Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
123>
  • 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Mit Fallbeispiel und Datenschutzrechtlicher Analyse
    Title: 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Autor:in: Daniel Lautenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014
    Price: US$ 16.99
  • A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    A Conceptual Framework to Mitigate Cyber and Physical Attacks
    Title: A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    Autor:in: Olayemi Phillips (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 16.99
  • A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
    Title: A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    Autor:in: Pradheep Manisekaran (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2014
    Price: US$ 21.99
  • A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Title: A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Autor:in: Dr. Helen Parimala (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
    Price: US$ 46.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Title: A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Autor:in: Tim Huse (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2020 , Grade: 1.0
    Price: US$ 42.99
  • A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Title: A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Autor:in: Sven Elmers (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2009 , Grade: 2,1
    Price: US$ 21.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
    Title: Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
    Autor:in: B.Sc. Tobias Steinicke (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2016 , Grade: 1,3
    Price: US$ 18.99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Title: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Author), Dr. S. Palanivel (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 9
    Price: US$ 0.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Analyse des Datensatzes wage2 mit der Programmiersprache R
    Wie wirken sich persönliche Attribute auf das Gehalt eines Angestellten aus?
    Title: Analyse des Datensatzes wage2 mit der Programmiersprache R
    Autor:in: Daniel Gatz (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2021 , Grade: 2,0
    Price: US$ 21.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Title: Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Autor:in: Hans Burg (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2018 , Grade: 1,5
    Price: US$ 42.99
  • Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Title: Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Autor:in: Michael Steinmann (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2003 , Grade: 2
    Price: US$ 42.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • Analysis of the BEM Code of Professional Guidelines
    Title: Analysis of the BEM Code of Professional Guidelines
    Autor:in: Bandar Hezam (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper
    Price: US$ 18.99
  • Analyzing Online Voting Systems for Flaw Detection
    Title: Analyzing Online Voting Systems for Flaw Detection
    Autor:in: Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2015 , Grade: A
    Price: US$ 16.99
  • Anforderungen an Grid-basierte Intrusion Detection Systeme
    Title: Anforderungen an Grid-basierte Intrusion Detection Systeme
    Autor:in: Christian Maier (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2008 , Grade: 1,3
    Price: US$ 0.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Attacken auf die Sicherheitsmechanismen des Wi-Fi Protected Access Industriestandards
    Title: Attacken auf die Sicherheitsmechanismen des Wi-Fi Protected Access Industriestandards
    Autor:in: Clemens Herrmann (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2009 , Grade: Sehr Gut
    Price: US$ 34.99
  • Attacken und Gegenmaßnahmen
    Informationsabfragen und Recommender Systeme
    Title: Attacken und Gegenmaßnahmen
    Autor:in: Marko Haschej (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2008 , Grade: A
    Price: US$ 16.99
  • Autonomie, Privatheit und Selbstbestimmung
    Title: Autonomie, Privatheit und Selbstbestimmung
    Autor:in: Peggy Werner (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 1,7
    Price: US$ 16.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Bedeutung von PGP (Pretty Good Privacy)
    Title: Bedeutung von PGP (Pretty Good Privacy)
    Autor:in: Philipp Angstmann (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2002 , Grade: 6.0 (CH-Notensystem; D: 1.0)
    Price: US$ 18.99
  • Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
    Title: Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
    Autor:in: Daniel Schreiber (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2019 , Grade: 1,0
    Price: US$ 18.99
  • Benachrichtigung bei Datenschutzverletzungen
    Rechtliche Verpflichtungen bei einer Datenschutzverletzung
    Title: Benachrichtigung bei Datenschutzverletzungen
    Autor:in: Carina Rehberg (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2019 , Grade: 1,8
    Price: US$ 16.99
  • Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Title: Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020
    Price: US$ 18.99
  • Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
    Title: Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
    Autor:in: Nikolas Rittmeier (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2020 , Grade: 2,3
    Price: US$ 16.99
  • Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
    Title: Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
    Autor:in: Denis Ruiz Lopez (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2016 , Grade: 1,3
    Price: US$ 21.99
  • Click Fraud - Analyse und Methode zur Identifzierung
    Title: Click Fraud - Analyse und Methode zur Identifzierung
    Autor:in: Otto Diesenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2011
    Price: US$ 42.99
  • Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
    Title: Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
    Autor:in: Yvonne Harnau (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 2,3
    Price: US$ 42.99
  • Cloud Computing in der Versicherungsbranche
    Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud
    Title: Cloud Computing in der Versicherungsbranche
    Autor:in: Lisa Eicker (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,3
    Price: US$ 18.99
  • Cloud Computing und Server-based Computing. Chancen und Risiken von serverbasierten IT-Infrastrukturen
    Title: Cloud Computing und Server-based Computing. Chancen und Risiken von serverbasierten IT-Infrastrukturen
    Autor:in: Miguel Fonseca (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2020
    Price: US$ 42.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Computerviren und Schutzmaßnahmen. Ein Überblick
    Title: Computerviren und Schutzmaßnahmen. Ein Überblick
    Autor:in: Dirk Höppner (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2015
    Price: US$ 6.99
  • Computerviren. Funktionsweise und Schutzmöglichkeiten
    Title: Computerviren. Funktionsweise und Schutzmöglichkeiten
    Autor:in: Simon Trang (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 1
    Price: US$ 0.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Cryptography and Steganography. A multilayer Data Security Approach
    Title: Cryptography and Steganography. A multilayer Data Security Approach
    Autor:in: Jagdish Chandra Patni (Author), Hitesh Kumar Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2021 , Grade: 2
    Price: US$ 42.99
  • Cyber security, crime and warfare in Pakistan
    Title: Cyber security, crime and warfare in Pakistan
    Autor:in: Qamar Atta Ul Haq (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2016 , Grade: A
    Price: US$ 6.99
  • Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Title: Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 1,0
    Price: US$ 42.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 9.99
  • Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
    Title: Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
    Autor:in: Alexander Hübert (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2013 , Grade: 1,3
    Price: US$ 17.99
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • Cyberterrorismus - Definition, Arten, Gegenmaßnahmen
    Title: Cyberterrorismus - Definition, Arten, Gegenmaßnahmen
    Autor:in: Tonio Kröner (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: 1,7
    Price: US$ 18.99
  • Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Title: Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Autor:in: Stefan Schärmeli (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2023 , Grade: 2.0
    Price: US$ 18.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 16.99
  • Data Privacy: A Fundamental Human Right or a Privilege?
    Biases in Surveillance: Ethical Implications and Mitigation Strategies for Marginalized Communities
    - New
    Title: Data Privacy: A Fundamental Human Right or a Privilege?
    Autor:in: Franklin Nelson Djeunga Mbakakeu (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2024 , Grade: 1,0
    Price: US$ 6.99
  • Datenschutz und Datensicherheit im Cloud Computing
    Title: Datenschutz und Datensicherheit im Cloud Computing
    Autor:in: Steffen Friesen (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 1,7
    Price: US$ 16.99
  • Datenschutzanalyse, Folgenabschätzung und Gewährleistung eines besseren Datenschutzes für definierte Geschäftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
    Title: Datenschutzanalyse, Folgenabschätzung und Gewährleistung eines besseren Datenschutzes für definierte Geschäftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
    Autor:in: Jonas Noesges (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 1,3
    Price: US$ 42.99
  • Datenschutzgesetz in der IT
    Title: Datenschutzgesetz in der IT
