Tištěná a online média

 

 

IT Systems 10/2018https://aec.cz/cz/ztisku/lukas-solil-jak-na-procesy-okolo-firewallu-it-systems-2018.pdfIT Systems 10/2018<img alt="" src="/cz/PublishingImages/articles/2018/lukas-solil-jak-na-procesy-okolo-firewallu-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
IT Systems 10/2018https://aec.cz/cz/ztisku/maros-barabas+jan-poduska-budovani-ochrany-dulezitych-informaci-it-systems-2018.pdfIT Systems 10/2018<img alt="" src="/cz/PublishingImages/articles/2018/maros-barabas+jan-poduska-budovani-ochrany-dulezitych-informaci-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jan_poduska.png" style="BORDER: 0px solid; ">
DSM 3/2018https://aec.cz/cz/ztisku/lukas-antal+stanislav-klubal-bezpecnost-bankomatu-dsm-2018.pdfDSM 3/2018<img alt="" src="/cz/PublishingImages/articles/2018/lukas-antal+stanislav-klubal-bezpecnost-bankomatu-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_antal.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/stanislav_klubal.png" style="BORDER: 0px solid; ">
DSM 3/2018https://aec.cz/cz/ztisku/david-pecl-next-gen-antiviry-pokrocilejsi-zabezpeceni-nebo-jen-buzzword-1-dil-dsm-2018.pdfDSM 3/2018<img alt="" src="/cz/PublishingImages/articles/2018/david-pecl-next-gen-antiviry-pokrocilejsi-zabezpeceni-nebo-jen-buzzword-1-dil-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
DSM 2/2018https://aec.cz/cz/ztisku/matej-kacic-klasifikace-informaci-v-korporatnim-prostredi-dsm-2018.pdfDSM 2/2018<img alt="" src="/cz/PublishingImages/articles/2018/matej-kacic-klasifikace-informaci-v-korporatnim-prostredi-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
Ekonom 12/2018https://aec.cz/cz/ztisku/tomas-strycek-podniky-nici-velke-utoky-ale-take-vlastni-zamestnanci-ekonom-2018.pdfEkonom 12/2018<img alt="" src="/cz/PublishingImages/articles/2018/tomas-strycek-podniky-nici-velke-utoky-ale-take-vlastni-zamestnanci-ekonom-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
DSM 4/2017https://aec.cz/cz/ztisku/david-pecl-nova-hrozba-windows-10-umoznuje-obejit-antivirove-programy-dsm-2017.pdfDSM 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/david-pecl-nova-hrozba-windows-10-umoznuje-obejit-antivirove-programy-dsm-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
IT Systems 9/2017https://aec.cz/cz/ztisku/petr-javora-vyznam-release-a-patch-managementu-it-systems-2017.pdfIT Systems 9/2017<img alt="" src="/cz/PublishingImages/articles/2017/petr-javora-vyznam-release-a-patch-managementu-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_javora.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2017https://aec.cz/cz/ztisku/matej-kacic-information-classification-digital-economy-world-2017.pdfDigital Economy World / červen 2017<img alt="" src="/cz/PublishingImages/articles/2017/matej-kacic-information-classification-digital-economy-world-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/hana_vystavelova.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2017https://aec.cz/cz/ztisku/marian-nemec-gdpr-vyzaduje-komplexni-pristup-digital-economy-world-2017.pdfDigital Economy World / červen 2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-gdpr-vyzaduje-komplexni-pristup-digital-economy-world-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 5/2017https://aec.cz/cz/ztisku/martin-klubal-ceo-fraud-jak-jsem-hacknul-vasi-firmu-it-systems-2017.pdfIT Systems 5/2017<img alt="" src="/cz/PublishingImages/articles/2017/martin-klubal-ceo-fraud-jak-jsem-hacknul-vasi-firmu-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
IT Systems 4/2017https://aec.cz/cz/ztisku/petr-nadenicek-zivot-je-zmena-a-zmena-je-zivot-it-systems-2017.pdfIT Systems 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/petr-nadenicek-zivot-je-zmena-a-zmena-je-zivot-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems 4/2017https://aec.cz/cz/ztisku/marian-nemec-dpia-posouzeni-vlivu-na-ochranu-osobnich-udaju-dle-gdpr-systems-2017.pdfIT Systems 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-dpia-posouzeni-vlivu-na-ochranu-osobnich-udaju-dle-gdpr-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
Digital Economy World / březen 2017https://aec.cz/cz/ztisku/igor-cech-jubilejni-25-rocnik-konference-security-dew-2017.pdfDigital Economy World / březen 2017<img alt="" src="/cz/PublishingImages/articles/2017/igor-cech-jubilejni-25-rocnik-konference-security-dew-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 3/2017https://aec.cz/cz/ztisku/igor-cech-jubilejni-25-rocnik-konference-security-it-systems-2017.pdfIT Systems 3/2017<img alt="" src="/cz/PublishingImages/articles/2017/igor-cech-jubilejni-25-rocnik-konference-security-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 1-2/2017https://aec.cz/cz/ztisku/marian-nemec-vim-ze-nic-nevim-it-systems-2017.pdfIT Systems 1-2/2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-vim-ze-nic-nevim-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 12/2016https://aec.cz/cz/ztisku/martin-klubal-hromadna-doprava-jako-oblibeny-cil-hackeru-it-systems-2016.pdfIT Systems 12/2016<img alt="" src="/cz/PublishingImages/articles/2016/martin-klubal-hromadna-doprava-jako-oblibeny-cil-hackeru-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
Digital Economy World / prosinec 2016https://aec.cz/cz/ztisku/petr-nadenicek-nelehka-cesta-k-grc-digital-economy-world-2016.pdfDigital Economy World / prosinec 2016<img alt="" src="/cz/PublishingImages/articles/2016/petr-nadenicek-nelehka-cesta-k-grc-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems 11/2016https://aec.cz/cz/ztisku/marie-kratochvilova-bezpecnost-autentizace-it-systems-2016.pdfIT Systems 11/2016<img alt="" src="/cz/PublishingImages/articles/2016/marie-kratochvilova-bezpecnost-autentizace-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marie_kratochvilova.png" style="BORDER: 0px solid; ">
IT Systems 9/2016https://aec.cz/cz/ztisku/matej-kacic-bezpecnostni-rizika-pro-webove-aplikace-it-systems-2016.pdfIT Systems 9/2016<img alt="" src="/cz/PublishingImages/articles/2016/matej-kacic-bezpecnostni-rizika-pro-webove-aplikace-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
IT Systems 9/2016https://aec.cz/cz/ztisku/lukas-blaha-smart-cities-it-systems-2016.pdfIT Systems 9/2016<img alt="" src="/cz/PublishingImages/articles/2016/lukas-blaha-smart-cities-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_blaha.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/jan-poduska-logicke-kroky-k-analyze-rizik-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/jan-poduska-logicke-kroky-k-analyze-rizik-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jan_poduska.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/michal-tresner-fraud-detection-in-al-era-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/michal-tresner-fraud-detection-in-al-era-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michal_tresner.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/marian-nemec-grc-system–rizeni-firmy-uz-nemuze-byt-jednodussi-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/marian-nemec-grc-system–rizeni-firmy-uz-nemuze-byt-jednodussi-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 5/2016https://aec.cz/cz/ztisku/radko-vavrik-kauza-panama-papers-it-systems-2016.pdfIT Systems 5/2016<img alt="" src="/cz/PublishingImages/articles/2016/radko-vavrik-kauza-panama-papers-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/radko_vavrik.png" style="BORDER: 0px solid; ">
