Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
123>
  • Prevención del Fraude a través del uso de las Tecnologías
    Title: Prevención del Fraude a través del uso de las Tecnologías
    Autor:in: Leonel Ermides Paniagua López (Author), Hada Marena Sequeira Pérez (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2015 , Grade: 94
    Price: US$ 0.-
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Title: Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Autor:in: Kai Jan Runte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 1999
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Die Post-Quanten-Kryptographie. Ein Überblick
    Title: Die Post-Quanten-Kryptographie. Ein Überblick
    Autor:in: Lukas Meinl (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2021 , Grade: 1,0
    Price: US$ 0.99
  • Universal Reencryption
    Title: Universal Reencryption
    Autor:in: Christian Jungstand (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2003
    Price: US$ 0.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • Anforderungen an Grid-basierte Intrusion Detection Systeme
    Title: Anforderungen an Grid-basierte Intrusion Detection Systeme
    Autor:in: Christian Maier (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2008 , Grade: 1,3
    Price: US$ 0.99
  • Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Title: Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Autor:in: Khalida Lalouani (Author), Hadjer Kherchi (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2017 , Grade: 15.60
    Price: US$ 0.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Title: Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Autor:in: Karsten Hellinger (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 2,0
    Price: US$ 0.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Title: Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Autor:in: Markus Dreher (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2021 , Grade: 1 (90%)
    Price: US$ 0.99
  • Computerviren. Funktionsweise und Schutzmöglichkeiten
    Title: Computerviren. Funktionsweise und Schutzmöglichkeiten
    Autor:in: Simon Trang (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 1
    Price: US$ 0.99
  • Reversible data hiding in encrypted images
    Title: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2014 , Grade: 10
    Price: US$ 0.99
  • Scriptbasierte Sicherungslösung für Windows Server 2008
    Title: Scriptbasierte Sicherungslösung für Windows Server 2008
    Autor:in: Hannes Schurig (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1,7
    Price: US$ 0.99
  • Long-Term Archival of Encrypted Records
    Title: Long-Term Archival of Encrypted Records
    Autor:in: Angel Rivera (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2008 , Grade: A
    Price: US$ 0.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
  • Specification of security in distributed computing systems
    Title: Specification of security in distributed computing systems
    Autor:in: Richard Burnham (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 1987
    Price: US$ 0.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Title: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Author), Dr. S. Palanivel (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 9
    Price: US$ 0.99
  • Detection of Sarcastic and Abusive Comments Containing Positive Words - New
    Title: Detection of Sarcastic and Abusive Comments Containing Positive Words
    Autor:in: Go Sato (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2026
    Price: US$ 0.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • ELSTER - Die elektronische Steuererklärung
    Title: ELSTER - Die elektronische Steuererklärung
    Autor:in: Susanne Dieter (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,3
    Price: US$ 0.99
  • Security Architectures for Next Generation Networks
    Title: Security Architectures for Next Generation Networks
    Autor:in: Amir Ahmed Omer Yousif (Author), Prof. Sami M. Sharif (Author), Dr. Hamid Abbas Ali (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014
    Price: US$ 0.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Hardware Trojan Threat Taxonomies 2017-2020
    Title: Hardware Trojan Threat Taxonomies 2017-2020
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Title: Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Autor:in: Danny Nothstein (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2023 , Grade: 1,3
    Price: US$ 0.99
  • Gesetzliche Grundlagen für Kryptographie, Schlüssel und Signaturen
    Title: Gesetzliche Grundlagen für Kryptographie, Schlüssel und Signaturen
    Autor:in: Dennis Mohrmann (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 2
    Price: US$ 0.99
  • Distributed Denial of Service (DDOS) attacks and IoT Security
    Title: Distributed Denial of Service (DDOS) attacks and IoT Security
    Autor:in: Robert Joodat (Author), Eric Wang (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2017 , Grade: N/A
    Price: US$ 0.99
  • Detecting Veracity
    A New door to keep Safe from fake Posts
    Title: Detecting Veracity
    Autor:in: M.Tech Hemant Kumar Saini (Author), Nitesh Chouhan (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2014 , Grade: 1.0
    Price: US$ 3.99
  • Using Bittorent protocol to launch DDoS attacks
    Title: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2012
    Price: US$ 4.99
  • IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
    Title: IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
    Autor:in: Daniela Petzoldt (Author)
    Subject: Computer Science - IT-Security
    Category: Abstract , 2017 , Grade: 1
    Price: US$ 5.99
  • Public-Key-Methoden und Diskrete Logarithmusbasierte Systeme - New
    Title: Public-Key-Methoden und Diskrete Logarithmusbasierte Systeme
    Autor:in: Franklin Nelson Djeunga Mbakakeu (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2025 , Grade: 1,3
    Price: US$ 6.99
  • Security Issues of Big Data Hadoop
    Title: Security Issues of Big Data Hadoop
    Autor:in: Rohit Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2
    Price: US$ 6.99
  • Computerviren und Schutzmaßnahmen. Ein Überblick
    Title: Computerviren und Schutzmaßnahmen. Ein Überblick
    Autor:in: Dirk Höppner (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2015
    Price: US$ 6.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Die Human Firewall. Forensische Cyberpsychologie als Schlüssel zur digitalen Resilienz und Cyberabwehr
    Title: Die Human Firewall. Forensische Cyberpsychologie als Schlüssel zur digitalen Resilienz und Cyberabwehr
    Autor:in: Slava Migutin (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2024
    Price: US$ 6.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Secure Password Policy. Current Situation and Solutions
    Title: Secure Password Policy. Current Situation and Solutions
    Autor:in: Shiva Reddy (Author), Saikat Sinha (Author), G. Abirami (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2017 , Grade: 80
    Price: US$ 6.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • Data Privacy: A Fundamental Human Right or a Privilege?
    Biases in Surveillance: Ethical Implications and Mitigation Strategies for Marginalized Communities
    - New
    Title: Data Privacy: A Fundamental Human Right or a Privilege?
    Autor:in: Franklin Nelson Djeunga Mbakakeu (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2024 , Grade: 1,0
    Price: US$ 6.99
  • Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Title: Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Autor:in: Aditya Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 6.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Cyber security, crime and warfare in Pakistan
    Title: Cyber security, crime and warfare in Pakistan
    Autor:in: Qamar Atta Ul Haq (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2016 , Grade: A
    Price: US$ 6.99
  • IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
    Title: IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
    Autor:in: Marianne Karpp (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2020 , Grade: 1,0
    Price: US$ 6.99
  • Password as the first line of defence. How to create a strong and unique password
    Title: Password as the first line of defence. How to create a strong and unique password
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2019
    Price: US$ 6.99
  • Information security for national security: The Snowden and NSA case study
    Title: Information security for national security: The Snowden and NSA case study
    Autor:in: Majed Alkhammash (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 70
    Price: US$ 6.99
  • Triple A und SSH. Versuchsprotokoll Rechnernetze
    Title: Triple A und SSH. Versuchsprotokoll Rechnernetze
    Autor:in: Noshaba Cheema (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1.0
    Price: US$ 7.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 9.99
  • Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
    Title: Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2023 , Grade: 1
    Price: US$ 9.99
  • Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Title: Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,7
    Price: US$ 11.99
  • Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
    Title: Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
    Autor:in: Michelle Bernotti (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2014 , Grade: 1,3
    Price: US$ 11.99
  • Verschleierungstechniken für Payloads
    Title: Verschleierungstechniken für Payloads
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,3
    Price: US$ 11.99
  • Dezentrale E-Commerce Plattform. OpenBazaar
    Title: Dezentrale E-Commerce Plattform. OpenBazaar
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,7
    Price: US$ 11.99
  • Encrypting File System (EFS)
    Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
    Title: Encrypting File System (EFS)
    Autor:in: M. Sc. Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,7
    Price: US$ 11.99
  • Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
    Title: Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
    Autor:in: Tobias Steinicke (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2012 , Grade: 1,0
    Price: US$ 14.99
  • Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
    Title: Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
    Autor:in: Jonas El-Sirwy (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2016 , Grade: 1
    Price: US$ 14.99
  • Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
    Title: Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
    Autor:in: Florian Wolf (Author), Jonas Martin (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
    Price: US$ 14.99
  • Management von Passwörtern. Tools und Heuristiken
    Title: Management von Passwörtern. Tools und Heuristiken
    Autor:in: Tobias Steinicke (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2014 , Grade: 1,3
    Price: US$ 14.99
  • Was heißt IT-Service-Management nach ITIL V3?
    Die Bedeutung für IT-Consulting
    Title: Was heißt IT-Service-Management nach ITIL V3?
    Autor:in: B.Sc. Christopher Krause (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2009 , Grade: 2,0
    Price: US$ 14.99
  • RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
    Title: RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
    Autor:in: Moritz Jahn (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2016 , Grade: 1,3
    Price: US$ 14.99
  • Implementierung von FIDO2 als Authentifizierungsmethode in der TravelFun-App. Eine Fallstudie zur Konzepterstellung und Umsetzung
    Title: Implementierung von FIDO2 als Authentifizierungsmethode in der TravelFun-App. Eine Fallstudie zur Konzepterstellung und Umsetzung
    Autor:in: Heribert Tellerfink (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2024 , Grade: 2
    Price: US$ 16.99
  • Eine kurze Einführung in die Post-Quanten-Kryptographie
    Title: Eine kurze Einführung in die Post-Quanten-Kryptographie
    Autor:in: Annika Kistler (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2025 , Grade: 1,0
    Price: US$ 16.99
  • IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
    Title: IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
    Autor:in: Naveen Vimalan (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 1,0
    Price: US$ 16.99
  • IT-Security-Awareness. Schwachstelle Mensch
    Title: IT-Security-Awareness. Schwachstelle Mensch
    Autor:in: Naveen Vimalan (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 2,0
    Price: US$ 16.99
  • Mehrfaktor-Authentisierung mit FIDO2
    Title: Mehrfaktor-Authentisierung mit FIDO2
    Autor:in: Dennis Hodapp (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2020 , Grade: 1,3
    Price: US$ 16.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 16.99
  • Spell-checked Synonym-based Searchable Symmetric Encryption
    Title: Spell-checked Synonym-based Searchable Symmetric Encryption
    Autor:in: Sebastian Steindl (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,0
    Price: US$ 16.99
  • Sicherheit von Android-Betriebssystemen
    Title: Sicherheit von Android-Betriebssystemen
    Autor:in: Daniel Szameitat (Author), Martin Haug (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2013 , Grade: 1.3
    Price: US$ 16.99
  • Der Hackerbegriff in den Medien
    Ein Diskurs
    Title: Der Hackerbegriff in den Medien
    Autor:in: Randy Witte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2012
    Price: US$ 16.99
  • Autonomie, Privatheit und Selbstbestimmung
    Title: Autonomie, Privatheit und Selbstbestimmung
    Autor:in: Peggy Werner (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 1,7
    Price: US$ 16.99
  • Webserver Security
    Title: Webserver Security
    Autor:in: Pavel Ermolin (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011
    Price: US$ 16.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 16.99
  • Attacken und Gegenmaßnahmen
    Informationsabfragen und Recommender Systeme
    Title: Attacken und Gegenmaßnahmen
    Autor:in: Marko Haschej (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2008 , Grade: A
    Price: US$ 16.99
  • Analyzing Online Voting Systems for Flaw Detection
    Title: Analyzing Online Voting Systems for Flaw Detection
    Autor:in: Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2015 , Grade: A
    Price: US$ 16.99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Title: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2017 , Grade: 9
    Price: US$ 16.99
  • 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Mit Fallbeispiel und Datenschutzrechtlicher Analyse
    Title: 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Autor:in: Daniel Lautenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014
    Price: US$ 16.99
  • Preformace study of WiMAX Network Security
    Security Network
    Title: Preformace study of WiMAX Network Security
    Autor:in: Ali Raheem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2011
    Price: US$ 16.99
  • Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister
    Title: Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister
    Autor:in: Markus Groß (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2012 , Grade: 1,3
    Price: US$ 16.99
  • Sicherheit komplexer Informationssysteme
    Seminarthema: Vergleich von PKI, AAI und IDM
    Title: Sicherheit komplexer Informationssysteme
    Autor:in: Kai Subel (Author), Michel Schultz (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2010
    Price: US$ 16.99
  • Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Title: Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Autor:in: Eduard Fuchs (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2010 , Grade: 1,0
    Price: US$ 16.99
  • IT-Sicherheit in der Industrie 4.0
    Wie gelingt der sichere Austausch und die Verknüpfung von Daten zwischen Unternehmen, sodass die Datensouveränität zu jeder Zeit gewährleistet ist?
    Title: IT-Sicherheit in der Industrie 4.0
    Autor:in: Mona Rebers (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 1,7
    Price: US$ 16.99
  • Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Title: Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Autor:in: Onur Güldali (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,3
    Price: US$ 16.99
  • IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
    Title: IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
    Autor:in: Constantin Sinowski (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2022 , Grade: 1,0
    Price: US$ 16.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 16.99
Show 25 50 100
123>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint