de
en
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Language
Deutsch
(133)
English
(86)
Français
(3)
Español
(2)
Price
Paid
(181)
Free
(43)
Publication Year
Any Year
since 2026
since 2025
since 2024
since 2023
since 2022
since 2021
since 2020
since 2015
since 2010
since 2005
224 results
Sort by
Most Relevant
Newest
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
9
>
Prevención del Fraude a través del uso de las Tecnologías
Autor:in:
Leonel Ermides Paniagua López (Author)
,
Hada Marena Sequeira Pérez (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 94
Price:
US$ 0.-
Cybersecurity in Digital Healthcare Services
A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
Autor:in:
Manoj Tewari (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023
Price:
US$ 0.99
A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
Autor:in:
Ireneus Mathias (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015
Price:
US$ 0.99
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
Autor:in:
Adrian O'Gara (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2014 , Grade: 90.00
Price:
US$ 0.99
Malware Detection Avoidance through Mutexes
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Study , 2020 , Grade: 4.0
Price:
US$ 0.99
Die Post-Quanten-Kryptographie. Ein Überblick
Autor:in:
Lukas Meinl (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2021 , Grade: 1,0
Price:
US$ 0.99
Universal Reencryption
Autor:in:
Christian Jungstand (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2003
Price:
US$ 0.99
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
Autor:in:
Muhammad Waseem (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: A
Price:
US$ 0.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2016
Price:
US$ 0.99
Anforderungen an Grid-basierte Intrusion Detection Systeme
Autor:in:
Christian Maier (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2008 , Grade: 1,3
Price:
US$ 0.99
How to do a Wi-Fi Forensics Analysis
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2019 , Grade: A
Price:
US$ 0.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
Autor:in:
Kai Jan Runte (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 1999
Price:
US$ 0.99
Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
Autor:in:
Khalida Lalouani (Author)
,
Hadjer Kherchi (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2017 , Grade: 15.60
Price:
US$ 0.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Deanonymization of social network profiles by the use of pictures meta data
Autor:in:
Stefan Möstel (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011 , Grade: 1.3
Price:
US$ 0.99
Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
Autor:in:
Karsten Hellinger (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2019 , Grade: 2,0
Price:
US$ 0.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Autor:in:
Markus Dreher (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2021 , Grade: 1 (90%)
Price:
US$ 0.99
Computerviren. Funktionsweise und Schutzmöglichkeiten
Autor:in:
Simon Trang (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation / Essay (Pre-University) , 2001 , Grade: 1
Price:
US$ 0.99
Reversible data hiding in encrypted images
Autor:in:
Viraj Chorghe (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2014 , Grade: 10
Price:
US$ 0.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Long-Term Archival of Encrypted Records
Autor:in:
Angel Rivera (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2008 , Grade: A
Price:
US$ 0.99
Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
Autor:in:
Enowsoum Konrad (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2025
Price:
US$ 0.99
Show
25
50
100
1
2
...
9
>