Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «transfers»

Search in

  • Title
  • Author
  • Fulltext

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


Results for » transfers «  (224 results)

Sort by
12...9>
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Die Post-Quanten-Kryptographie. Ein Überblick
    Title: Die Post-Quanten-Kryptographie. Ein Überblick
    Autor:in: Lukas Meinl (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2021 , Grade: 1,0
    Price: US$ 0.99
  • Universal Reencryption
    Title: Universal Reencryption
    Autor:in: Christian Jungstand (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2003
    Price: US$ 0.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • Anforderungen an Grid-basierte Intrusion Detection Systeme
    Title: Anforderungen an Grid-basierte Intrusion Detection Systeme
    Autor:in: Christian Maier (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2008 , Grade: 1,3
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Title: Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
    Autor:in: Kai Jan Runte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 1999
    Price: US$ 0.99
  • A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Title: A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Autor:in: Dr. Helen Parimala (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
    Price: US$ 46.99
  • Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Title: Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Autor:in: Stefan Schärmeli (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2023 , Grade: 2.0
    Price: US$ 18.99
  • Neuere Phishingmethoden und Möglichkeiten der Prävention
    Title: Neuere Phishingmethoden und Möglichkeiten der Prävention
    Autor:in: Joachim Kienzler (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2023 , Grade: 1,0
    Price: US$ 18.99
  • IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
    Title: IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
    Autor:in: Naveen Vimalan (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 1,0
    Price: US$ 16.99
  • IT-Security-Awareness. Schwachstelle Mensch
    Title: IT-Security-Awareness. Schwachstelle Mensch
    Autor:in: Naveen Vimalan (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 2,0
    Price: US$ 16.99
  • A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Title: A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Autor:in: Tim Huse (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2020 , Grade: 1.0
    Price: US$ 42.99
  • On the security of TLS 1.2 and TLS 1.3. A comparison
    Title: On the security of TLS 1.2 and TLS 1.3. A comparison
    Autor:in: Sarah Syed-Winkler (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 95%
    Price: US$ 21.99
  • Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
    Title: Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,7
    Price: US$ 18.99
  • Datenschutzanalyse, Folgenabschätzung und Gewährleistung eines besseren Datenschutzes für definierte Geschäftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
    Title: Datenschutzanalyse, Folgenabschätzung und Gewährleistung eines besseren Datenschutzes für definierte Geschäftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
    Autor:in: Jonas Noesges (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 1,3
    Price: US$ 42.99
  • Eine kurze Einführung in die Post-Quanten-Kryptographie
    Title: Eine kurze Einführung in die Post-Quanten-Kryptographie
    Autor:in: Annika Kistler (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2025 , Grade: 1,0
    Price: US$ 16.99
  • Public-Key-Methoden und Diskrete Logarithmusbasierte Systeme - New
    Title: Public-Key-Methoden und Diskrete Logarithmusbasierte Systeme
    Autor:in: Franklin Nelson Djeunga Mbakakeu (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2025 , Grade: 1,3
    Price: US$ 6.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
Show 25 50 100
12...9>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint