|
|
|c 2006
|
| 300 |
|
|
|a 76 s.
|
| 500 |
|
|
|a Studijní obor: Informační technologie
|
| 500 |
|
|
|a Studijní obor: Information Technologies
|
| 500 |
|
|
|a Ústav: Ústav aplikované informatiky
|
| 500 |
|
|
|a Tomas Bata University in Zlín. Faculty of Applied Informatics
|
| 500 |
|
|
|a Univerzita Tomáše Bati ve Zlíně. Fakulta aplikované informatiky
|
| 506 |
|
|
|a Práce bude přístupná pouze v rámci univerzity od 26.05.2008
|
| 653 |
|
|
|a analysis
|
| 653 |
|
|
|a antivirus
|
| 653 |
|
|
|a AV protection
|
| 653 |
|
|
|a system
|
| 653 |
|
|
|a attack
|
| 653 |
|
|
|a attacker
|
| 653 |
|
|
|a authentisation
|
| 653 |
|
|
|a authentification
|
| 653 |
|
|
|a certificate
|
| 653 |
|
|
|a cracker
|
| 653 |
|
|
|a cipher
|
| 653 |
|
|
|a cryptoanalysis
|
| 653 |
|
|
|a cryptography
|
| 653 |
|
|
|a data
|
| 653 |
|
|
|a data protection
|
| 653 |
|
|
|a decrypting
|
| 653 |
|
|
|a digital signature
|
| 653 |
|
|
|a e-mail
|
| 653 |
|
|
|a encryption
|
| 653 |
|
|
|a firewall
|
| 653 |
|
|
|a hacker
|
| 653 |
|
|
|a modification
|
| 653 |
|
|
|a protocol
|
| 653 |
|
|
|a risk
|
| 653 |
|
|
|a security
|
| 653 |
|
|
|a signature
|
| 653 |
|
|
|a spam
|
| 653 |
|
|
|a threat
|
| 653 |
|
|
|a Trojan
|
| 653 |
|
|
|a virus
|
| 653 |
|
|
|a worm
|
| 653 |
|
|
|a analýza
|
| 653 |
|
|
|a antivir
|
| 653 |
|
|
|a antivirová ochrana
|
| 653 |
|
|
|a systém
|
| 653 |
|
|
|a autentizace
|
| 653 |
|
|
|a autentifikace
|
| 653 |
|
|
|a bezpečnost
|
| 653 |
|
|
|a certifikát
|
| 653 |
|
|
|a cracker
|
| 653 |
|
|
|a červ
|
| 653 |
|
|
|a data
|
| 653 |
|
|
|a dešifrování
|
| 653 |
|
|
|a digitální podpis
|
| 653 |
|
|
|a e-mail
|
| 653 |
|
|
|a firewall
|
| 653 |
|
|
|a hacker
|
| 653 |
|
|
|a hrozba
|
| 653 |
|
|
|a kryptoanalýza
|
| 653 |
|
|
|a kryptografie
|
| 653 |
|
|
|a modifikace
|
| 653 |
|
|
|a ochrana dat
|
| 653 |
|
|
|a protokol
|
| 653 |
|
|
|a riziko
|
| 653 |
|
|
|a signatura
|
| 653 |
|
|
|a spam
|
| 653 |
|
|
|a šifra
|
| 653 |
|
|
|a šifrování
|
| 653 |
|
|
|a trojský kůň
|
| 653 |
|
|
|a útok
|
| 653 |
|
|
|a útočník
|
| 653 |
|
|
|a virus
|
| 655 |
|
4 |
|a diplomová práce
|
| 700 |
1 |
|
|a Jašek, Roman
|4 ths
|
| 710 |
2 |
|
|a Tomas Bata University in Zlín. Faculty of Applied Informatics
|4 dgg
|
| 710 |
2 |
|
|a Univerzita Tomáše Bati ve Zlíně. Fakulta aplikované informatiky
|4 dgg
|
| 856 |
4 |
0 |
|u http://hdl.handle.net/10563/638
|y Plný text v Digitální knihovně UTB
|