en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(138)
Search all subjects...
Category of text
University student text
(61)
Thesis
(34)
Textbook, Science
(13)
Secondary school text
(6)
Price
free
(27)
0 - 10 USD
(15)
10 - 25 USD
(72)
25 - 50 USD
(24)
Language
German
(81)
English
(53)
French
(3)
Spanish; Castilian
(1)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
138 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
>
Datenschutzgesetz in der IT
Autor:in:
Rochus Stobbe (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 17.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
Wearable Computing. Datenschutz und Datensicherheit
Autor:in:
Mario Möller (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015 , Grade: 1,5
Price:
US$ 36.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Graph Theory Applications in Network Security
Autor:in:
Fernando Docemmilli (Author)
,
Jonathan Webb (Author)
,
Mikhail Bonin (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2015
Price:
US$ 0.99
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2014 , Grade: 1,7
Price:
US$ 17.99
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von "Corporate Owned, Personally Enabled" und "Bring your own Device"
Autor:in:
Daniel Kamps (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2015 , Grade: 3,0
Price:
US$ 17.99
Analysis and Applications of Web Security Services through the Network Features
Autor:in:
Muhammad Ismail Mohmand (Author)
,
David Young (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2015
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2016
Price:
US$ 0.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 17.99
Cyber security, crime and warfare in Pakistan
Autor:in:
Qamar Atta Ul Haq (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2016 , Grade: A
Price:
US$ 6.99
Specification of security in distributed computing systems
Autor:in:
Richard Burnham (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 1987
Price:
US$ 0.99
Industrie 4.0 und Cybercrime. Sicherheitskonzepte für Cybersecurity
Autor:in:
Lisa Villing (Author)
,
Nora Bohland (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
Autor:in:
Denis Ruiz Lopez (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 20.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
Autor:in:
B.Sc. Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 17.99
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte
Autor:in:
Nicolas Wilken (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1-
Price:
US$ 14.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 17.99
Computerviren und Schutzmaßnahmen. Ein Überblick
Autor:in:
Dirk Höppner (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2015
Price:
US$ 6.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Autor:in:
Daniela Petzoldt (Author)
Subject:
Computer Science - IT-Security
Category:
Abstract , 2017 , Grade: 1
Price:
US$ 5.99
Secure Password Policy. Current Situation and Solutions
Autor:in:
Shiva Reddy (Author)
,
Saikat Sinha (Author)
,
G. Abirami (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2017 , Grade: 80
Price:
US$ 6.99
Spying Software Development in Google Android
Autor:in:
Fissha SeyoumTeshome (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 20.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: 1,0
Price:
US$ 36.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Autor:in:
Robert Joodat (Author)
,
Eric Wang (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2017 , Grade: N/A
Price:
US$ 0.99
Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
Autor:in:
Florian Wolf (Author)
,
Jonas Martin (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
Price:
US$ 14.99
Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
Autor:in:
Kse Nia (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2017 , Grade: 2,7
Price:
US$ 17.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
Autor:in:
Khalida Lalouani (Author)
,
Hadjer Kherchi (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2017 , Grade: 15.60
Price:
US$ 0.99
Cryptography and Steganography in Digital Images
Autor:in:
Wassim Al Chamaa (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2009 , Grade: 19.61 / 20
Price:
US$ 0.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 14.99
Application Network Architecture for Payroll System
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 9
Price:
US$ 6.99
Neutralización del ransomware criptográfico mediante un sistema de almacenamiento sincrónico versionado
Autor:in:
Holzen Atocha Martínez García (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2017
Price:
US$ 36.99
Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
Autor:in:
Mashood Hassan (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017
Price:
US$ 33.99
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
Autor:in:
Muhammad Waseem (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: A
Price:
US$ 0.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Anforderungen an Grid-basierte Intrusion Detection Systeme
Autor:in:
Christian Maier (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2008 , Grade: 1,3
Price:
US$ 0.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 15.99
The Robust Urban Transportation Network Design Problem
Autor:in:
Alireza Naimi (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2016 , Grade: 4
Price:
US$ 0.99
Etude Approfondie sur l’Usage des Protocoles SSH et Open SSH dans un Man
Autor:in:
Roland Nathan Kalonji (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2014
Price:
US$ 30.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 17.99
Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
Autor:in:
Dr. Manisha Kumari Deep (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2018 , Grade: 2.5
Price:
US$ 8.99
Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
Autor:in:
Hans Burg (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2018 , Grade: 1,5
Price:
US$ 36.99
Kennzahlensystem für das IT-Controlling
Autor:in:
Jasmina Nickel (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2018 , Grade: 1,7
Price:
US$ 15.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
A Study in Protocol Obfuscation Techniques and their Effectiveness
Autor:in:
James Khan (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2017 , Grade: 4
Price:
US$ 0.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99
IT Application Security and Control
Autor:in:
Dileep Keshava Narayana (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2012 , Grade: 98
Price:
US$ 20.99
Segmentation automatique pour la reconnaissance numérique des chèques bancaires Algériens
Autor:in:
Dr Abdeljalil Gattal (Author)
Subject:
Computer Science - IT-Security
Category:
Diploma Thesis , 2009
Price:
US$ 36.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2018 , Grade: B
Price:
US$ 36.99
Information Technology Infrastructure Library (ITIL) Framework. Theoretische Grundlagen und Anwendungsbeispiel anhand eines Unternehmens
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2018 , Grade: 1,3
Price:
US$ 17.99
Cloud computing. A security analysis
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2017 , Grade: A
Price:
US$ 0.99
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
How to protect (PII) and (PHI)?