    Autor:in: Rochus Stobbe (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,0
    Price: US$ 18.99
  • Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse
    Dropbox und JiffyBox
    Title: Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse
    Autor:in: Johannes Michl (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2013 , Grade: 1,7
    Price: US$ 42.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Der Hackerbegriff in den Medien
    Ein Diskurs
    Title: Der Hackerbegriff in den Medien
    Autor:in: Randy Witte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2012
    Price: US$ 16.99
  • Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Title: Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Autor:in: Randhir Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2021 , Grade: A
    Price: US$ 46.99
  • Detecting Veracity
    A New door to keep Safe from fake Posts
    Title: Detecting Veracity
    Autor:in: M.Tech Hemant Kumar Saini (Author), Nitesh Chouhan (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2014 , Grade: 1.0
    Price: US$ 3.99
  • Detection of Sarcastic and Abusive Comments Containing Positive Words - New
    Title: Detection of Sarcastic and Abusive Comments Containing Positive Words
    Autor:in: Go Sato (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2026
    Price: US$ 0.99
  • Development and Implementation of secure GSM algorithm for Mobile Banking
    Telecommunication Security
    Title: Development and Implementation of secure GSM algorithm for Mobile Banking
    Autor:in: Ali Raheem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: MERIT
    Price: US$ 21.99
  • Dezentrale E-Commerce Plattform. OpenBazaar
    Title: Dezentrale E-Commerce Plattform. OpenBazaar
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,7
    Price: US$ 11.99
  • Die Herausforderungen von IT-Sicherheit für die Videoüberwachung
    Title: Die Herausforderungen von IT-Sicherheit für die Videoüberwachung
    Autor:in: Ugur Ataman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018 , Grade: 2
    Price: US$ 46.99
  • Die Human Firewall. Forensische Cyberpsychologie als Schlüssel zur digitalen Resilienz und Cyberabwehr
    Title: Die Human Firewall. Forensische Cyberpsychologie als Schlüssel zur digitalen Resilienz und Cyberabwehr
    Autor:in: Slava Migutin (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2024
    Price: US$ 6.99
  • Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Title: Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Autor:in: Onur Güldali (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,3
    Price: US$ 16.99
  • Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
    Title: Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
    Autor:in: Kse Nia (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2017 , Grade: 2,7
    Price: US$ 18.99
  • Die Post-Quanten-Kryptographie. Ein Überblick
    Title: Die Post-Quanten-Kryptographie. Ein Überblick
    Autor:in: Lukas Meinl (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2021 , Grade: 1,0
    Price: US$ 0.99
  • Die Relevanz von Informationssicherheit, IT-Compliance und Datenschutz
    Title: Die Relevanz von Informationssicherheit, IT-Compliance und Datenschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 18.99
  • Die Relevanz von Zero Trust zur Erhöhung der Cybersicherheit in modernen Cloud-Umgebungen
    Title: Die Relevanz von Zero Trust zur Erhöhung der Cybersicherheit in modernen Cloud-Umgebungen
    Autor:in: Fabian Schnabel (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2025 , Grade: 1,0
    Price: US$ 18.99
  • Die Werkzeuge eines Hackers
    Ein Beispielangriff mittels Metasploit
    Title: Die Werkzeuge eines Hackers
    Autor:in: Niklas Höfling (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2021 , Grade: 1,0
    Price: US$ 18.99
  • Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
    Title: Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
    Autor:in: Michelle Bernotti (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2014 , Grade: 1,3
    Price: US$ 11.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 16.99
  • Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten
    Title: Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten
    Autor:in: Ralph Schimpf (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2011 , Grade: 1,7
    Price: US$ 34.99
  • Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
    Title: Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
    Autor:in: Mika Landeck (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2020 , Grade: 1,0
    Price: US$ 16.99
  • Digitales Fingerprinting in vernetzten Fahrzeugen. Cybersecurity-Risiken und Identifikationsmöglichkeiten
    Title: Digitales Fingerprinting in vernetzten Fahrzeugen. Cybersecurity-Risiken und Identifikationsmöglichkeiten
    Autor:in: Thomas Brandauer (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2022 , Grade: 1.0
    Price: US$ 34.99
  • Distributed Denial of Service (DDOS) attacks and IoT Security
