Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «analysis»

Search in

  • Title
  • Author
  • Fulltext

Language

    • Deutsch (18)
    • English (10)

Price

    • Paid (23)
    • Free (5)

Publication Year


Results for » analysis «  (28 results)

Sort by
12>
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Robust Graph-Based Static Code Analysis
    Title: Robust Graph-Based Static Code Analysis
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2019 , Grade: 1,0
    Price: US$ 21.99
  • Seitenkanalangriffe: Power Analysis
    Title: Seitenkanalangriffe: Power Analysis
    Autor:in: Thomas Hoffmann (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2013 , Grade: 1,0
    Price: US$ 16.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • Analysis of the BEM Code of Professional Guidelines
    Title: Analysis of the BEM Code of Professional Guidelines
    Autor:in: Bandar Hezam (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper
    Price: US$ 18.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Title: A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Autor:in: Sven Elmers (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2009 , Grade: 2,1
    Price: US$ 21.99
  • Loganalysis Tools für Datamining in Logfiles
    Title: Loganalysis Tools für Datamining in Logfiles
    Autor:in: Dominic Hurm (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2009 , Grade: 1,3
    Price: US$ 21.99
  • Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Title: Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Autor:in: Mashood Hassan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017
    Price: US$ 34.99
  • Click Fraud - Analyse und Methode zur Identifzierung
    Title: Click Fraud - Analyse und Methode zur Identifzierung
    Autor:in: Otto Diesenbacher (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2011
    Price: US$ 42.99
  • Sicherheitsanalyse Webserver
    Title: Sicherheitsanalyse Webserver
    Autor:in: DI (fh) Reinhard Hofer (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Analyse des Datensatzes wage2 mit der Programmiersprache R
    Wie wirken sich persönliche Attribute auf das Gehalt eines Angestellten aus?
    Title: Analyse des Datensatzes wage2 mit der Programmiersprache R
    Autor:in: Daniel Gatz (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2021 , Grade: 2,0
    Price: US$ 21.99
  • Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Title: Analyse von TK-Anlagen unter Sicherheitsanforderungen
    Autor:in: Michael Steinmann (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2003 , Grade: 2
    Price: US$ 42.99
  • IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
    Title: IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
    Autor:in: Constantin Sinowski (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2022 , Grade: 1,0
    Price: US$ 16.99
  • Schwachstellenanalyse & Reverse Engineering von Android Apps
    Title: Schwachstellenanalyse & Reverse Engineering von Android Apps
    Autor:in: Daniel Szameitat (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2014
    Price: US$ 34.99
  • Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse
    Dropbox und JiffyBox
    Title: Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse
    Autor:in: Johannes Michl (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2013 , Grade: 1,7
    Price: US$ 42.99
  • Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Title: Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 1,0
    Price: US$ 42.99
  • Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Title: Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
    Autor:in: Daniel Szameitat (Author), Norman Luring (Author), Sebastian Hollermann (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 1,3
    Price: US$ 0.99
  • Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Title: Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Autor:in: Danny Nothstein (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2023 , Grade: 1,3
    Price: US$ 0.99
  • Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Title: Analyse von Advanced Persistent Threats (APT) am Beispiel einer tatsächlichen Infizierung mit einem Zero-Day Virus zur Erhöhung der IT-Sicherheit
    Autor:in: Hans Burg (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2018 , Grade: 1,5
    Price: US$ 42.99
  • Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität
    Title: Experimentalanalyse diverser Brute-Force-Mechanismen in Linux Kali. Passwortsicherheit und Passwortkomplexität
    Autor:in: Lucas Dinhof (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2015 , Grade: 1 B
    Price: US$ 34.99
  • Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Title: Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Autor:in: Philipp Schmidt (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2017 , Grade: 2,0
    Price: US$ 16.99
Show 25 50 100
12>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint