Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «1.klasse»

Search in

  • Title
  • Author
  • Fulltext

Language

    • English (7)
    • Deutsch (7)

Price

    • Paid (12)
    • Free (2)

Publication Year


Results for » 1.klasse «  (14 results)

Sort by
  • Was heißt IT-Service-Management nach ITIL V3?
    Die Bedeutung für IT-Consulting
    Title: Was heißt IT-Service-Management nach ITIL V3?
    Autor:in: B.Sc. Christopher Krause (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2009 , Grade: 2,0
    Price: US$ 14.99
  • Goppa Codes und ihr Nutzen im McEliece Kryptosystem
    Title: Goppa Codes und ihr Nutzen im McEliece Kryptosystem
    Autor:in: Jannik Büscher (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2021 , Grade: 1,3
    Price: US$ 34.99
  • Cloud Computing in der Versicherungsbranche
    Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud
    Title: Cloud Computing in der Versicherungsbranche
    Autor:in: Lisa Eicker (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2014 , Grade: 1,3
    Price: US$ 18.99
  • Using Bittorent protocol to launch DDoS attacks
    Title: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2012
    Price: US$ 4.99
  • Autonomie, Privatheit und Selbstbestimmung
    Title: Autonomie, Privatheit und Selbstbestimmung
    Autor:in: Peggy Werner (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 1,7
    Price: US$ 16.99
  • Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Title: Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
    Autor:in: Stefan Schärmeli (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2023 , Grade: 2.0
    Price: US$ 18.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 16.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Security in Cloud Computing
    Title: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Autor:in: Ashwin Dhivakar (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2014
    Price: US$ 21.99
  • Spell-checked Synonym-based Searchable Symmetric Encryption
    Title: Spell-checked Synonym-based Searchable Symmetric Encryption
    Autor:in: Sebastian Steindl (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,0
    Price: US$ 16.99
  • Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Title: Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Autor:in: Philipp Schmidt (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2017 , Grade: 2,0
    Price: US$ 16.99
  • Development and Implementation of secure GSM algorithm for Mobile Banking
    Telecommunication Security
    Title: Development and Implementation of secure GSM algorithm for Mobile Banking
    Autor:in: Ali Raheem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: MERIT
    Price: US$ 21.99
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint