en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(90)
Search all subjects...
Category of text
University student text
(90)
Thesis
(65)
Textbook, Science
(22)
Secondary school text
(9)
Search all categories...
Price
free
(8)
0 - 10 USD
(6)
10 - 25 USD
(73)
25 - 50 USD
(3)
Language
German
(74)
English
(15)
Spanish; Castilian
(1)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
90 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
4
>
Die Post-Quanten-Kryptographie. Ein Überblick
Autor:in:
Lukas Meinl (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2021 , Grade: 1,0
Price:
US$ 0.99
The Contribution of Contextualized Security in Mobile Security Applications
Autor:in:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 0.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Prevención del Fraude a través del uso de las Tecnologías
Autor:in:
Leonel Ermides Paniagua López (Author)
,
Hada Marena Sequeira Pérez (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 94
Price:
US$ 0.-
ELSTER - Die elektronische Steuererklärung
Autor:in:
Susanne Dieter (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,3
Price:
US$ 0.99
Deanonymization of social network profiles by the use of pictures meta data
Autor:in:
Stefan Möstel (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011 , Grade: 1.3
Price:
US$ 0.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
Autor:in:
Kai Jan Runte (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 1999
Price:
US$ 0.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2012
Price:
US$ 4.99
IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
Autor:in:
Marianne Karpp (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 6.99
Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
Autor:in:
Aditya Kumar (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 6.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Essay , 2019
Price:
US$ 6.99
Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
-
New
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2022 , Grade: 1,0
Price:
US$ 7.99
Triple A und SSH. Versuchsprotokoll Rechnernetze
Autor:in:
Noshaba Cheema (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2013 , Grade: 1.0
Price:
US$ 7.99
Encrypting File System (EFS)
Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
Autor:in:
M. Sc. Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Dezentrale E-Commerce Plattform. OpenBazaar
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
Autor:in:
Michelle Bernotti (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2014 , Grade: 1,3
Price:
US$ 11.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
Was heißt IT-Service-Management nach ITIL V3?
Die Bedeutung für IT-Consulting
Autor:in:
B.Sc. Christopher Krause (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2009 , Grade: 2,0
Price:
US$ 14.99
Usage of Process Mining for Security in Process-Aware Information Systems
-
New
Autor:in:
Marlon Müller (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2024 , Grade: 1,7
Price:
US$ 15.99
Implementierung von FIDO2 als Authentifizierungsmethode in der TravelFun-App. Eine Fallstudie zur Konzepterstellung und Umsetzung
Autor:in:
Heribert Tellerfink (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2024 , Grade: 2
Price:
US$ 14.99
Herausforderungen für Betreiber kritischer Infrastrukturen. Arten von Bedrohungsszenarien, rechtlicher Rahmen und Gegenmaßnahmen
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2020 , Grade: 1,0
Price:
US$ 15.99
Show
25
50
100
1
2
...
4
>