Newspapers and Magazines

 

 

IT Systems 7-8/2019https://aec.cz/cz/ztisku/michael-kupka-nebezpecnost-iot-aneb-stale-podcenovane-riziko-it-systems-2019.pdfIT Systems 7-8/2019<img alt="" src="/cz/PublishingImages/articles/2019/michael-kupka-nebezpecnost-iot-aneb-stale-podceňovane-riziko-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michael_kupka.png" style="BORDER: 0px solid; ">
Euro 35https://aec.cz/cz/ztisku/tomas-filip-kyberneticke-utoky-miri-stale-casteji-na-sme-euro-2019.pdfEuro 35<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-kyberneticke-utoky-miri-stale-casteji-na-sme-euro-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2019https://aec.cz/cz/ztisku/david-pecl+martin-dicky-rizeni-zranitelnosti-neni-jen-o-vyberu-spravneho-nastroje-it-systems-2019.pdfIT Systems 7-8/2019<img alt="" src="/cz/PublishingImages/articles/2019/david-pecl+martin-dicky-rizeni-zranitelnosti-neni-jen-o-vyberu-spravneho-nastroje-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_dicky.png" style="BORDER: 0px solid; ">
Ekonom 33https://aec.cz/cz/ztisku/tomas-filip-budoucnost-firemni-ochrany-dat-spociva-v-outsourcingu-ekonom-2019.pdfEkonom 33<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-budoucnost-firemni-ochrany-dat-spociva-v-outsourcingu-ekonom-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
Euro 31https://aec.cz/cz/ztisku/tomas-filip-kyberneticky-utok-predstavuje-sok-euro-2019.pdfEuro 31<img alt="" src="/cz/PublishingImages/articles/2019/tomas-filip-kyberneticky-utok-predstavuje-sok-euro-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_filip.png" style="BORDER: 0px solid; ">
IT Systems 4/ 2019https://aec.cz/cz/ztisku/jaromir-veber-vliv-soucasne-legislativy-na-incident-management-it-systems-2019.pdfIT Systems 4/ 2019<img alt="" src="/cz/PublishingImages/articles/2019/jaromir-veber-vliv-soucasne-legislativy-na-incident-management-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jaromir_veber.png" style="BORDER: 0px solid; ">
IT Systems 3/2019https://aec.cz/cz/ztisku/petr-nadenicek-jak-ridit-zranitelnosti-lepe-a-efektivneji-it-systems-2019.pdfIT Systems 3/2019<img alt="" src="/cz/PublishingImages/articles/2019/petr-nadenicek-jak-ridit-zranitelnosti-lepe-a-efektivneji-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
DSM 1/2019https://aec.cz/cz/ztisku/miroslav-buda-informacni-aktiva-a-rizika-zpusoby-reseni-definovanych-problemu-ii-cast-dsm-2019.pdfDSM 1/2019<img alt="" src="/cz/PublishingImages/articles/2019/miroslav-buda-informacni-aktiva-a-rizika-zpusoby-reseni-definovanych-problemu-ii-cast-dsm-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/miroslav_buda.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://aec.cz/cz/ztisku/michael-kupka-trendy-v-bezpecnosti-mobilnich-zarizeni-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/michael-kupka-trendy-v-bezpecnosti-mobilnich-zarizeni-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michael_kupka.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://aec.cz/cz/ztisku/lukas-solil-stavime-firewallove-reseni-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/lukas-solil-stavime-firewallove-reseni-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
IT Systems - Speciál IT Security 2019https://aec.cz/cz/ztisku/tomas-strycek-firmy-investuji-do-technologii-ktere-pak-nedokazou-spravne-vyuzit-it-systems-2019.pdfIT Systems - Speciál IT Security 2019<img alt="" src="/cz/PublishingImages/articles/2019/tomas-strycek-firmy-investuji-do-technologii-ktere-pak-nedokazou-spravne-vyuzit-it-systems-2019.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
IT Systems 12/2018https://aec.cz/cz/ztisku/lubomir-almer-agilni-pristup-k-bezpecnosti-it-systems-2018.pdfIT Systems 12/2018<img alt="" src="/cz/PublishingImages/articles/2018/lubomir-almer-agilni-pristup-k-bezpecnosti-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lubomir_almer.png" style="BORDER: 0px solid; ">
DSM 4/2018https://aec.cz/cz/ztisku/radka-cieslarova-cviceni-cerveneho-a-modreho-tymu-dsm-2018.pdfDSM 4/2018<img alt="" src="/cz/PublishingImages/articles/2018/radka-cieslarova-cviceni-cerveneho-a-modreho-tymu-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/radka_cieslarova.png" style="BORDER: 0px solid; ">
DSM 4/2018https://aec.cz/cz/ztisku/miroslav-buda-problemy-spjate-s-rizenim-informacnich-aktiv-a-rizik-dsm-2018.pdfDSM 4/2018<img alt="" src="/cz/PublishingImages/articles/2018/miroslav-buda-problemy-spjate-s-rizenim-informacnich-aktiv-a-rizik-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/miroslav_buda.png" style="BORDER: 0px solid; ">
IT Systems 10/2018https://aec.cz/cz/ztisku/lukas-solil-jak-na-procesy-okolo-firewallu-it-systems-2018.pdfIT Systems 10/2018<img alt="" src="/cz/PublishingImages/articles/2018/lukas-solil-jak-na-procesy-okolo-firewallu-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_solil.png" style="BORDER: 0px solid; ">
IT Systems 10/2018https://aec.cz/cz/ztisku/maros-barabas+jan-poduska-budovani-ochrany-dulezitych-informaci-it-systems-2018.pdfIT Systems 10/2018<img alt="" src="/cz/PublishingImages/articles/2018/maros-barabas+jan-poduska-budovani-ochrany-dulezitych-informaci-it-systems-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jan_poduska.png" style="BORDER: 0px solid; ">
DSM 3/2018https://aec.cz/cz/ztisku/lukas-antal+stanislav-klubal-bezpecnost-bankomatu-dsm-2018.pdfDSM 3/2018<img alt="" src="/cz/PublishingImages/articles/2018/lukas-antal+stanislav-klubal-bezpecnost-bankomatu-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_antal.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/stanislav_klubal.png" style="BORDER: 0px solid; ">
DSM 3/2018https://aec.cz/cz/ztisku/david-pecl-next-gen-antiviry-pokrocilejsi-zabezpeceni-nebo-jen-buzzword-1-dil-dsm-2018.pdfDSM 3/2018<img alt="" src="/cz/PublishingImages/articles/2018/david-pecl-next-gen-antiviry-pokrocilejsi-zabezpeceni-nebo-jen-buzzword-1-dil-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
DSM 2/2018https://aec.cz/cz/ztisku/matej-kacic-klasifikace-informaci-v-korporatnim-prostredi-dsm-2018.pdfDSM 2/2018<img alt="" src="/cz/PublishingImages/articles/2018/matej-kacic-klasifikace-informaci-v-korporatnim-prostredi-dsm-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; ">
Ekonom 12/2018https://aec.cz/cz/ztisku/tomas-strycek-podniky-nici-velke-utoky-ale-take-vlastni-zamestnanci-ekonom-2018.pdfEkonom 12/2018<img alt="" src="/cz/PublishingImages/articles/2018/tomas-strycek-podniky-nici-velke-utoky-ale-take-vlastni-zamestnanci-ekonom-2018.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
DSM 4/2017https://aec.cz/cz/ztisku/david-pecl-nova-hrozba-windows-10-umoznuje-obejit-antivirove-programy-dsm-2017.pdfDSM 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/david-pecl-nova-hrozba-windows-10-umoznuje-obejit-antivirove-programy-dsm-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/david_pecl.png" style="BORDER: 0px solid; ">
IT Systems 9/2017https://aec.cz/cz/ztisku/petr-javora-vyznam-release-a-patch-managementu-it-systems-2017.pdfIT Systems 9/2017<img alt="" src="/cz/PublishingImages/articles/2017/petr-javora-vyznam-release-a-patch-managementu-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_javora.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2017https://aec.cz/cz/ztisku/matej-kacic-information-classification-digital-economy-world-2017.pdfDigital Economy World / červen 2017<img alt="" src="/cz/PublishingImages/articles/2017/matej-kacic-information-classification-digital-economy-world-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/hana_vystavelova.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2017https://aec.cz/cz/ztisku/marian-nemec-gdpr-vyzaduje-komplexni-pristup-digital-economy-world-2017.pdfDigital Economy World / červen 2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-gdpr-vyzaduje-komplexni-pristup-digital-economy-world-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 5/2017https://aec.cz/cz/ztisku/martin-klubal-ceo-fraud-jak-jsem-hacknul-vasi-firmu-it-systems-2017.pdfIT Systems 5/2017<img alt="" src="/cz/PublishingImages/articles/2017/martin-klubal-ceo-fraud-jak-jsem-hacknul-vasi-firmu-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
IT Systems 4/2017https://aec.cz/cz/ztisku/petr-nadenicek-zivot-je-zmena-a-zmena-je-zivot-it-systems-2017.pdfIT Systems 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/petr-nadenicek-zivot-je-zmena-a-zmena-je-zivot-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems 4/2017https://aec.cz/cz/ztisku/marian-nemec-dpia-posouzeni-vlivu-na-ochranu-osobnich-udaju-dle-gdpr-systems-2017.pdfIT Systems 4/2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-dpia-posouzeni-vlivu-na-ochranu-osobnich-udaju-dle-gdpr-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
Digital Economy World / březen 2017https://aec.cz/cz/ztisku/igor-cech-jubilejni-25-rocnik-konference-security-dew-2017.pdfDigital Economy World / březen 2017<img alt="" src="/cz/PublishingImages/articles/2017/igor-cech-jubilejni-25-rocnik-konference-security-dew-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 3/2017https://aec.cz/cz/ztisku/igor-cech-jubilejni-25-rocnik-konference-security-it-systems-2017.pdfIT Systems 3/2017<img alt="" src="/cz/PublishingImages/articles/2017/igor-cech-jubilejni-25-rocnik-konference-security-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 1-2/2017https://aec.cz/cz/ztisku/marian-nemec-vim-ze-nic-nevim-it-systems-2017.pdfIT Systems 1-2/2017<img alt="" src="/cz/PublishingImages/articles/2017/marian-nemec-vim-ze-nic-nevim-it-systems-2017.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 12/2016https://aec.cz/cz/ztisku/martin-klubal-hromadna-doprava-jako-oblibeny-cil-hackeru-it-systems-2016.pdfIT Systems 12/2016<img alt="" src="/cz/PublishingImages/articles/2016/martin-klubal-hromadna-doprava-jako-oblibeny-cil-hackeru-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">
Digital Economy World / prosinec 2016https://aec.cz/cz/ztisku/petr-nadenicek-nelehka-cesta-k-grc-digital-economy-world-2016.pdfDigital Economy World / prosinec 2016<img alt="" src="/cz/PublishingImages/articles/2016/petr-nadenicek-nelehka-cesta-k-grc-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_nadenicek.png" style="BORDER: 0px solid; ">
IT Systems 11/2016https://aec.cz/cz/ztisku/marie-kratochvilova-bezpecnost-autentizace-it-systems-2016.pdfIT Systems 11/2016<img alt="" src="/cz/PublishingImages/articles/2016/marie-kratochvilova-bezpecnost-autentizace-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marie_kratochvilova.png" style="BORDER: 0px solid; ">
IT Systems 9/2016https://aec.cz/cz/ztisku/matej-kacic-bezpecnostni-rizika-pro-webove-aplikace-it-systems-2016.pdfIT Systems 9/2016<img alt="" src="/cz/PublishingImages/articles/2016/matej-kacic-bezpecnostni-rizika-pro-webove-aplikace-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/matej_kacic.png" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/maros_barabas.png" style="BORDER: 0px solid; ">
IT Systems 9/2016https://aec.cz/cz/ztisku/lukas-blaha-smart-cities-it-systems-2016.pdfIT Systems 9/2016<img alt="" src="/cz/PublishingImages/articles/2016/lukas-blaha-smart-cities-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_blaha.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/jan-poduska-logicke-kroky-k-analyze-rizik-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/jan-poduska-logicke-kroky-k-analyze-rizik-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/jan_poduska.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/michal-tresner-fraud-detection-in-al-era-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/michal-tresner-fraud-detection-in-al-era-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michal_tresner.png" style="BORDER: 0px solid; ">
Digital Economy World / červen 2016https://aec.cz/cz/ztisku/marian-nemec-grc-system–rizeni-firmy-uz-nemuze-byt-jednodussi-digital-economy-world-2016.pdfDigital Economy World / červen 2016<img alt="" src="/cz/PublishingImages/articles/2016/marian-nemec-grc-system–rizeni-firmy-uz-nemuze-byt-jednodussi-digital-economy-world-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 5/2016https://aec.cz/cz/ztisku/radko-vavrik-kauza-panama-papers-it-systems-2016.pdfIT Systems 5/2016<img alt="" src="/cz/PublishingImages/articles/2016/radko-vavrik-kauza-panama-papers-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/radko_vavrik.png" style="BORDER: 0px solid; ">
IT Systems 5/2016https://aec.cz/cz/ztisku/petr-javora-duveruj-ale-roveruj-it-systems-2016.pdfIT Systems 5/2016<img alt="" src="/cz/PublishingImages/articles/2016/petr-javora-duveruj-ale-roveruj-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/petr_javora.png" style="BORDER: 0px solid; ">
Review 1/2016https://aec.cz/cz/ztisku/igor-cech-odborna-konference-security-2016-prekonala-hranici-500-ucastniku-review-2016.pdfReview 1/2016<img alt="" src="/cz/PublishingImages/articles/2016/igor-cech-odborna-konference-security-2016-prekonala-hranici-500-ucastniku-review-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
IT Systems 3/2016https://aec.cz/cz/ztisku/marian-nemec-grc-governance-risk-and-compliance-it-systems-2016.pdfIT Systems 3/2016<img alt="" src="/cz/PublishingImages/articles/2016/marian-nemec-grc-governance-risk-and-compliance-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/marian_nemec.png" style="BORDER: 0px solid; ">
IT Systems 3/2016https://aec.cz/cz/ztisku/igor-cech-ohlednuti-za-konferenci-security-2016-it-systems-2016.pdfIT Systems 3/2016<img alt="" src="/cz/PublishingImages/articles/2016/igor-cech-ohlednuti-za-konferenci-security-2016-it-systems-2016.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/igor_cech.png" style="BORDER: 0px solid; ">
DSM 4/2015https://aec.cz/cz/ztisku/lukas-blaha-bezpecnost-mobilnich-aplikaci-dsm-2015.pdfDSM 4/2015<img alt="" src="/cz/PublishingImages/articles/2015/lukas-blaha-bezpecnost-mobilnich-aplikaci-dsm-2015.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/lukas_blaha.png" style="BORDER: 0px solid; ">
Ekonom 47/2015https://aec.cz/cz/ztisku/tomas-strycek-nejen-vanoce-pred-nami-je-i-sezona-internetovych-podvodu-ekonom-2015.pdfEkonom 47/2015<img alt="" src="/cz/PublishingImages/articles/2015/tomas-strycek-nejen-vanoce-pred-nami-je-i-sezona-internetovych-podvodu-ekonom-2015.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/tomas_strycek.png" style="BORDER: 0px solid; ">
Connect! podzim 2015https://aec.cz/cz/ztisku/michal-tresner-moderni-utoky-na-banky-connect-podzim.pdfConnect! podzim 2015<img alt="" src="/cz/PublishingImages/articles/2015/michal-tresner-moderni-utoky-na-banky-connect-podzim.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/michal_tresner.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2015https://aec.cz/cz/ztisku/martin-tobolka-zakon-o-kyberneticke-bezpecnosti-it-systems-2015.pdfIT Systems 7-8/2015<img alt="" src="/cz/PublishingImages/articles/2015/martin-tobolka-zakon-o-kyberneticke-bezpecnosti-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_tobolka.png" style="BORDER: 0px solid; ">
IT Systems 7-8/2015https://aec.cz/cz/ztisku/martin-klubal-nejvetsi-unik-vladnich-dat-v-historii-usa-it-systems-2015.pdfIT Systems 7-8/2015<img alt="" src="/cz/PublishingImages/articles/2015/martin-klubal-nejvetsi-unik-vladnich-dat-v-historii-usa-it-systems-2015.pdf.jpg" style="BORDER: 0px solid; "><img alt="" src="/cz/PublishingImages/articles/authors/martin_kubal.png" style="BORDER: 0px solid; ">