IT Systems 5/2016https://aec.cz/cz/ztisku/petr-javora-duveruj-ale-roveruj-it-systems-2016.pdfIT Systems 5/2016<img alt="" src="/cz/PublishingImages/articles/2016/petr-javora-duveruj-ale-roveruj-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_javora.png" style="BORDER: 0px solid; ">
Review 1/2016https://aec.cz/cz/ztisku/igor-cech-odborna-konference-security-2016-prekonala-hranici-500-ucastniku-review-2016.pdfReview 1/2016<img alt="" src="/cz/PublishingImages/articles/2016/igor-cech-odborna-konference-security-2016-prekonala-hranici-500-ucastniku-review-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 3/2016https://aec.cz/cz/ztisku/marian-nemec-grc-governance-risk-and-compliance-it-systems-2016.pdfIT Systems 3/2016<img alt="" src="/cz/PublishingImages/articles/2016/marian-nemec-grc-governance-risk-and-compliance-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 3/2016https://aec.cz/cz/ztisku/igor-cech-ohlednuti-za-konferenci-security-2016-it-systems-2016.pdfIT Systems 3/2016<img alt="" src="/cz/PublishingImages/articles/2016/igor-cech-ohlednuti-za-konferenci-security-2016-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
DSM 4/2015https://aec.cz/cz/ztisku/lukas-blaha-bezpecnost-mobilnich-aplikaci-dsm-2015.pdfDSM 4/2015<img alt="" src="/cz/PublishingImages/articles/2015/lukas-blaha-bezpecnost-mobilnich-aplikaci-dsm-2015.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_blaha.png" style="BORDER: 0px solid; ">
Ekonom 47/2015https://aec.cz/cz/ztisku/tomas-strycek-nejen-vanoce-pred-nami-je-i-sezona-internetovych-podvodu-ekonom-2015.pdfEkonom 47/2015<img alt="" src="/cz/PublishingImages/articles/2015/tomas-strycek-nejen-vanoce-pred-nami-je-i-sezona-internetovych-podvodu-ekonom-2015.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
Connect! podzim 2015https://aec.cz/cz/ztisku/michal-tresner-moderni-utoky-na-banky-connect-podzim.pdfConnect! podzim 2015<img alt="" src="/cz/PublishingImages/articles/2015/michal-tresner-moderni-utoky-na-banky-connect-podzim.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michal_tresner.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2015https://aec.cz/cz/ztisku/martin-tobolka-zakon-o-kyberneticke-bezpecnosti-it-systems-2015.pdfIT Systems 7-8/2015<img alt="" src="/cz/PublishingImages/articles/2015/martin-tobolka-zakon-o-kyberneticke-bezpecnosti-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_tobolka.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2015https://aec.cz/cz/ztisku/martin-klubal-nejvetsi-unik-vladnich-dat-v-historii-usa-it-systems-2015.pdfIT Systems 7-8/2015<img alt="" src="/cz/PublishingImages/articles/2015/martin-klubal-nejvetsi-unik-vladnich-dat-v-historii-usa-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
Connect! jaro 2015https://aec.cz/cz/ztisku/maros-barabas-ceska-republika-lidr-v-inteligentni-analyze-malwaru-connect-jaro.pdfConnect! jaro 2015<img alt="" src="/cz/PublishingImages/articles/2015/maros-barabas-ceska-republika-lidr-v-inteligentni-analyze-malwaru-connect-jaro.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
IT Systems 4/2015https://aec.cz/cz/ztisku/jan-tomek-dalsi-zbran-v-boji-se-spamem-it-systems-2015.pdfIT Systems 4/2015<img alt="" src="/cz/PublishingImages/articles/2015/jan-tomek-dalsi-zbran-v-boji-se-spamem-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jan_tomek.png" style="BORDER: 0px solid; ">
Parlament, vláda, samospráva 3/2015https://aec.cz/cz/ztisku/igor-cech-konferenci-security-2015-navstivilo-pres-400-navstevniku-parlament-vlada-samosprava-2015.pdfParlament, vláda, samospráva 3/2015<img alt="" src="/cz/PublishingImages/articles/2015/igor-cech-konferenci-security-2015-navstivilo-pres-400-navstevniku-parlament-vlada-samosprava-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 3/2015https://aec.cz/cz/ztisku/hana-vystavelova-petr-nadenicek-klasifikace-informaci-(dokumentu)-it-systems-2015.pdfIT Systems 3/2015<img alt="" src="/cz/PublishingImages/articles/2015/hana-vystavelova-petr-nadenicek-klasifikace-informaci-(dokumentu)-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/hana_vystavelova.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Securityhttps://aec.cz/cz/ztisku/petr-nadenicek-neni-to-dobre-a-bude-hur-it-systems-2015.pdfIT Systems - Speciál IT Security<img alt="" src="/cz/PublishingImages/articles/2015/petr-nadenicek-neni-to-dobre-a-bude-hur-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Securityhttps://aec.cz/cz/ztisku/petr-javora-ochrana-citlivych-dat-neni-jen-o-dlp-it-systems-2015.pdfIT Systems - Speciál IT Security<img alt="" src="/cz/PublishingImages/articles/2015/petr-javora-ochrana-citlivych-dat-neni-jen-o-dlp-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_javora.png" style="BORDER: 0px solid; ">
IT Systems 1-2/2015https://aec.cz/cz/ztisku/martin-klubal-utoky-na-sony-vzbuzuji-rozpaky-it-systems-2015.pdfIT Systems 1-2/2015<img alt="" src="/cz/PublishingImages/articles/2015/martin-klubal-utoky-na-sony-vzbuzuji-rozpaky-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
Metro 19. 1. 2015https://aec.cz/cz/ztisku/tomas-strycek-za-vykradeny-bankovni-ucet-muze-nejcasteji-sam-klient-metro-2015-01-19.pdfMetro 19. 1. 2015<img alt="" src="/cz/PublishingImages/articles/2015/tomas-strycek-za-vykradeny-bankovni-ucet-muze-nejcasteji-sam-klient-metro-2015.jpg.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
IT Systems 12/2014https://aec.cz/cz/ztisku/juraj-porubcan-maros-barabas-jak-vyvijet-bezpecnejsi-aplikace-it-systems-2014.pdfIT Systems 12/2014<img alt="" src="/cz/PublishingImages/articles/2014/juraj-porubcan-maros-barabas-jak-vyvijet-bezpecnejsi-aplikace-it-systems-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/juraj_porubcan.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
IT Systems - Speciál Small Business Solutionshttps://aec.cz/cz/ztisku/petr-nadenicek-jak-chranit-it-v-male-firme-it-systems-2014.pdfIT Systems - Speciál Small Business Solutions<img alt="" src="/cz/PublishingImages/articles/2014/petr-nadenicek-jak-chranit-it-v-male-firme-it-systems-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
Infoware 9-10/2014https://aec.cz/cz/ztisku/juraj-porubcan-maros-barabas-ochrana-citlivych-informacii-pred-unikom-z-firmy-infoware-2014.pdfInfoware 9-10/2014<img alt="" src="/cz/PublishingImages/articles/2014/juraj-porubcan-maros-barabas-ochrana-citlivych-informacii-pred-unikom-z-firmy-infoware-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/juraj_porubcan.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
IT Systems 9/2014https://aec.cz/cz/ztisku/emil-budin-k-cemu-je-siem-it-systems-2014.pdfIT Systems 9/2014<img alt="" src="/cz/PublishingImages/articles/2014/emil-budin-k-cemu-je-siem-it-systems-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/emil_budin.png" style="BORDER: 0px solid; ">
DSM 3/2014https://aec.cz/cz/ztisku/lukas-antal-maros-barabas-kompromitace-dat-pomoci-sql-injection-cast-iii-dsm-2014.pdfDSM 3/2014<img alt="" src="/cz/PublishingImages/articles/2014/lukas-antal-maros-barabas-kompromitace-dat-pomoci-sql-injection-cast-iii-dsm-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_antal.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
Reseller Magazine červenec/srpen 2014https://aec.cz/cz/ztisku/petr-nadenicek-bezpecnost-nelehka-rozhodnuti-s-nejistym-vysledkem-reseller-magazine-2014.pdfReseller Magazine červenec/srpen 2014<img alt="" src="/cz/PublishingImages/articles/2014/petr-nadenicek-bezpecnost-nelehka-rozhodnuti-s-nejistym-vysledkem-reseller-magazine-2014.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">