en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(28)
Search all subjects...
Category of text
University student text
(90)
Thesis
(65)
Textbook, Science
(22)
Secondary school text
(9)
Search all categories...
Price
free
(11)
0 - 10 USD
(6)
10 - 25 USD
(10)
25 - 50 USD
(1)
Language
English
(18)
German
(10)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
28 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Critical Analysis of Ransomware in Relation to Cybercrime
Autor:in:
Rhoda Kariuki (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023 , Grade: A
Price:
US$ 17.99
Cybersecurity in Digital Healthcare Services
A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
Autor:in:
Manoj Tewari (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2023
Price:
US$ 0.99
Mobile Malware Anti-malware Coevolution
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Hardware Trojan Threat Taxonomies 2017-2020
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 5.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Home Security Systems. Intrusion Detection with GSM
Autor:in:
Washington Mutwiri (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: 2.1
Price:
US$ 15.99
Cloud computing. A security analysis
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2017 , Grade: A
Price:
US$ 0.99
IT Application Security and Control
Autor:in:
Dileep Keshava Narayana (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2012 , Grade: 98
Price:
US$ 20.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 17.99
Application Network Architecture for Payroll System
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 9
Price:
US$ 6.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 15.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Autor:in:
Robert Joodat (Author)
,
Eric Wang (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2017 , Grade: N/A
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2016
Price:
US$ 0.99
Cyber security, crime and warfare in Pakistan
Autor:in:
Qamar Atta Ul Haq (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2016 , Grade: A
Price:
US$ 6.99
Graph Theory Applications in Network Security
Autor:in:
Fernando Docemmilli (Author)
,
Jonathan Webb (Author)
,
Mikhail Bonin (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2015
Price:
US$ 0.99
Detecting Veracity
A New door to keep Safe from fake Posts
Autor:in:
M.Tech Hemant Kumar Saini (Author)
,
Nitesh Chouhan (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review , 2014 , Grade: 1.0
Price:
US$ 3.99
Analysis of the BEM Code of Professional Guidelines
Autor:in:
Bandar Hezam (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper
Price:
US$ 17.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 14.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Autor:in:
Daniela Petzoldt (Author)
Subject:
Computer Science - IT-Security
Category:
Abstract , 2017 , Grade: 1
Price:
US$ 5.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 17.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 17.99
Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten
Autor:in:
Ralph Schimpf (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2011 , Grade: 1,7
Price:
US$ 31.99
IT-Sicherheit in Firmennetzwerken
Vergleich der IT-Governance Modelle Cobit®, ITIL® und MOF®
Autor:in:
DI(FH), M.A. Stefan Wiedner (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2008 , Grade: 1
Price:
US$ 16.99
Universal Reencryption
Autor:in:
Christian Jungstand (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2003
Price:
US$ 0.99
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Autor:in:
Markus Dreher (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2021 , Grade: 1 (90%)
Price:
US$ 0.99
Show
25
50
100