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 15.99
Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
Autor:in:
Eranda Gunasena (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2018
Price:
US$ 23.99
Differences Between the Security Models of Android and iOS
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2018 , Grade: 1,0
Price:
US$ 14.99
Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
Autor:in:
Daniel Schreiber (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,0
Price:
US$ 17.99
Dezentrale E-Commerce Plattform. OpenBazaar
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 15.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 14.99
Home Security Systems. Intrusion Detection with GSM
Autor:in:
Washington Mutwiri (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: 2.1
Price:
US$ 15.99
Benachrichtigung bei Datenschutzverletzungen
Rechtliche Verpflichtungen bei einer Datenschutzverletzung
Autor:in:
Carina Rehberg (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,8
Price:
US$ 14.99
Robust Graph-Based Static Code Analysis
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2019 , Grade: 1,0
Price:
US$ 18.99
Encrypting File System (EFS)
Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
Autor:in:
M. Sc. Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 6.99
Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
Autor:in:
Aditya Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 6.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
How to do a Wi-Fi Forensics Analysis
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2019 , Grade: A
Price:
US$ 0.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
Informationssicherheit für Gesundheitsdienstleister in der D-A-CH Region Europas
Einführung und Betrieb eines Information Security Management System (ISMS)
Autor:in:
Peter Anzenberger (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2019 , Grade: 1
Price:
US$ 45.99
Die Herausforderungen von IT-Sicherheit für die Videoüberwachung
Autor:in:
Ugur Ataman (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2018 , Grade: 2
Price:
US$ 41.99
Cloud Computing und Server-based Computing. Chancen und Risiken von serverbasierten IT-Infrastrukturen
Autor:in:
Miguel Fonseca (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2020
Price:
US$ 36.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 5.99
Malware-Obfuscation auf Basis des Frameworks DOSFUSCATION
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,7
Price:
US$ 16.99
Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
Angriffsvektoren und Maßnahmen
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2020 , Grade: 1,3
Price:
US$ 20.99
Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020
Price:
US$ 17.99
Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
Autor:in:
Mika Landeck (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 15.99
Spell-checked Synonym-based Searchable Symmetric Encryption
Autor:in:
Sebastian Steindl (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 14.99
Security Issues in Hardware Virtualization
Autor:in:
Samuel Hopstock (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,3
Price:
US$ 14.99
Credit Card Fraud Detection Using Supervised Learning Algorithms
Autor:in:
Daniyal Baig (Author)
,
Muhammad Farrukh Nadeem (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2020 , Grade: 3.16
Price:
US$ 0.99
Sicherheitsprobleme von Lokalisierungsdiensten. Vertrauenspotenziale und Risiken in Datenschutzverfahren
Autor:in:
Suat Caglayan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2012 , Grade: 2,0
Price:
US$ 36.99
Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
IT-Sicherheit und das Betriebssystem. Unterstützung durch das Betriebssystem und alternative Lösungsansätze
Autor:in:
Norbert Hirschpek (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 17.99
Kalter Krieg im Netz. Die Position der NATO in einem neuen Wettrüsten
Autor:in:
Matthias Hartig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
IT-Risikomanagement. Komponenten, Prozesse und Methoden eines IT-Risikomanagementsystems
Autor:in:
Christoph Mütschard (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2018 , Grade: 1,0
Price:
US$ 31.99
Kreditkartenbetrug. Einbruch in Kreditkarten-Server
Autor:in:
Magister Gerald Oswald (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 2
Price:
US$ 17.99
IT-Sicherheit in der Industrie 4.0
Wie gelingt der sichere Austausch und die Verknüpfung von Daten zwischen Unternehmen, sodass die Datensouveränität zu jeder Zeit gewährleistet ist?
Autor:in:
Mona Rebers (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 15.99
Analyse des Datensatzes wage2 mit der Programmiersprache R
Wie wirken sich persönliche Attribute auf das Gehalt eines Angestellten aus?
Autor:in:
Daniel Gatz (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2021 , Grade: 2,0
Price:
US$ 20.99
Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
Autor:in:
Onur Güldali (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,3
Price:
US$ 15.99
Die Post-Quanten-Kryptographie. Ein Überblick
Autor:in:
Lukas Meinl (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2021 , Grade: 1,0
Price:
US$ 0.99
Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,7
Price:
US$ 17.99
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Autor:in:
Markus Dreher (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2021 , Grade: 1 (90%)
Price:
US$ 0.99
IT-Security für KMU. Praxisnahe Maßnahmen und Empfehlungen zur grundlegenden Absicherung der IT-Systeme in kleinen und mittelständischen Unternehmen
Autor:in:
Nico Ohlig (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2021 , Grade: 1,3
Price:
US$ 36.99
On the security of TLS 1.2 and TLS 1.3. A comparison
Autor:in:
Sarah Syed-Winkler (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 95%
Price:
US$ 20.99
Datenschutzanalyse, Folgenabschätzung und Gewährleistung eines besseren Datenschutzes für definierte Geschäftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie
Autor:in:
Jonas Noesges (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2019 , Grade: 1,3
Price:
US$ 36.99
IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
Autor:in:
Marianne Karpp (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 6.99
Show
25
50
100
1
2
>