Learn More
This paper responds to requirement to improve the orientation between offered SW, such as ITIL tools. Nowadays there are enormous amount of offered tools. This situation very often leads to poor implementation of ITIL on the basis of primary unappropriate choice. This paper is focused on the model and proposal of evaluation criteria for free and open source(More)
This paper responds to requirement to improve the orientation between offered SW, as ITIL tools. There are really a lot of amount thus offered tools and very often leads to poor implementation of ITIL on the basis of incorrectly chosen tools. Main objective of this paper is to provide an overview about possibilities of choosing a suitable tool.(More)
This contribution presents different approach to security management in companies. Current approach focuses on separately managed individual security fields compared to the proposed new approach. This approach is based on integrated security system management. The main objective of this paper, which is based on project “Possibilities of ITIL1(More)
The biometric identification by the face is one of the oldest biometric identification. With increasing progress in the area of identification by the face this technique was implemented into area of security, where it provides a faster and more accurate identification. The 3D face reader uses for the identification of the person: eyes, mouth, nose, and in(More)
  • 1