de
en
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Language
Deutsch
(133)
English
(86)
Français
(3)
Español
(2)
Price
Paid
(181)
Free
(43)
Publication Year
Any Year
since 2026
since 2025
since 2024
since 2023
since 2022
since 2021
since 2020
since 2015
since 2010
since 2005
224 results
Sort by
Most Relevant
Newest
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
9
>
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
Autor:in:
Eduard Fuchs (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2010 , Grade: 1,0
Price:
US$ 16.99
Wireless LAN Security in a SOHO Environment: A Holistic Approach
Autor:in:
Christian Wimmer (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2006 , Grade: 1.7
Price:
US$ 42.99
Webserver Security
Autor:in:
Pavel Ermolin (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 16.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Wearable Computing. Datenschutz und Datensicherheit
Autor:in:
Mario Möller (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015 , Grade: 1,5
Price:
US$ 42.99
Was heißt IT-Service-Management nach ITIL V3?
Die Bedeutung für IT-Consulting
Autor:in:
B.Sc. Christopher Krause (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2009 , Grade: 2,0
Price:
US$ 14.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 18.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 18.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 11.99
Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
Autor:in:
Danny Nothstein (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2023 , Grade: 1,3
Price:
US$ 0.99
Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
Autor:in:
Anonym (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2022 , Grade: 1,0
Price:
US$ 16.99
Using Security Patterns in Web-Application
Autor:in:
Shahnawaz Alam (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2011 , Grade: "-"
Price:
US$ 40.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2012
Price:
US$ 4.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 16.99
Usage of Process Mining for Security in Process-Aware Information Systems
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 16.99
Universal Reencryption
Autor:in:
Christian Jungstand (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2003
Price:
US$ 0.99
Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
Autor:in:
Till Westermayer (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2000 , Grade: 1,3
Price:
US$ 34.99
Triple A und SSH. Versuchsprotokoll Rechnernetze
Autor:in:
Noshaba Cheema (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1.0
Price:
US$ 7.99
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
Autor:in:
Sharmin Rashid Linta (Author)
,
Md. Ridgewan Khan (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 34.99
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
Security in Cloud Computing
Autor:in:
Ashwin Dhivakar (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2014
Price:
US$ 21.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 18.99
The Theory and Reality of Wireless LAN Security
Final Year project
Autor:in:
Tomasz Halapacz (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011 , Grade: 72%
Price:
US$ 42.99
The Robust Urban Transportation Network Design Problem
Autor:in:
Alireza Naimi (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2016 , Grade: 4
Price:
US$ 0.99
Show
25
50
100
1
2
...
9
>