Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Price

    • Paid (56)
    • Free (29)

Academic texts about  Computer Science - IT-Security  (85 results)

GRIN offers a vital collection for students in Information and Cybersecurity. Discover essential academic papers, theses, and essays focusing on critical areas like network security threats, cloud security strategies, and cybercrime investigations. Our texts delve into innovative approaches to data security, including advanced encryption techniques and robust system security. Access these valuable resources instantly via PDF, eBook, or print-on-demand, perfect for advancing your studies.

Sort by
12>
  • Detection of Sarcastic and Abusive Comments Containing Positive Words - New
    Title: Detection of Sarcastic and Abusive Comments Containing Positive Words
    Autor:in: Go Sato (Author)
    Category: Bachelor Thesis , 2026
    Price: US$ 0.99
  • A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    A Conceptual Framework to Mitigate Cyber and Physical Attacks
    - New
    Title: A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    Autor:in: Olayemi Phillips (Author)
    Category: Academic Paper , 2025
    Price: US$ 16.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 16.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Title: Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Autor:in: Randhir Kumar (Author)
    Category: Doctoral Thesis / Dissertation , 2021 , Grade: A
    Price: US$ 46.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Title: A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Autor:in: Dr. Helen Parimala (Author)
    Category: Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
    Price: US$ 46.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 16.99
  • Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Title: Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Autor:in: Torty Vincent (Author)
    Category: Master's Thesis
    Price: US$ 42.99
  • Incremental Construction of Code Property Graphs
    Title: Incremental Construction of Code Property Graphs
    Autor:in: Samuel Hopstock (Author)
    Category: Master's Thesis , 2021 , Grade: 2,0
    Price: US$ 21.99
  • Cryptography and Steganography. A multilayer Data Security Approach
    Title: Cryptography and Steganography. A multilayer Data Security Approach
    Autor:in: Jagdish Chandra Patni (Author), Hitesh Kumar Sharma (Author)
    Category: Textbook , 2021 , Grade: 2
    Price: US$ 42.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Hardware Trojan Threat Taxonomies 2017-2020
    Title: Hardware Trojan Threat Taxonomies 2017-2020
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Title: A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Autor:in: Tim Huse (Author)
    Category: Master's Thesis , 2020 , Grade: 1.0
    Price: US$ 42.99
  • On the security of TLS 1.2 and TLS 1.3. A comparison
    Title: On the security of TLS 1.2 and TLS 1.3. A comparison
    Autor:in: Sarah Syed-Winkler (Author)
    Category: Term Paper , 2021 , Grade: 95%
    Price: US$ 21.99
  • Security Issues in Hardware Virtualization
    Title: Security Issues in Hardware Virtualization
    Autor:in: Samuel Hopstock (Author)
    Category: Seminar Paper , 2020 , Grade: 1,3
    Price: US$ 16.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Title: Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Autor:in: Aditya Kumar (Author)
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 6.99
  • Home Security Systems. Intrusion Detection with GSM
    Title: Home Security Systems. Intrusion Detection with GSM
    Autor:in: Washington Mutwiri (Author)
    Category: Academic Paper , 2019 , Grade: 2.1
    Price: US$ 16.99
  • Password as the first line of defence. How to create a strong and unique password
    Title: Password as the first line of defence. How to create a strong and unique password
    Autor:in: Haitham Ismail (Author)
    Category: Essay , 2019
    Price: US$ 6.99
  • Robust Graph-Based Static Code Analysis
    Title: Robust Graph-Based Static Code Analysis
    Autor:in: Samuel Hopstock (Author)
    Category: Bachelor Thesis , 2019 , Grade: 1,0
    Price: US$ 21.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 16.99
  • Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
    Title: Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
    Autor:in: Eranda Gunasena (Author)
    Category: Master's Thesis , 2018
    Price: US$ 23.99
  • Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    How to protect (PII) and (PHI)?
    Title: Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    Autor:in: Haitham Ismail (Author)
    Category: Essay , 2019
    Price: US$ 16.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Title: How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Autor:in: Haitham Ismail (Author)
    Category: Master's Thesis , 2018 , Grade: B
    Price: US$ 42.99
  • IT Application Security and Control
    Title: IT Application Security and Control
    Autor:in: Dileep Keshava Narayana (Author)
    Category: Elaboration , 2012 , Grade: 98
    Price: US$ 21.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 9.99
  • The pros and cons of modern web application security flaws and possible solutions
    Title: The pros and cons of modern web application security flaws and possible solutions
    Autor:in: Shahriat Hossain (Author), Kh Ashique Mahmud (Author)
    Category: Academic Paper , 2018 , Grade: 10
    Price: US$ 18.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Managing Threats of Cyber-Attacks on Mobile Devices
    Title: Managing Threats of Cyber-Attacks on Mobile Devices
    Autor:in: Anthony Kithome (Author)
    Category: Academic Paper , 2017 , Grade: 2
    Price: US$ 16.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • Security Issues of Big Data Hadoop
    Title: Security Issues of Big Data Hadoop
    Autor:in: Rohit Sharma (Author)
    Category: Scientific Essay , 2018 , Grade: 2
    Price: US$ 6.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Title: Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Autor:in: Mashood Hassan (Author)
    Category: Master's Thesis , 2017
    Price: US$ 34.99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Title: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Author)
    Category: Essay , 2017 , Grade: 9
    Price: US$ 16.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Distributed Denial of Service (DDOS) attacks and IoT Security
    Title: Distributed Denial of Service (DDOS) attacks and IoT Security
    Autor:in: Robert Joodat (Author), Eric Wang (Author)
    Category: Technical Report , 2017 , Grade: N/A
    Price: US$ 0.99
Show 25 50 100
12>

Dive deep into the crucial field of Information and Cybersecurity with GRIN's extensive collection. Our resources cover cutting-edge topics from robust network security threats and sophisticated cybercrime analysis to designing secure cloud infrastructure and understanding data encryption methodologies. Students will discover diverse academic approaches in Master's Theses, Doctoral Dissertations, and Research Papers, addressing everything from national security challenges to ethical considerations in digital spaces. Whether you're researching blockchain security or static code analysis, find your next essential read. All texts are instantly accessible as PDF or eBook, with print-on-demand options available for your convenience.

Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint