en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(15)
Search all subjects...
Category of text
Thesis
(31)
Textbook, Science
(16)
University student text
(15)
Secondary school text
(1)
Search all categories...
Price
free
(3)
0 - 10 USD
(4)
10 - 25 USD
(8)
Language
German
(74)
English
(15)
Spanish; Castilian
(1)
Search in all Languages...
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
15 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Usage of Process Mining for Security in Process-Aware Information Systems
-
New
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 15.99
Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
-
New
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2022 , Grade: 1,0
Price:
US$ 7.99
On the security of TLS 1.2 and TLS 1.3. A comparison
Autor:in:
Sarah Syed-Winkler (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 95%
Price:
US$ 20.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
Autor:in:
Aditya Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 6.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 6.99
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
How to protect (PII) and (PHI)?
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 15.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 14.99
Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
Autor:in:
MSc Andy Reed (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2015
Price:
US$ 14.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2012
Price:
US$ 4.99
Instant Messaging and Cross Site Scripting (XSS)
Autor:in:
MSc. Katharina Kurek (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 16.99
Deanonymization of social network profiles by the use of pictures meta data
Autor:in:
Stefan Möstel (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011 , Grade: 1.3
Price:
US$ 0.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Security Issues in Hardware Virtualization
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,3
Price:
US$ 14.99
Differences Between the Security Models of Android and iOS
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2018 , Grade: 1,0
Price:
US$ 14.99