Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
<1234...9>
  • Der Hackerbegriff in den Medien
    Ein Diskurs
    Title: Der Hackerbegriff in den Medien
    Autor:in: Randy Witte (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2012
    Price: US$ 16.99
  • Detecting Veracity
    A New door to keep Safe from fake Posts
    Title: Detecting Veracity
    Autor:in: M.Tech Hemant Kumar Saini (Author), Nitesh Chouhan (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2014 , Grade: 1.0
    Price: US$ 3.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Autonomie, Privatheit und Selbstbestimmung
    Title: Autonomie, Privatheit und Selbstbestimmung
    Autor:in: Peggy Werner (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2006 , Grade: 1,7
    Price: US$ 16.99
  • Sicherheitsanalyse Webserver
    Title: Sicherheitsanalyse Webserver
    Autor:in: DI (fh) Reinhard Hofer (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Webserver Security
    Title: Webserver Security
    Autor:in: Pavel Ermolin (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011
    Price: US$ 16.99
  • Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Title: Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Autor:in: Christian Wimmer (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Title: Réalisation d’un système de détection des attaques contre les web services SOAP moyennant les méthodes de fusion de classifieurs
    Autor:in: Khalida Lalouani (Author), Hadjer Kherchi (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2017 , Grade: 15.60
    Price: US$ 0.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Title: Einfluss des IT-Sicherheitsgesetzes auf die Aufbauorganisation von Krankenhäusern
    Autor:in: Karsten Hellinger (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: 2,0
    Price: US$ 0.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Bedeutung von PGP (Pretty Good Privacy)
    Title: Bedeutung von PGP (Pretty Good Privacy)
    Autor:in: Philipp Angstmann (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2002 , Grade: 6.0 (CH-Notensystem; D: 1.0)
    Price: US$ 18.99
  • Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Title: Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
    Autor:in: Markus Dreher (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2021 , Grade: 1 (90%)
    Price: US$ 0.99
  • Computerviren. Funktionsweise und Schutzmöglichkeiten
    Title: Computerviren. Funktionsweise und Schutzmöglichkeiten
    Autor:in: Simon Trang (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation / Essay (Pre-University) , 2001 , Grade: 1
    Price: US$ 0.99
  • Reversible data hiding in encrypted images
    Title: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2014 , Grade: 10
    Price: US$ 0.99
  • Scriptbasierte Sicherungslösung für Windows Server 2008
    Title: Scriptbasierte Sicherungslösung für Windows Server 2008
    Autor:in: Hannes Schurig (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1,7
    Price: US$ 0.99
  • Long-Term Archival of Encrypted Records
    Title: Long-Term Archival of Encrypted Records
    Autor:in: Angel Rivera (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2008 , Grade: A
    Price: US$ 0.99
  • Triple A und SSH. Versuchsprotokoll Rechnernetze
    Title: Triple A und SSH. Versuchsprotokoll Rechnernetze
    Autor:in: Noshaba Cheema (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1.0
    Price: US$ 7.99
  • Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Title: Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Autor:in: Randhir Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2021 , Grade: A
    Price: US$ 46.99
  • Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Title: Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Autor:in: Torty Vincent (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis
    Price: US$ 42.99
  • Risikobehaftetes Verhalten von Mitarbeitern als Bedrohung in der Cybersicherheit
    Eine kritische Analyse und Handlungsempfehlungen für Unternehmen
    Title: Risikobehaftetes Verhalten von Mitarbeitern als Bedrohung in der Cybersicherheit
    Autor:in: Jannik Poschke (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2025 , Grade: 2,0
    Price: US$ 34.99
  • Incremental Construction of Code Property Graphs
    Title: Incremental Construction of Code Property Graphs
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2021 , Grade: 2,0
    Price: US$ 21.99
Show 25 50 100
<1234...9>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint