Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «human»

Search in

  • Title
  • Author
  • Fulltext

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (57)
    • Free (29)

Publication Year


Results for » human «  (86 results)

Sort by
12...4>
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Reversible data hiding in encrypted images
    Title: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2014 , Grade: 10
    Price: US$ 0.99
  • Long-Term Archival of Encrypted Records
    Title: Long-Term Archival of Encrypted Records
    Autor:in: Angel Rivera (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2008 , Grade: A
    Price: US$ 0.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
  • Specification of security in distributed computing systems
    Title: Specification of security in distributed computing systems
    Autor:in: Richard Burnham (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 1987
    Price: US$ 0.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Title: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Author), Dr. S. Palanivel (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 9
    Price: US$ 0.99
  • Detection of Sarcastic and Abusive Comments Containing Positive Words - New
    Title: Detection of Sarcastic and Abusive Comments Containing Positive Words
    Autor:in: Go Sato (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2026
    Price: US$ 0.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
Show 25 50 100
12...4>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint