Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
12...9>
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Title: Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Autor:in: Eduard Fuchs (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2010 , Grade: 1,0
    Price: US$ 16.99
  • Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Title: Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Autor:in: Christian Wimmer (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Webserver Security
    Title: Webserver Security
    Autor:in: Pavel Ermolin (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011
    Price: US$ 16.99
  • Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Title: Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,7
    Price: US$ 11.99
  • Wearable Computing. Datenschutz und Datensicherheit
    Title: Wearable Computing. Datenschutz und Datensicherheit
    Autor:in: Mario Möller (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015 , Grade: 1,5
    Price: US$ 42.99
  • Was heißt IT-Service-Management nach ITIL V3?
    Die Bedeutung für IT-Consulting
    Title: Was heißt IT-Service-Management nach ITIL V3?
    Autor:in: B.Sc. Christopher Krause (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2009 , Grade: 2,0
    Price: US$ 14.99
  • Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
    Title: Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
    Autor:in: Sebastian Küsters (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2016 , Grade: 1
    Price: US$ 18.99
  • WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
    Title: WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2016 , Grade: 1,0
    Price: US$ 18.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • Verschleierungstechniken für Payloads
    Title: Verschleierungstechniken für Payloads
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,3
    Price: US$ 11.99
  • Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Title: Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Autor:in: Danny Nothstein (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2023 , Grade: 1,3
    Price: US$ 0.99
  • Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
    Title: Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2022 , Grade: 1,0
    Price: US$ 16.99
  • Using Security Patterns in Web-Application
    Title: Using Security Patterns in Web-Application
    Autor:in: Shahnawaz Alam (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: "-"
    Price: US$ 40.99
  • Using Bittorent protocol to launch DDoS attacks
    Title: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2012
    Price: US$ 4.99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Title: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2017 , Grade: 9
    Price: US$ 16.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 16.99
  • Universal Reencryption
    Title: Universal Reencryption
    Autor:in: Christian Jungstand (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2003
    Price: US$ 0.99
  • Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
    Title: Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
    Autor:in: Till Westermayer (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2000 , Grade: 1,3
    Price: US$ 34.99
  • Triple A und SSH. Versuchsprotokoll Rechnernetze
    Title: Triple A und SSH. Versuchsprotokoll Rechnernetze
    Autor:in: Noshaba Cheema (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1.0
    Price: US$ 7.99
  • Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Title: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Autor:in: Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011
    Price: US$ 34.99
  • To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Security in Cloud Computing
    Title: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Autor:in: Ashwin Dhivakar (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2014
    Price: US$ 21.99
  • The pros and cons of modern web application security flaws and possible solutions
    Title: The pros and cons of modern web application security flaws and possible solutions
    Autor:in: Shahriat Hossain (Author), Kh Ashique Mahmud (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 10
    Price: US$ 18.99
  • The Theory and Reality of Wireless LAN Security
    Final Year project
    Title: The Theory and Reality of Wireless LAN Security
    Autor:in: Tomasz Halapacz (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011 , Grade: 72%
    Price: US$ 42.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
Show 25 50 100
12...9>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint