Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
12...5>
  • 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Mit Fallbeispiel und Datenschutzrechtlicher Analyse
    Title: 20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
    Autor:in: Daniel Lautenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014
    Price: US$ 16.99
  • A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    A Conceptual Framework to Mitigate Cyber and Physical Attacks
    - New
    Title: A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    Autor:in: Olayemi Phillips (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 16.99
  • A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
    Title: A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    Autor:in: Pradheep Manisekaran (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2014
    Price: US$ 21.99
  • A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Title: A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Autor:in: Dr. Helen Parimala (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
    Price: US$ 46.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Title: A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Autor:in: Tim Huse (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2020 , Grade: 1.0
    Price: US$ 42.99
  • A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Title: A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Autor:in: Sven Elmers (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2009 , Grade: 2,1
    Price: US$ 21.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
    Title: Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
    Autor:in: B.Sc. Tobias Steinicke (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2016 , Grade: 1,3
    Price: US$ 18.99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Title: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Author), Dr. S. Palanivel (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 9
    Price: US$ 0.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Analyse des Datensatzes wage2 mit der Programmiersprache R
    Wie wirken sich persönliche Attribute auf das Gehalt eines Angestellten aus?
    Title: Analyse des Datensatzes wage2 mit der Programmiersprache R
    Autor:in: Daniel Gatz (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2021 , Grade: 2,0
    Price: US$ 21.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Title: Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Autor:in: Hans Burg (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2018 , Grade: 1,5
    Price: US$ 42.99
  • Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Title: Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Autor:in: Michael Steinmann (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2003 , Grade: 2
    Price: US$ 42.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • Analysis of the BEM Code of Professional Guidelines
    Title: Analysis of the BEM Code of Professional Guidelines
    Autor:in: Bandar Hezam (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper
    Price: US$ 18.99
  • Analyzing Online Voting Systems for Flaw Detection
    Title: Analyzing Online Voting Systems for Flaw Detection
    Autor:in: Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2015 , Grade: A
    Price: US$ 16.99
  • Anforderungen an Grid-basierte Intrusion Detection Systeme
    Title: Anforderungen an Grid-basierte Intrusion Detection Systeme
    Autor:in: Christian Maier (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2008 , Grade: 1,3
    Price: US$ 0.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Attacken auf die Sicherheitsmechanismen des Wi-Fi Protected Access Industriestandards
    Title: Attacken auf die Sicherheitsmechanismen des Wi-Fi Protected Access Industriestandards
    Autor:in: Clemens Herrmann (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2009 , Grade: Sehr Gut
    Price: US$ 34.99
  • Attacken und Gegenmaßnahmen
    Informationsabfragen und Recommender Systeme
    Title: Attacken und Gegenmaßnahmen
    Autor:in: Marko Haschej (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2008 , Grade: A
    Price: US$ 16.99
  • Autonomie, Privatheit und Selbstbestimmung
    Title: Autonomie, Privatheit und Selbstbestimmung
    Autor:in: Peggy Werner (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 1,7
    Price: US$ 16.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Bedeutung von PGP (Pretty Good Privacy)
    Title: Bedeutung von PGP (Pretty Good Privacy)
    Autor:in: Philipp Angstmann (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2002 , Grade: 6.0 (CH-Notensystem; D: 1.0)
    Price: US$ 18.99
  • Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
    Title: Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
    Autor:in: Daniel Schreiber (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2019 , Grade: 1,0
    Price: US$ 18.99
  • Benachrichtigung bei Datenschutzverletzungen
    Rechtliche Verpflichtungen bei einer Datenschutzverletzung
    Title: Benachrichtigung bei Datenschutzverletzungen
    Autor:in: Carina Rehberg (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2019 , Grade: 1,8
    Price: US$ 16.99
  • Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Title: Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020
    Price: US$ 18.99
  • Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
    Title: Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
    Autor:in: Nikolas Rittmeier (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2020 , Grade: 2,3
    Price: US$ 16.99
  • Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
    Title: Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
    Autor:in: Denis Ruiz Lopez (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2016 , Grade: 1,3
    Price: US$ 21.99
  • Click Fraud - Analyse und Methode zur Identifzierung
    Title: Click Fraud - Analyse und Methode zur Identifzierung
    Autor:in: Otto Diesenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2011
    Price: US$ 42.99
  • Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
    Title: Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
    Autor:in: Yvonne Harnau (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 2,3
    Price: US$ 42.99
  • Cloud Computing in der Versicherungsbranche
    Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud
    Title: Cloud Computing in der Versicherungsbranche
    Autor:in: Lisa Eicker (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,3
    Price: US$ 18.99
  • Cloud Computing und Server-based Computing. Chancen und Risiken von serverbasierten IT-Infrastrukturen
    Title: Cloud Computing und Server-based Computing. Chancen und Risiken von serverbasierten IT-Infrastrukturen
    Autor:in: Miguel Fonseca (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2020
    Price: US$ 42.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Computerviren und Schutzmaßnahmen. Ein Überblick
    Title: Computerviren und Schutzmaßnahmen. Ein Überblick
    Autor:in: Dirk Höppner (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2015
    Price: US$ 6.99
  • Computerviren. Funktionsweise und Schutzmöglichkeiten
    Title: Computerviren. Funktionsweise und Schutzmöglichkeiten
    Autor:in: Simon Trang (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 1
    Price: US$ 0.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Cryptography and Steganography. A multilayer Data Security Approach
    Title: Cryptography and Steganography. A multilayer Data Security Approach
    Autor:in: Jagdish Chandra Patni (Author), Hitesh Kumar Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2021 , Grade: 2
    Price: US$ 42.99
  • Cyber security, crime and warfare in Pakistan
    Title: Cyber security, crime and warfare in Pakistan
    Autor:in: Qamar Atta Ul Haq (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2016 , Grade: A
    Price: US$ 6.99
  • Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Title: Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 1,0
    Price: US$ 42.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 9.99
  • Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
    Title: Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
    Autor:in: Alexander Hübert (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2013 , Grade: 1,3
    Price: US$ 17.99
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • Cyberterrorismus - Definition, Arten, Gegenmaßnahmen
    Title: Cyberterrorismus - Definition, Arten, Gegenmaßnahmen
    Autor:in: Tonio Kröner (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: 1,7
    Price: US$ 18.99
Show 25 50 100
12...5>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint