This bachelor thesis deals with the examination and processing of reports from automatic vulnerability scanners. In the beginning of the theoretical part there is a brief introduction to scanning. Further are analyzed individual outputs from scanners (reports), description of items. The next part is followed by familiarization with Common Vulnerability Scoring System, which is used in the practical part for evaluation. At the end of the first part are listed some functions of the created application. The beginning of the practical part is devoted to database design and selected framework for creation. The following is an introduction to the functions of the application and the possibility of displaying the results
The diploma thesis deals with the information security risk assessment. The theoretical part of the ...
Tato práce se zabývá problematikou bezpečnosti webových aplikací. Na začátku práce je uvedena rešerš...
This bachelor's thesis deals with detection of web vulnerabilities such as data validation flaws. Th...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
The bachelor thesis deals with security assessment in the area of data protection of a part of the i...
This thesis focuses on security of web applications, which can be measured by the results of penetra...
This bachelor thesis deals with creation of system for Vulnerability Management. Theoretical part co...
Tato práce si dává za cíl analyzovat a porovnat implementaci již existujících open source scannerů w...
This bachelor thesis deals with the concept of penetration testing and the standards that coincide w...
This bachelor thesis deals with the description of methods for identification and preparation of inc...
The aim of my bachelor thesis is to design a safe environment for the analysis of malicious software...
The bachelor thesis deals with the design, development, and implementation of a web platform to supp...
This bachelor thesis deals the world malware and what this word means. The theoretical part describe...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term s...
The diploma thesis deals with the information security risk assessment. The theoretical part of the ...
Tato práce se zabývá problematikou bezpečnosti webových aplikací. Na začátku práce je uvedena rešerš...
This bachelor's thesis deals with detection of web vulnerabilities such as data validation flaws. Th...
This bachelor thesis is focused on a specific area of information systems security, which is called ...
The bachelor thesis deals with security assessment in the area of data protection of a part of the i...
This thesis focuses on security of web applications, which can be measured by the results of penetra...
This bachelor thesis deals with creation of system for Vulnerability Management. Theoretical part co...
Tato práce si dává za cíl analyzovat a porovnat implementaci již existujících open source scannerů w...
This bachelor thesis deals with the concept of penetration testing and the standards that coincide w...
This bachelor thesis deals with the description of methods for identification and preparation of inc...
The aim of my bachelor thesis is to design a safe environment for the analysis of malicious software...
The bachelor thesis deals with the design, development, and implementation of a web platform to supp...
This bachelor thesis deals the world malware and what this word means. The theoretical part describe...
This work is aimed on documenting the use of tools for security testing of web applica-tions. First ...
This bachelor thesis adresses present day topic of broad interest, the topic of malware. This term s...
The diploma thesis deals with the information security risk assessment. The theoretical part of the ...
Tato práce se zabývá problematikou bezpečnosti webových aplikací. Na začátku práce je uvedena rešerš...
This bachelor's thesis deals with detection of web vulnerabilities such as data validation flaws. Th...