Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «their»

Search in

  • Title
  • Author
  • Fulltext

Language

    • English (23)
    • Deutsch (4)

Price

    • Paid (20)
    • Free (7)

Publication Year


Results for » their «  (27 results)

Sort by
12>
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 16.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Title: Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020
    Price: US$ 18.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Security Issues in Hardware Virtualization
    Title: Security Issues in Hardware Virtualization
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,3
    Price: US$ 16.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • Process Mining and Network Protocols
    Probing the application of process mining techniques and algorithms to network protocols
    Title: Process Mining and Network Protocols
    Autor:in: Matthias Leeb (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2015 , Grade: 1
    Price: US$ 42.99
  • Protecting Against The Unknown
    A guide to improving network security to protect the Internet against future forms of security hazards
    Title: Protecting Against The Unknown
    Autor:in: Kemal Akman (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2000
    Price: US$ 21.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Title: Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Autor:in: MSc Andy Reed (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2015
    Price: US$ 16.99
  • Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers
    Title: Exploring Vehicle Security Improvement Framework in the Safety Messaging System to Protect Against Hackers
    Autor:in: Dr. Hector Cruz Platon (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2023
    Price: US$ 46.99
  • Analysis of the BEM Code of Professional Guidelines
    Title: Analysis of the BEM Code of Professional Guidelines
    Autor:in: Bandar Hezam (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper
    Price: US$ 18.99
  • A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
    Title: A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    Autor:in: Pradheep Manisekaran (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2014
    Price: US$ 21.99
  • Managing Threats of Cyber-Attacks on Mobile Devices
    Title: Managing Threats of Cyber-Attacks on Mobile Devices
    Autor:in: Anthony Kithome (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 2
    Price: US$ 16.99
  • How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Title: How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018 , Grade: B
    Price: US$ 42.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • Home Security Systems. Intrusion Detection with GSM
    Title: Home Security Systems. Intrusion Detection with GSM
    Autor:in: Washington Mutwiri (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: 2.1
    Price: US$ 16.99
Show 25 50 100
12>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint