en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(138)
Search all subjects...
Category of text
University student text
(61)
Thesis
(34)
Textbook, Science
(13)
Secondary school text
(6)
Price
free
(27)
0 - 10 USD
(15)
10 - 25 USD
(72)
25 - 50 USD
(24)
Language
German
(81)
English
(53)
French
(3)
Spanish; Castilian
(1)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
138 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
>
Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
-
New
Autor:in:
Danny Nothstein (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2023 , Grade: 1,3
Price:
US$ 0.99
Cybersecurity in Digital Healthcare Services
A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
Autor:in:
Manoj Tewari (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023
Price:
US$ 0.99
Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
Autor:in:
Karsten Hellinger (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2019 , Grade: 2,0
Price:
US$ 0.99
Mobile Malware Anti-malware Coevolution
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Malware Detection Avoidance through Mutexes
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Study , 2020 , Grade: 4.0
Price:
US$ 0.99
Hardware Trojan Threat Taxonomies 2017-2020
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Autor:in:
Markus Dreher (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2021 , Grade: 1 (90%)
Price:
US$ 0.99
Die Post-Quanten-Kryptographie. Ein Überblick
Autor:in:
Lukas Meinl (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2021 , Grade: 1,0
Price:
US$ 0.99
Credit Card Fraud Detection Using Supervised Learning Algorithms
Autor:in:
Daniyal Baig (Author)
,
Muhammad Farrukh Nadeem (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2020 , Grade: 3.16
Price:
US$ 0.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
How to do a Wi-Fi Forensics Analysis
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2019 , Grade: A
Price:
US$ 0.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Cloud computing. A security analysis
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2017 , Grade: A
Price:
US$ 0.99
A Study in Protocol Obfuscation Techniques and their Effectiveness
Autor:in:
James Khan (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: 4
Price:
US$ 0.99
The Robust Urban Transportation Network Design Problem
Autor:in:
Alireza Naimi (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2016 , Grade: 4
Price:
US$ 0.99
Anforderungen an Grid-basierte Intrusion Detection Systeme
Autor:in:
Christian Maier (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2008 , Grade: 1,3
Price:
US$ 0.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
Autor:in:
Muhammad Waseem (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: A
Price:
US$ 0.99
Cryptography and Steganography in Digital Images
Autor:in:
Wassim Al Chamaa (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2009 , Grade: 19.61 / 20
Price:
US$ 0.99
Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
Autor:in:
Khalida Lalouani (Author)
,
Hadjer Kherchi (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2017 , Grade: 15.60
Price:
US$ 0.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Autor:in:
Robert Joodat (Author)
,
Eric Wang (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2017 , Grade: N/A
Price:
US$ 0.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
Specification of security in distributed computing systems
Autor:in:
Richard Burnham (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 1987
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2016
Price:
US$ 0.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Analysis and Applications of Web Security Services through the Network Features
Autor:in:
Muhammad Ismail Mohmand (Author)
,
David Young (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2015
Price:
US$ 0.99
Graph Theory Applications in Network Security
Autor:in:
Fernando Docemmilli (Author)
,
Jonathan Webb (Author)
,
Mikhail Bonin (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2015
Price:
US$ 0.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Autor:in:
Daniela Petzoldt (Author)
Subject:
Computer Science - IT-Security
Category:
Abstract , 2017 , Grade: 1
Price:
US$ 5.99
IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
Autor:in:
Marianne Karpp (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 6.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 5.99
Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
Autor:in:
Aditya Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 6.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 6.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
Application Network Architecture for Payroll System
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 9
Price:
US$ 6.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Secure Password Policy. Current Situation and Solutions
Autor:in:
Shiva Reddy (Author)
,
Saikat Sinha (Author)
,
G. Abirami (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2017 , Grade: 80
Price:
US$ 6.99
Computerviren und Schutzmaßnahmen. Ein Überblick
Autor:in:
Dirk Höppner (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2015
Price:
US$ 6.99
Cyber security, crime and warfare in Pakistan
Autor:in:
Qamar Atta Ul Haq (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2016 , Grade: A
Price:
US$ 6.99
Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
-
New
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2022 , Grade: 1,0
Price:
US$ 7.99
Triple A und SSH. Versuchsprotokoll Rechnernetze
Autor:in:
Noshaba Cheema (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1.0
Price:
US$ 7.99
Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2023 , Grade: 1
Price:
US$ 8.99
Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
Autor:in:
Dr. Manisha Kumari Deep (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2.5
Price:
US$ 8.99
Encrypting File System (EFS)
Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
Autor:in:
M. Sc. Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Dezentrale E-Commerce Plattform. OpenBazaar
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
Autor:in:
Florian Wolf (Author)
,
Jonas Martin (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
Price:
US$ 14.99
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte
Autor:in:
Nicolas Wilken (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1-
Price:
US$ 14.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
Usage of Process Mining for Security in Process-Aware Information Systems
-
New
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 15.99
Implementierung von FIDO2 als Authentifizierungsmethode in der TravelFun-App. Eine Fallstudie zur Konzepterstellung und Umsetzung
Autor:in:
Heribert Tellerfink (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2024 , Grade: 2
Price:
US$ 14.99
Herausforderungen für Betreiber kritischer Infrastrukturen. Arten von Bedrohungsszenarien, rechtlicher Rahmen und Gegenmaßnahmen
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2020 , Grade: 1,0
Price:
US$ 15.99
Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2022 , Grade: 1,0
Price:
US$ 14.99
IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
Autor:in:
Constantin Sinowski (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2022 , Grade: 1,0
Price:
US$ 15.99
Data Encryption Standard (DES) and Issues of DES and its Replacement
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2022 , Grade: 75%
Price:
US$ 15.99
IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
Autor:in:
Naveen Vimalan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,0
Price:
US$ 14.99
IT-Security-Awareness. Schwachstelle Mensch
Autor:in:
Naveen Vimalan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 2,0
Price:
US$ 14.99
Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
Autor:in:
Nikolas Rittmeier (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 2,3
Price:
US$ 14.99
Datenschutz und Datensicherheit im Cloud Computing
Autor:in:
Steffen Friesen (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 14.99
Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
Autor:in:
Onur Güldali (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,3
Price:
US$ 15.99
IT-Sicherheit in der Industrie 4.0
Wie gelingt der sichere Austausch und die Verknüpfung von Daten zwischen Unternehmen, sodass die Datensouveränität zu jeder Zeit gewährleistet ist?
Autor:in:
Mona Rebers (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 15.99
Security Issues in Hardware Virtualization
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,3
Price:
US$ 14.99
Spell-checked Synonym-based Searchable Symmetric Encryption
Autor:in:
Sebastian Steindl (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 14.99
Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
Autor:in:
Mika Landeck (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 15.99
Home Security Systems. Intrusion Detection with GSM
Autor:in:
Washington Mutwiri (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: 2.1
Price:
US$ 15.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 14.99
Benachrichtigung bei Datenschutzverletzungen
Rechtliche Verpflichtungen bei einer Datenschutzverletzung
Autor:in:
Carina Rehberg (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,8
Price:
US$ 14.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 15.99
Differences Between the Security Models of Android and iOS
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2018 , Grade: 1,0
Price:
US$ 14.99
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
How to protect (PII) and (PHI)?
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 15.99
Kennzahlensystem für das IT-Controlling
Autor:in:
Jasmina Nickel (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2018 , Grade: 1,7
Price:
US$ 15.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 15.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 14.99
Schutz vor Cyberbedrohungen. Golden-Ticket-Attacken, Mimikatz und Password-Stealing im Active Directory
-
New
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024
Price:
US$ 17.99
Critical Analysis of Ransomware in Relation to Cybercrime
Autor:in:
Rhoda Kariuki (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023 , Grade: A
Price:
US$ 17.99
Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
Autor:in:
Stefan Schärmeli (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2023 , Grade: 2.0
Price:
US$ 17.99
Neuere Phishingmethoden und Möglichkeiten der Prävention
Autor:in:
Joachim Kienzler (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2023 , Grade: 1,0
Price:
US$ 17.99
IT-Sicherheit - Sicherheitsrisiken des BYOD Konzeptes und alternative Methoden
Autor:in:
Michelle Kaufmann (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2022 , Grade: 1.0
Price:
US$ 16.99
Analysis of the BEM Code of Professional Guidelines
Autor:in:
Bandar Hezam (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper
Price:
US$ 17.99
Die Werkzeuge eines Hackers
Ein Beispielangriff mittels Metasploit
Autor:in:
Niklas Höfling (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2021 , Grade: 1,0
Price:
US$ 17.99
IT-Sicherheit. Das "Bring your own Device" Konzept
Autor:in:
Jens Bader (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2021
Price:
US$ 17.99
Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,7
Price:
US$ 17.99
Kreditkartenbetrug. Einbruch in Kreditkarten-Server
Autor:in:
Magister Gerald Oswald (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 2
Price:
US$ 17.99
Kalter Krieg im Netz. Die Position der NATO in einem neuen Wettrüsten
Autor:in:
Matthias Hartig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
IT-Sicherheit und das Betriebssystem. Unterstützung durch das Betriebssystem und alternative Lösungsansätze
Autor:in:
Norbert Hirschpek (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 17.99
Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020
Price:
US$ 17.99
Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
Malware-Obfuscation auf Basis des Frameworks DOSFUSCATION
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,7
Price:
US$ 16.99
Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
Autor:in:
Daniel Schreiber (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,0
Price:
US$ 17.99
Information Technology Infrastructure Library (ITIL) Framework. Theoretische Grundlagen und Anwendungsbeispiel anhand eines Unternehmens
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2018 , Grade: 1,3
Price:
US$ 17.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 17.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Datenschutzgesetz in der IT
Autor:in:
Rochus Stobbe (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 17.99
Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
Autor:in:
Kse Nia (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2017 , Grade: 2,7
Price:
US$ 17.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 17.99
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
Autor:in:
B.Sc. Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 17.99
Show
25
50
100
1
2
>