en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(188)
Search all subjects...
Category of text
University student text
(77)
Thesis
(58)
Textbook, Science
(21)
Secondary school text
(7)
Price
free
(35)
0 - 10 USD
(19)
10 - 25 USD
(96)
25 - 50 USD
(38)
Language
German
(106)
English
(77)
French
(3)
Spanish; Castilian
(2)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
188 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
8
>
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Wireless LAN Security in a SOHO Environment: A Holistic Approach
Autor:in:
Christian Wimmer (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2006 , Grade: 1.7
Price:
US$ 36.99
Webserver Security
Autor:in:
Pavel Ermolin (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 14.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Wearable Computing. Datenschutz und Datensicherheit
Autor:in:
Mario Möller (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015 , Grade: 1,5
Price:
US$ 36.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 17.99
Virtual Private Networks in Theory and Practice
Autor:in:
Zeeshan Ashraf (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2018 , Grade: A
Price:
US$ 0.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
-
New
Autor:in:
Danny Nothstein (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2023 , Grade: 1,3
Price:
US$ 0.99
Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2022 , Grade: 1,0
Price:
US$ 14.99
Using Security Patterns in Web-Application
Autor:in:
Shahnawaz Alam (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2011 , Grade: "-"
Price:
US$ 39.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2012
Price:
US$ 4.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2017 , Grade: 9
Price:
US$ 14.99
Usage of Process Mining for Security in Process-Aware Information Systems
-
New
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 15.99
Triple A und SSH. Versuchsprotokoll Rechnernetze
Autor:in:
Noshaba Cheema (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1.0
Price:
US$ 7.99
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
Autor:in:
Sharmin Rashid Linta (Author)
,
Md. Ridgewan Khan (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2011
Price:
US$ 31.99
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
Security in Cloud Computing
Autor:in:
Ashwin Dhivakar (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2014
Price:
US$ 20.99
The Robust Urban Transportation Network Design Problem
Autor:in:
Alireza Naimi (Author)
Subject:
Computer Science - IT-Security
Category:
Doctoral Thesis / Dissertation , 2016 , Grade: 4
Price:
US$ 0.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 17.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 5.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 15.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99
Show
25
50
100
1
2
...
8
>