de
en
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Language
Deutsch
(133)
English
(86)
Français
(3)
Español
(2)
Price
Paid
(181)
Free
(43)
Publication Year
Any Year
since 2026
since 2025
since 2024
since 2023
since 2022
since 2021
since 2020
since 2015
since 2010
since 2005
224 results
Sort by
Most Relevant
Newest
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
3
>
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
Autor:in:
Eduard Fuchs (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2010 , Grade: 1,0
Price:
US$ 16.99
Wireless LAN Security in a SOHO Environment: A Holistic Approach
Autor:in:
Christian Wimmer (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2006 , Grade: 1.7
Price:
US$ 42.99
Webserver Security
Autor:in:
Pavel Ermolin (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 16.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Wearable Computing. Datenschutz und Datensicherheit
Autor:in:
Mario Möller (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015 , Grade: 1,5
Price:
US$ 42.99
Was heißt IT-Service-Management nach ITIL V3?
Die Bedeutung für IT-Consulting
Autor:in:
B.Sc. Christopher Krause (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2009 , Grade: 2,0
Price:
US$ 14.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 18.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 18.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 11.99
Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
Autor:in:
Danny Nothstein (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2023 , Grade: 1,3
Price:
US$ 0.99
Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2022 , Grade: 1,0
Price:
US$ 16.99
Using Security Patterns in Web-Application
Autor:in:
Shahnawaz Alam (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2011 , Grade: "-"
Price:
US$ 40.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2012
Price:
US$ 4.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 16.99
Usage of Process Mining for Security in Process-Aware Information Systems
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 16.99
Universal Reencryption
Autor:in:
Christian Jungstand (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2003
Price:
US$ 0.99
Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
Autor:in:
Till Westermayer (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2000 , Grade: 1,3
Price:
US$ 34.99
Triple A und SSH. Versuchsprotokoll Rechnernetze
Autor:in:
Noshaba Cheema (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1.0
Price:
US$ 7.99
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
Autor:in:
Sharmin Rashid Linta (Author)
,
Md. Ridgewan Khan (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 34.99
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
Security in Cloud Computing
Autor:in:
Ashwin Dhivakar (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2014
Price:
US$ 21.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 18.99
The Theory and Reality of Wireless LAN Security
Final Year project
Autor:in:
Tomasz Halapacz (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011 , Grade: 72%
Price:
US$ 42.99
The Robust Urban Transportation Network Design Problem
Autor:in:
Alireza Naimi (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2016 , Grade: 4
Price:
US$ 0.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 6.99
Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
Autor:in:
Enowsoum Konrad (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2025
Price:
US$ 0.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 16.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 6.99
Spying Software Development in Google Android
Autor:in:
Fissha SeyoumTeshome (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 21.99
Spell-checked Synonym-based Searchable Symmetric Encryption
Autor:in:
Sebastian Steindl (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 16.99
Specification of security in distributed computing systems
Autor:in:
Richard Burnham (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 1987
Price:
US$ 0.99
Spaßguerilla 2.0 oder globale Revolution?
Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung
Autor:in:
Julian Knab (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2012 , Grade: 1.7
Price:
US$ 34.99
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren
Einführung Spambekämpfung
Autor:in:
Alexander Mösinger (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2013
Price:
US$ 17.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 18.99
Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
Angriffsvektoren und Maßnahmen
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2020 , Grade: 1,3
Price:
US$ 21.99
Sicherheitsprobleme von Lokalisierungsdiensten. Vertrauenspotenziale und Risiken in Datenschutzverfahren
Autor:in:
Suat Caglayan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2012 , Grade: 2,0
Price:
US$ 42.99
Sicherheitsanalyse Webserver
Autor:in:
DI (fh) Reinhard Hofer (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2006 , Grade: 1.7
Price:
US$ 42.99
Sicherheit von Android-Betriebssystemen
Autor:in:
Daniel Szameitat (Author)
,
Martin Haug (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2013 , Grade: 1.3
Price:
US$ 16.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 16.99
Sicherheit komplexer Informationssysteme
Seminarthema: Vergleich von PKI, AAI und IDM
Autor:in:
Kai Subel (Author)
,
Michel Schultz (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2010
Price:
US$ 16.99
Sicherheit in SIP-basierten VoIP-Netzen
Autor:in:
BSc Michael Sauer (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2013 , Grade: 2
Price:
US$ 42.99
Sichere Web-Anwendungen
Autor:in:
Daniel Szameitat (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2013 , Grade: 1.0
Price:
US$ 18.99
Seitenkanalangriffe: Power Analysis
Autor:in:
Thomas Hoffmann (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2013 , Grade: 1,0
Price:
US$ 16.99
Segmentation automatique pour la reconnaissance numérique des chèques bancaires Algériens
Autor:in:
Dr Abdeljalil Gattal (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2009
Price:
US$ 42.99
Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
Autor:in:
Mashood Hassan (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017
Price:
US$ 34.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Security Issues in Hardware Virtualization
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,3
Price:
US$ 16.99
Security Architectures for Next Generation Networks
Autor:in:
Amir Ahmed Omer Yousif (Author)
,
Prof. Sami M. Sharif (Author)
,
Dr. Hamid Abbas Ali (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2014
Price:
US$ 0.99
Secure Password Policy. Current Situation and Solutions
Autor:in:
Shiva Reddy (Author)
,
Saikat Sinha (Author)
,
G. Abirami (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2017 , Grade: 80
Price:
US$ 6.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Schwachstellenanalyse & Reverse Engineering von Android Apps
Autor:in:
Daniel Szameitat (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2014
Price:
US$ 34.99
Schutz vor Cyberbedrohungen. Golden-Ticket-Attacken, Mimikatz und Password-Stealing im Active Directory
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024
Price:
US$ 18.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 18.99
SSL-VPN: Grundlagen und Anwendungsmöglichkeiten
Network Defense und VPN Technologies
Autor:in:
Harald Bachner (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2009 , Grade: 1
Price:
US$ 16.99
SCRUM im IT-Großprojekt
Erarbeitung einer Entscheidungsmatrix zur Bestimmung der geeigneten architekturellen Vorgehensweise
Autor:in:
Sebastian Storch (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 18.99
Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
Autor:in:
Khalida Lalouani (Author)
,
Hadjer Kherchi (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2017 , Grade: 15.60
Price:
US$ 0.99
Robust Graph-Based Static Code Analysis
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2019 , Grade: 1,0
Price:
US$ 21.99
Risikobehaftetes Verhalten von Mitarbeitern als Bedrohung in der Cybersicherheit
Eine kritische Analyse und Handlungsempfehlungen für Unternehmen
Autor:in:
Jannik Poschke (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2025 , Grade: 2,0
Price:
US$ 34.99
Reversible data hiding in encrypted images
Autor:in:
Viraj Chorghe (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2014 , Grade: 10
Price:
US$ 0.99
Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 18.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Public-Key-Methoden und Diskrete Logarithmusbasierte Systeme
-
New
Autor:in:
Franklin Nelson Djeunga Mbakakeu (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2025 , Grade: 1,3
Price:
US$ 6.99
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
How to protect (PII) and (PHI)?
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 16.99
Protecting Against The Unknown
A guide to improving network security to protect the Internet against future forms of security hazards
Autor:in:
Kemal Akman (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2000
Price:
US$ 21.99
Process Mining and Network Protocols
Probing the application of process mining techniques and algorithms to network protocols
Autor:in:
Matthias Leeb (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2015 , Grade: 1
Price:
US$ 42.99
Prevención del Fraude a través del uso de las Tecnologías
Autor:in:
Leonel Ermides Paniagua López (Author)
,
Hada Marena Sequeira Pérez (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 94
Price:
US$ 0.-
Preformace study of WiMAX Network Security
Security Network
Autor:in:
Ali Raheem (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2011
Price:
US$ 16.99
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps
Sicherheitsanalyse von Microsoft Komponenten
Autor:in:
Daniel Szameitat (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2014 , Grade: 1
Price:
US$ 21.99
Potential for Data Loss from Security Protected Smartphones
Investigate how to use protective security measures from the PC world to secure Smartphones
Autor:in:
Vikas Rajole (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2011 , Grade: 75
Price:
US$ 21.99
Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
Autor:in:
Eranda Gunasena (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2018
Price:
US$ 23.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 6.99
Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,7
Price:
US$ 18.99
On the security of TLS 1.2 and TLS 1.3. A comparison
Autor:in:
Sarah Syed-Winkler (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 95%
Price:
US$ 21.99
Neutralización del ransomware criptográfico mediante un sistema de almacenamiento sincrónico versionado
Autor:in:
Holzen Atocha Martínez García (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2017
Price:
US$ 42.99
Neuere Phishingmethoden und Möglichkeiten der Prävention
Autor:in:
Joachim Kienzler (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2023 , Grade: 1,0
Price:
US$ 18.99
Netzwerke und deren Sicherheit
Autor:in:
Dea Ana Protic (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2001 , Grade: 1-2
Price:
US$ 34.99
Mobile Malware Anti-malware Coevolution
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von "Corporate Owned, Personally Enabled" und "Bring your own Device"
Autor:in:
Daniel Kamps (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2015 , Grade: 3,0
Price:
US$ 18.99
Mehrfaktor-Authentisierung mit FIDO2
Autor:in:
Dennis Hodapp (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2020 , Grade: 1,3
Price:
US$ 16.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 16.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Malware-Obfuscation auf Basis des Frameworks DOSFUSCATION
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,7
Price:
US$ 18.99
Malware Detection Avoidance through Mutexes
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Study , 2020 , Grade: 4.0
Price:
US$ 0.99
Long-Term Archival of Encrypted Records
Autor:in:
Angel Rivera (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2008 , Grade: A
Price:
US$ 0.99
Loganalysis Tools für Datamining in Logfiles
Autor:in:
Dominic Hurm (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2009 , Grade: 1,3
Price:
US$ 21.99
Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
Autor:in:
Kai Jan Runte (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 1999
Price:
US$ 0.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Kreditkartenbetrug. Einbruch in Kreditkarten-Server
Autor:in:
Magister Gerald Oswald (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 2
Price:
US$ 18.99
Kennzahlensystem für das IT-Controlling
Autor:in:
Jasmina Nickel (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2018 , Grade: 1,7
Price:
US$ 16.99
Kalter Krieg im Netz. Die Position der NATO in einem neuen Wettrüsten
Autor:in:
Matthias Hartig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 18.99
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
Autor:in:
Adrian O'Gara (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2014 , Grade: 90.00
Price:
US$ 0.99
Intrusion Detection System in mobile ad hoc network in MAC layer
Autor:in:
Tapan Gondaliya (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2013 , Grade: C
Price:
US$ 21.99
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2014 , Grade: 1,7
Price:
US$ 18.99
Instant Messaging and Cross Site Scripting (XSS)
Autor:in:
MSc. Katharina Kurek (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 18.99
Innovationen und IT-Sicherheit
Innovationen und Sicherheit von RFID-Systemen
Autor:in:
Daniel Hack (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2008 , Grade: 2,0
Price:
US$ 18.99
Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister
Autor:in:
Markus Groß (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2012 , Grade: 1,3
Price:
US$ 16.99
Show
25
50
100
1
2
3
>