de
en
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
›
Results for «
employee
»
Open Filters
Search in
Title
Author
Fulltext
Language
Deutsch
(133)
English
(86)
Français
(3)
Español
(2)
Price
Paid
(57)
Free
(29)
Publication Year
Any Year
since 2026
since 2025
since 2024
since 2023
since 2022
since 2021
since 2020
since 2015
since 2010
since 2005
Results for »
employee
« (86 results)
Sort by
Most Relevant
Newest
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
4
>
Cybersecurity in Digital Healthcare Services
A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
Autor:in:
Manoj Tewari (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023
Price:
US$ 0.99
A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
Autor:in:
Ireneus Mathias (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015
Price:
US$ 0.99
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
Autor:in:
Adrian O'Gara (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2014 , Grade: 90.00
Price:
US$ 0.99
Malware Detection Avoidance through Mutexes
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Study , 2020 , Grade: 4.0
Price:
US$ 0.99
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
Autor:in:
Muhammad Waseem (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: A
Price:
US$ 0.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2016
Price:
US$ 0.99
How to do a Wi-Fi Forensics Analysis
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2019 , Grade: A
Price:
US$ 0.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
Autor:in:
Dr. Helen Parimala (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
Price:
US$ 46.99
A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
Autor:in:
Tim Huse (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2020 , Grade: 1.0
Price:
US$ 42.99
On the security of TLS 1.2 and TLS 1.3. A comparison
Autor:in:
Sarah Syed-Winkler (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 95%
Price:
US$ 21.99
An Improved Modular Exponentiation To Resist Power Analysis Attacks
Autor:in:
Moushumi Barman (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2019 , Grade: A
Price:
US$ 21.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
Autor:in:
Dr. Manisha Kumari Deep (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2.5
Price:
US$ 9.99
Differences Between the Security Models of Android and iOS
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2018 , Grade: 1,0
Price:
US$ 16.99
Spying Software Development in Google Android
Autor:in:
Fissha SeyoumTeshome (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 21.99
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
Autor:in:
Pradheep Manisekaran (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2014
Price:
US$ 21.99
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
Autor:in:
Andy Reed (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2012 , Grade: Merit
Price:
US$ 34.99
Detecting Veracity
A New door to keep Safe from fake Posts
Autor:in:
M.Tech Hemant Kumar Saini (Author)
,
Nitesh Chouhan (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2014 , Grade: 1.0
Price:
US$ 3.99
Backdoor Add-ons. A new way to harbor the data
Autor:in:
Hemant Kumar Saini (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2014 , Grade: 1
Price:
US$ 6.99
Wireless LAN Security in a SOHO Environment: A Holistic Approach
Autor:in:
Christian Wimmer (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2006 , Grade: 1.7
Price:
US$ 42.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Deanonymization of social network profiles by the use of pictures meta data
Autor:in:
Stefan Möstel (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011 , Grade: 1.3
Price:
US$ 0.99
Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
Autor:in:
Enowsoum Konrad (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2025
Price:
US$ 0.99
Show
25
50
100
1
2
...
4
>