Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
12...9>
  • Prevención del Fraude a través del uso de las Tecnologías
    Title: Prevención del Fraude a través del uso de las Tecnologías
    Autor:in: Leonel Ermides Paniagua López (Author), Hada Marena Sequeira Pérez (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2015 , Grade: 94
    Price: US$ 0.-
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Die Post-Quanten-Kryptographie. Ein Überblick
    Title: Die Post-Quanten-Kryptographie. Ein Überblick
    Autor:in: Lukas Meinl (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2021 , Grade: 1,0
    Price: US$ 0.99
  • Universal Reencryption
    Title: Universal Reencryption
    Autor:in: Christian Jungstand (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2003
    Price: US$ 0.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • Anforderungen an Grid-basierte Intrusion Detection Systeme
    Title: Anforderungen an Grid-basierte Intrusion Detection Systeme
    Autor:in: Christian Maier (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2008 , Grade: 1,3
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Title: Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Autor:in: Kai Jan Runte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 1999
    Price: US$ 0.99
  • Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Title: Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Autor:in: Khalida Lalouani (Author), Hadjer Kherchi (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2017 , Grade: 15.60
    Price: US$ 0.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Title: Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Autor:in: Karsten Hellinger (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 2,0
    Price: US$ 0.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Title: Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Autor:in: Markus Dreher (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2021 , Grade: 1 (90%)
    Price: US$ 0.99
  • Computerviren. Funktionsweise und Schutzmöglichkeiten
    Title: Computerviren. Funktionsweise und Schutzmöglichkeiten
    Autor:in: Simon Trang (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 1
    Price: US$ 0.99
  • Reversible data hiding in encrypted images
    Title: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2014 , Grade: 10
    Price: US$ 0.99
  • Scriptbasierte Sicherungslösung für Windows Server 2008
    Title: Scriptbasierte Sicherungslösung für Windows Server 2008
    Autor:in: Hannes Schurig (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1,7
    Price: US$ 0.99
  • Long-Term Archival of Encrypted Records
    Title: Long-Term Archival of Encrypted Records
    Autor:in: Angel Rivera (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2008 , Grade: A
    Price: US$ 0.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
Show 25 50 100
12...9>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint