. "The paper deals with possible attacks against information technologies and introduces some ways of facing them. The article deals as well with security hardware and software, access control, biometric methods, safety data shredding, safety auditing, protection of personal data, etc."@en . "P\u0159\u00EDsp\u011Bvek se zab\u00FDv\u00E1 mo\u017En\u00FDmi \u00FAtoky na informa\u010Dn\u00ED technologie a navrhuje n\u011Bkter\u00E9 zp\u016Fsoby, jak t\u011Bmto \u00FAtok\u016Fm \u010Delit. Zab\u00FDv\u00E1 se bezpe\u010Dnostn\u00EDm hardwarem a softwarem, \u0159\u00EDzen\u00EDm p\u0159\u00EDstupu, biometrick\u00FDmi metodami, bezpe\u010Dnou skartac\u00ED dat, bezpe\u010Dnostn\u00EDm auditem, ochranou osobn\u00EDch \u00FAdaj\u016F aj." . . . "Automatizace" . . . "Zabezpe\u010Den\u00ED informa\u010Dn\u00EDch technologi\u00ED" . . . "0005-125X" . "RIV/00216275:25530/08:00007170!RIV09-MSM-25530___" . . "Information Technologies Safeguard"@en . "CZ - \u010Cesk\u00E1 republika" . "Zabezpe\u010Den\u00ED informa\u010Dn\u00EDch technologi\u00ED"@cs . "[76AAC87BE496]" . "406035" . . "51" . "Z(MSM0021627505)" . "Zabezpe\u010Den\u00ED informa\u010Dn\u00EDch technologi\u00ED" . "cybernetic attacks; security hardware and software; access management; biometric methods"@en . . "1"^^ . "1"^^ . "Kotyk, Josef" . . "P\u0159\u00EDsp\u011Bvek se zab\u00FDv\u00E1 mo\u017En\u00FDmi \u00FAtoky na informa\u010Dn\u00ED technologie a navrhuje n\u011Bkter\u00E9 zp\u016Fsoby, jak t\u011Bmto \u00FAtok\u016Fm \u010Delit. Zab\u00FDv\u00E1 se bezpe\u010Dnostn\u00EDm hardwarem a softwarem, \u0159\u00EDzen\u00EDm p\u0159\u00EDstupu, biometrick\u00FDmi metodami, bezpe\u010Dnou skartac\u00ED dat, bezpe\u010Dnostn\u00EDm auditem, ochranou osobn\u00EDch \u00FAdaj\u016F aj."@cs . . . . "25530" . . "Information Technologies Safeguard"@en . "Zabezpe\u010Den\u00ED informa\u010Dn\u00EDch technologi\u00ED"@cs . "5"^^ . . "RIV/00216275:25530/08:00007170" . "5" .