Computer and information security is integral part of modern way of life. People use wide range of devices in their every day lives for communication, entertainment and keeping up with current events. They do this by connecting to the Internet where they are exposed to wide range of threats like spam, phishing, malicious software and privacy concerns Information security companies need to come up with more effective and responsive means to counter these threats. Current trend is to move the information security knowledge from the end device to the so called network cloud. These clouds are clusters of servers connected to the Internet. Server clusters provide information about these threats to the user's end device. With this informat...
Cloud computing is an Internet-based way of delivering computing services. As a literature study do...
A good infrastructure, which can handle hundreds or even thousands of requests from the client and h...
Tématem diplomové práce je využití počítačového clusteru v serverových aplikacích. Práce je rozdělen...
Software development is a complex and challenging process. Throughout the history of software develo...
A good infrastructure, which can handle hundreds of even thousands of requests from the client and h...
Mobile Internet access has become increasingly popular in the past few years. This is partly due to...
Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita ...
The growth of the size of hard disks and growth of the speed of the network connecting the computers...
The aim of this study was to find out what kind of challenges are connected to the information secur...
Tujuan dari penelitian ini adalah menganalisis sebuah cluster server dengan menggabungkan dua model ...
[EN]This PhD thesis makes contributions in modelling behaviours found in different types of data acq...
Third party sources of cyber threat intelligence can be used to identify malicious network traffic i...
In a distributed computing condition, server farm comprises of number of servers, cooling and force ...
Nykypäivänä yritykset ja organisaatiot joutuvat puolustautumaan yhä hienostuneempia, hyvin koordinoi...
The threats produced by viruses in computer networks have been frequent and the subject of many stud...
Cloud computing is an Internet-based way of delivering computing services. As a literature study do...
A good infrastructure, which can handle hundreds or even thousands of requests from the client and h...
Tématem diplomové práce je využití počítačového clusteru v serverových aplikacích. Práce je rozdělen...
Software development is a complex and challenging process. Throughout the history of software develo...
A good infrastructure, which can handle hundreds of even thousands of requests from the client and h...
Mobile Internet access has become increasingly popular in the past few years. This is partly due to...
Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita ...
The growth of the size of hard disks and growth of the speed of the network connecting the computers...
The aim of this study was to find out what kind of challenges are connected to the information secur...
Tujuan dari penelitian ini adalah menganalisis sebuah cluster server dengan menggabungkan dua model ...
[EN]This PhD thesis makes contributions in modelling behaviours found in different types of data acq...
Third party sources of cyber threat intelligence can be used to identify malicious network traffic i...
In a distributed computing condition, server farm comprises of number of servers, cooling and force ...
Nykypäivänä yritykset ja organisaatiot joutuvat puolustautumaan yhä hienostuneempia, hyvin koordinoi...
The threats produced by viruses in computer networks have been frequent and the subject of many stud...
Cloud computing is an Internet-based way of delivering computing services. As a literature study do...
A good infrastructure, which can handle hundreds or even thousands of requests from the client and h...
Tématem diplomové práce je využití počítačového clusteru v serverových aplikacích. Práce je rozdělen...