    Title: Distributed Denial of Service (DDOS) attacks and IoT Security
    Autor:in: Robert Joodat (Author), Eric Wang (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2017 , Grade: N/A
    Price: US$ 0.99
  • ELSTER - Die elektronische Steuererklärung
    Title: ELSTER - Die elektronische Steuererklärung
    Autor:in: Susanne Dieter (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,3
    Price: US$ 0.99
  • Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Title: Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Autor:in: Markus Dreher (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2021 , Grade: 1 (90%)
    Price: US$ 0.99
  • Eine kurze Einführung in die Post-Quanten-Kryptographie
    Title: Eine kurze Einführung in die Post-Quanten-Kryptographie
    Autor:in: Annika Kistler (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2025 , Grade: 1,0
    Price: US$ 16.99
  • Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Title: Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Autor:in: Karsten Hellinger (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 2,0
    Price: US$ 0.99
  • Encrypting File System (EFS)
    Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
    Title: Encrypting File System (EFS)
    Autor:in: M. Sc. Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,7
    Price: US$ 11.99
  • Entwicklung und Laborexperiment von Convolutional Neural Networks mit Variationscharakteristik für fortschrittliche Cybersicherheitsanalysen
    Title: Entwicklung und Laborexperiment von Convolutional Neural Networks mit Variationscharakteristik für fortschrittliche Cybersicherheitsanalysen
    Autor:in: Lucas Dinhof (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2024 , Grade: 1,0
    Price: US$ 42.99
  • Etude Approfondie sur l’Usage des Protocoles SSH et Open SSH dans un Man
    Title: Etude Approfondie sur l’Usage des Protocoles SSH et Open SSH dans un Man
    Autor:in: Roland Nathan Kalonji (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014
    Price: US$ 34.99
  • Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität
    Title: Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität
    Autor:in: Lucas Dinhof (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2015 , Grade: 1 B
    Price: US$ 34.99
  • Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers
    Title: Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers
    Autor:in: Dr. Hector Cruz Platon (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2023
    Price: US$ 46.99
  • Firewall - Arten und Funktionsweise
    Title: Firewall - Arten und Funktionsweise
    Autor:in: Andrej Smolarek (Author), Hui Wang (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 2,0
    Price: US$ 18.99
  • Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
    Title: Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2023 , Grade: 1
    Price: US$ 9.99
  • Generative Adversariale Netzwerke in der IT-Sicherheit. Nutzungspotenziale und Herausforderungen bei der Erkennung von Schadsoftware
    Title: Generative Adversariale Netzwerke in der IT-Sicherheit. Nutzungspotenziale und Herausforderungen bei der Erkennung von Schadsoftware
    Autor:in: Alexander Jäger (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2023 , Grade: 1,3
    Price: US$ 42.99
  • Gesetzliche Grundlagen für Kryptographie, Schlüssel und Signaturen
    Title: Gesetzliche Grundlagen für Kryptographie, Schlüssel und Signaturen
    Autor:in: Dennis Mohrmann (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 2
    Price: US$ 0.99
  • Goppa Codes und ihr Nutzen im McEliece Kryptosystem
    Title: Goppa Codes und ihr Nutzen im McEliece Kryptosystem
    Autor:in: Jannik Büscher (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2021 , Grade: 1,3
    Price: US$ 34.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Hardware Trojan Threat Taxonomies 2017-2020
    Title: Hardware Trojan Threat Taxonomies 2017-2020
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Herausforderungen für Betreiber kritischer Infrastrukturen. Arten von Bedrohungsszenarien, rechtlicher Rahmen und Gegenmaßnahmen
    Title: Herausforderungen für Betreiber kritischer Infrastrukturen. Arten von Bedrohungsszenarien, rechtlicher Rahmen und Gegenmaßnahmen
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2020 , Grade: 1,0
    Price: US$ 16.99
  • Home Security Systems. Intrusion Detection with GSM
    Title: Home Security Systems. Intrusion Detection with GSM
    Autor:in: Washington Mutwiri (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: 2.1
    Price: US$ 16.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Title: How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018 , Grade: B
    Price: US$ 42.99
  • IT Application Security and Control
    Title: IT Application Security and Control
    Autor:in: Dileep Keshava Narayana (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2012 , Grade: 98
    Price: US$ 21.99
Show 25 50 100
123>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint