Printové médiá

 

 

Euro 33-34/2022https://www.aec.cz/cz/ztisku/igor-cech-povoleni-krast-lhat-a-podvadet-euro-2022-33-34.pdfEuro 33-34/2022<img alt="" src="/cz/PublishingImages/articles/2022/igor-cech-povoleni-krast-lhat-a-podvadet-euro-2022-33-34.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor-čech-2019.png" style="BORDER: 0px solid; ">
Elita 1/2022https://www.aec.cz/cz/ztisku/lubomir-almer-system-vcasneho-varovani-elita-2022-01.pdfElita 1/2022<img alt="" src="/cz/PublishingImages/articles/2022/lubomir-almer-system-vcasneho-varovani-elita-2022-01.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; ">
DSM 2/2022https://www.aec.cz/cz/ztisku/jakub-rubas-virova-stranka-dsm-2022-02.pdfDSM 2/2022<img alt="" src="/cz/PublishingImages/articles/2022/jakub-rubas-virova-stranka-dsm-2022-02.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jakub-rubas.png" style="BORDER: 0px solid; ">
IT Systems 5/2022https://www.aec.cz/cz/ztisku/lubomir-almer-efektivni-rizeni-bezppecnostnich-incidentu-it-systems-2002-05.pdfIT Systems 5/2022<img alt="" src="/cz/PublishingImages/articles/2022/lubomir-almer-efektivni-rizeni-bezppecnostnich-incidentu-it-systems-2002-05.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; ">
IT Systems 3/2022https://www.aec.cz/cz/ztisku/martin-klubal-hackeri-s-sedymi-klobouky-it-systems-2022-03.pdfIT Systems 3/2022<img alt="" src="/cz/PublishingImages/articles/2022/martin-klubal-hackeri-s-sedymi-klobouky-it-systems-2022-03.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
FinMag 16. 3. 2022https://www.aec.cz/cz/ztisku/martin-koppon+igor-cech-lzou-kradou-a-podvadeji-a-vy-jim-za-to-jeste-zaplatite-finmag-2022-03.pdfFinMag 16. 3. 2022<img alt="" src="/cz/PublishingImages/articles/2022/martin-koppon+igor-cech-lzou-kradou-a-podvadeji-a-vy-jim-za-to-jeste-zaplatite-finmag-2022-03.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor-čech-2019.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin-koppon-2019.png" style="BORDER: 0px solid; ">
DSM 1/2022https://www.aec.cz/cz/ztisku/david-pecl-virova-stranka-dsm-2022-01.pdfDSM 1/2022<img alt="" src="/cz/PublishingImages/articles/2022/david-pecl-virova-stranka-dsm-2022-01.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
IT Systems 1-2/2022https://www.aec.cz/cz/ztisku/stanislav-klubal-tradicni-bezpecnostni-pristupy-vam-v-cloudu-prilis-nepomuzou-it-systems-2002-01.pdfIT Systems 1-2/2022<img alt="" src="/cz/PublishingImages/articles/2022/stanislav-klubal-tradicni-bezpecnostni-pristupy-vam-v-cloudu-prilis-nepomuzou-it-systems-2021-02.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/stanislav-klubal-2019.png" style="BORDER: 0px solid; ">
IT Systems 12/2021https://www.aec.cz/cz/ztisku/matej-kacic-jake-bezpecnostni-nastroje-potrebujeme-v-cloudu-it-systems-2021-12.pdfIT Systems 12/2021<img alt="" src="/cz/PublishingImages/articles/2021/matej-kacic-jake-bezpecnostni-nastroje-potrebujeme-v-cloudu-it-systems-2021-12.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
MF Dnes 17. 12. 2021https://www.aec.cz/cz/ztisku/tomas-strycek-doba-se-meni-nahrava-hackerum-mf-dnes-2021-12-17.pdfMF Dnes 17. 12. 2021<img alt="" src="/cz/PublishingImages/articles/2021/tomas-strycek-doba-se-meni-nahrava-hackerum-mf-dnes-2021-12-17.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomáš-strýček-2019.png" style="BORDER: 0px solid; ">
DSM 4/2021https://www.aec.cz/cz/ztisku/david-pecl-virova-stranka-dsm-2021-04.pdfDSM 4/2021<img alt="" src="/cz/PublishingImages/articles/2021/david-pecl-virova-stranka-dsm-2021-04.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
Elita 2/2021https://www.aec.cz/cz/ztisku/igor-cech-red-teaming-elita-2021-02.pdfElita 2/2021<img alt="" src="/cz/PublishingImages/articles/2021/igor-cech-red-teaming-elita-2021-02.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor-čech-2019.png" style="BORDER: 0px solid; ">
DSM 3/2021https://www.aec.cz/cz/ztisku/david-pecl-virova-stranka-dsm-2021-03.pdfDSM 3/2021<img alt="" src="/cz/PublishingImages/articles/2021/david-pecl-virova-stranka-dsm-2021-03.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
IT Systems 9/2021https://www.aec.cz/cz/ztisku/matej-kacic-bezpecnostni-architektura-cloudu-it-systems-2021-09.pdfIT Systems 9/2021<img alt="" src="/cz/PublishingImages/articles/2021/matej-kacic-bezpecnostni-architektura-cloudu-it-systems-2021-09.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2021https://www.aec.cz/cz/ztisku/karin-gubalova-bezpecnostni-analyzou-cloud-prostredi-muzete-predejit-velkym-komplikacim-it-systems-2021-07-08.pdfIT Systems 7-8/2021<img alt="" src="/cz/PublishingImages/articles/2021/karin-gubalova-bezpecnostni-analyzou-cloud-prostredi-muzete-predejit-velkym-komplikacim-it-systems-2021-07-08.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/karin_gubalova.png" style="BORDER: 0px solid; ">
DSM 2/2021https://www.aec.cz/cz/ztisku/david-pecl-mitre-attack-evaluations-dsm-2021-02.pdfDSM 2/2021<img alt="" src="/cz/PublishingImages/articles/2021/david-pecl-mitre-attack-evaluations-dsm-2021-03.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
Elita 1/2021https://www.aec.cz/cz/ztisku/gabriela-halamka-nemusite-byt-mistr-sveta-elita-2021-01.pdfElita 1/2021<img alt="" src="/cz/PublishingImages/articles/2021/gabriela-halamka-nemusite-byt-mistr-sveta-elita-2021-01.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/gabriela_halamka.png" style="BORDER: 0px solid; ">
Elita 1/2021https://www.aec.cz/cz/ztisku/maros-barabas-tomas-slama-jak-ubranit-firmu-pred-hackery-elita-2021-01.pdfElita 1/2021<img alt="" src="/cz/PublishingImages/articles/2021/maros-barabas-tomas-slama-jak-ubranit-firmu-pred-hackery-elita-2021-01.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_slama.png" style="BORDER: 0px solid; ">
Nextech 6/2021https://www.aec.cz/cz/ztisku/tomas-hliboky-sluzba-riadenia-zranitelnosti-dava-zmysel-len-v-povolanych-rukach-nextech-2021-06.pdfNextech 6/2021<img alt="" src="/cz/PublishingImages/articles/2021/tomas-hliboky-sluzba-riadenia-zranitelnosti-dava-zmysel-len-v-povolanych-rukach-nextech-2021-07.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_hliboky.png" style="BORDER: 0px solid; ">
IT Systems 6/2021https://www.aec.cz/cz/ztisku/matej-kacic-bezpecnostni-rizika-pri-prechodu-do-cloudu-it-systems-2021-06.pdfIT Systems 6/2021<img alt="" src="/cz/PublishingImages/articles/2021/matej-kacic-bezpecnostni-rizika-pri-prechodu-do-cloudu-it-systems-2021-06.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
Strojírenství CZhttps://www.aec.cz/cz/ztisku/michael-kupka-novodoby-prumysl-jak-jej-zabezpecit-a-vyuzit-internet-veci-naplno-strojirenstvi-2021-05.pdfStrojírenství CZ<img alt="" src="/cz/PublishingImages/articles/2021/michael-kupka-novodoby-prumysl-jak-jej-zabezpecit-a-vyuzit-internet-veci-naplno-strojirenstvi-2021-05.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michael_kupka.png" style="BORDER: 0px solid; ">
IT Systems 4/2021https://www.aec.cz/cz/ztisku/maros-barabas-tomas-slama-utoky-po-napadeni-microsoft-exchange-budou-pokracovat-it-systems-2021-04.pdfIT Systems 4/2021<img alt="" src="/cz/PublishingImages/articles/2021/maros-barabas-tomas-slama-utoky-po-napadeni-microsoft-exchange-budou-pokracovat-it-systems-2021-04.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_slama.png" style="BORDER: 0px solid; ">
DSM 1/2021https://www.aec.cz/cz/ztisku/lubomir-almer-david-pecl-hodnoceni-zranitelnosti-cast-ii-dsm-2021-1.pdfDSM 1/2021<img alt="" src="/cz/PublishingImages/articles/2021/lubomir-almer-david-pecl-hodnoceni-zranitelnosti-cast-ii-dsm-2021-1.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; ">
Security World 1/2021https://www.aec.cz/cz/ztisku/tomas-slama-maros-barabas-proskoleni-zamestnanci-jsou-nejlepsi-ochranou-firmy-security-world-2021-01-v2.pdfSecurity World 1/2021<img alt="" src="/cz/PublishingImages/articles/2021/tomas-slama-maros-barabas-proskoleni-zamestnanci-jsou-nejlepsi-ochranou-firmy-security-world-2021-01-v2.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maroš-barabas-2019.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_slama.png" style="BORDER: 0px solid; ">
DSM 4/2020https://www.aec.cz/cz/ztisku/lubomir-almer-david-pecl-hodnoceni-zranitelnosti-cast-i-dsm-2020-4.pdfDSM 4/2020<img alt="" src="/cz/PublishingImages/articles/2020/lubomir-almer-david-pecl-hodnoceni-zranitelnosti-cast-i-dsm-2020-4.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
Strojírenství CZhttps://www.aec.cz/cz/ztisku/igor-cech-velmi-dulezita-je-ted-interni-komunikace-strojirenstvi-2020-10.pdfStrojírenství CZ<img alt="" src="/cz/PublishingImages/articles/2020/igor-cech-velmi-dulezita-je-ted-interni-komunikace-strojirenstvi-2020-10.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor-čech-2019.png" style="BORDER: 0px solid; ">
Elita 2/2020https://www.aec.cz/cz/ztisku/martin-hlavac-ceska-republika-je-atraktivnim-cilem-pro-hackery-elita-2020-2.pdfElita 2/2020<img alt="" src="/cz/PublishingImages/articles/2020/martin-hlavac-ceska-republika-je-atraktivnim-cilem-pro-hackery-elita-2020-2.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin-hlaváč-2019.png" style="BORDER: 0px solid; ">
DSM 2/2020https://www.aec.cz/cz/ztisku/yehor-safonov-bezpecnost-kryptomen-a-blockchainu-dsm-2020-2.pdfDSM 2/2020<img alt="" src="/cz/PublishingImages/articles/2020/yehor-safonov-bezpecnost-kryptomen-a-blockchainu-dsm-2020-2.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/yehor_safonov.png" style="BORDER: 0px solid; ">
Hospodářské noviny 13. 5. 2020https://www.aec.cz/cz/ztisku/matej-kacic-nemocnice-ochromily-kyberneticke-utoky-hospodarske-noviny-2020.pdfHospodářské noviny 13. 5. 2020<img alt="" src="/cz/PublishingImages/articles/2020/matej-kacic-nemocnice-ochromily-kyberneticke-utoky-hospodarske-noviny-2020.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
DSM 1/2020https://www.aec.cz/cz/ztisku/martin-hlavac-skutecnost-muze-byt-horsi-nez-ocekavani-dsm-2020.pdfDSM 1/2020<img alt="" src="/cz/PublishingImages/articles/2020/martin-hlavac-skutecnost-muze-byt-horsi-nez-ocekavani-dsm-2020.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin-hlaváč-2019.png" style="BORDER: 0px solid; ">
IT Systems 12/2019https://www.aec.cz/cz/ztisku/lukas-solil-rezeni-firewallovych-politik-2-cast-it-systems-2019.pdfIT Systems 12/2019<img alt="" src="/cz/PublishingImages/articles/2019/lukas-solil-rezeni-firewallovych-politik-2-cast-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
DSM 4/2019https://www.aec.cz/cz/ztisku/jaromir-veber-rizeni-incidentu-v-souladu-se-soucasnou-legislativou-cast-2-dsm-2019.pdfDSM 4/2019<img alt="" src="/cz/PublishingImages/articles/2019/jaromir-veber-rizeni-incidentu-v-souladu-se-soucasnou-legislativou-cast-2-dsm-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jaromir_veber.png" style="BORDER: 0px solid; ">
IT Systems 11/2019https://www.aec.cz/cz/ztisku/lukas-solil-rezeni-firewallovych-politik-1-cast-it-systems-2019.pdfIT Systems 11/2019<img alt="" src="/cz/PublishingImages/articles/2019/lukas-solil-rezeni-firewallovych-politik-1-cast-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
DSM 3/2019https://www.aec.cz/cz/ztisku/jaromir-veber-rizeni-incidentu-v-souladu-se-soucasnou-legislativou-cast-1-dsm-2019.pdfDSM 3/2019<img alt="" src="/cz/PublishingImages/articles/2019/jaromir-veber-rizeni-incidentu-v-souladu-se-soucasnou-legislativou-cast-1-dsm-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jaromir_veber.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2019https://www.aec.cz/cz/ztisku/michael-kupka-nebezpecnost-iot-aneb-stale-podcenovane-riziko-it-systems-2019.pdfIT Systems 7-8/2019<img alt="" src="/cz/PublishingImages/articles/2019/michael-kupka-nebezpecnost-iot-aneb-stale-podceňovane-riziko-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michael_kupka.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2019https://www.aec.cz/cz/ztisku/david-pecl+martin-dicky-rizeni-zranitelnosti-neni-jen-o-vyberu-spravneho-nastroje-it-systems-2019.pdfIT Systems 7-8/2019<img alt="" src="/cz/PublishingImages/articles/2019/david-pecl+martin-dicky-rizeni-zranitelnosti-neni-jen-o-vyberu-spravneho-nastroje-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_dicky.png" style="BORDER: 0px solid; ">
Euro 35https://www.aec.cz/cz/ztisku/tomas-filip-kyberneticke-utoky-miri-stale-casteji-na-sme-euro-2019.pdfEuro 35<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-kyberneticke-utoky-miri-stale-casteji-na-sme-euro-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
Ekonom 33https://www.aec.cz/cz/ztisku/tomas-filip-budoucnost-firemni-ochrany-dat-spociva-v-outsourcingu-ekonom-2019.pdfEkonom 33<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-budoucnost-firemni-ochrany-dat-spociva-v-outsourcingu-ekonom-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
Euro 31https://www.aec.cz/cz/ztisku/tomas-filip-kyberneticky-utok-predstavuje-sok-euro-2019.pdfEuro 31<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-kyberneticky-utok-predstavuje-sok-euro-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
IT Systems 4/ 2019https://www.aec.cz/cz/ztisku/jaromir-veber-vliv-soucasne-legislativy-na-incident-management-it-systems-2019.pdfIT Systems 4/ 2019<img alt="" src="/cz/PublishingImages/articles/2019/jaromir-veber-vliv-soucasne-legislativy-na-incident-management-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jaromir_veber.png" style="BORDER: 0px solid; ">
IT Systems 3/2019https://www.aec.cz/cz/ztisku/petr-nadenicek-jak-ridit-zranitelnosti-lepe-a-efektivneji-it-systems-2019.pdfIT Systems 3/2019<img alt="" src="/cz/PublishingImages/articles/2019/petr-nadenicek-jak-ridit-zranitelnosti-lepe-a-efektivneji-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
DSM 1/2019https://www.aec.cz/cz/ztisku/miroslav-buda-informacni-aktiva-a-rizika-zpusoby-reseni-definovanych-problemu-ii-cast-dsm-2019.pdfDSM 1/2019<img alt="" src="/cz/PublishingImages/articles/2019/miroslav-buda-informacni-aktiva-a-rizika-zpusoby-reseni-definovanych-problemu-ii-cast-dsm-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/miroslav_buda.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://www.aec.cz/cz/ztisku/michael-kupka-trendy-v-bezpecnosti-mobilnich-zarizeni-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/michael-kupka-trendy-v-bezpecnosti-mobilnich-zarizeni-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michael_kupka.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://www.aec.cz/cz/ztisku/lukas-solil-stavime-firewallove-reseni-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/lukas-solil-stavime-firewallove-reseni-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://www.aec.cz/cz/ztisku/tomas-strycek-firmy-investuji-do-technologii-ktere-pak-nedokazou-spravne-vyuzit-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/tomas-strycek-firmy-investuji-do-technologii-ktere-pak-nedokazou-spravne-vyuzit-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
IT Systems 12/2018https://www.aec.cz/cz/ztisku/lubomir-almer-agilni-pristup-k-bezpecnosti-it-systems-2018.pdfIT Systems 12/2018<img alt="" src="/cz/PublishingImages/articles/2018/lubomir-almer-agilni-pristup-k-bezpecnosti-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; ">
DSM 4/2018https://www.aec.cz/cz/ztisku/radka-cieslarova-cviceni-cerveneho-a-modreho-tymu-dsm-2018.pdfDSM 4/2018<img alt="" src="/cz/PublishingImages/articles/2018/radka-cieslarova-cviceni-cerveneho-a-modreho-tymu-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/radka_cieslarova.png" style="BORDER: 0px solid; ">
DSM 4/2018https://www.aec.cz/cz/ztisku/miroslav-buda-problemy-spjate-s-rizenim-informacnich-aktiv-a-rizik-dsm-2018.pdfDSM 4/2018<img alt="" src="/cz/PublishingImages/articles/2018/miroslav-buda-problemy-spjate-s-rizenim-informacnich-aktiv-a-rizik-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/miroslav_buda.png" style="BORDER: 0px solid; ">