search
menu
Menu
Skip to content
Home
Catalog
Help
Login
Upload papers
Home
Catalog
Help
Login
Homepage
Subject
Computer Science - IT-Security
(10)
Search all subjects...
Category of text
University student text
(72)
Thesis
(28)
Secondary school text
(8)
Textbook, Science
(6)
Search all categories...
Price
free
(3)
0 - 10 USD
(1)
10 - 25 USD
(5)
25 - 50 USD
(1)
Language
English
(18)
German
(10)
Search in all Languages...
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
(10 results)
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Author:
Markus Dreher (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper, 2021
Price:
US$ 0.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Authors:
Daniel Szameitat (Author)
Norman Luring (Author)
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper, 2017
Price:
US$ 0.99
Universal Reencryption
Author:
Christian Jungstand (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration, 2003
Price:
US$ 0.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Author:
Daniela Petzoldt (Author)
Subject:
Computer Science - IT-Security
Category:
Abstract, 2017
Price:
US$ 5.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Author:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report, 2019
Price:
US$ 14.99
Analysis of the BEM Code of Professional Guidelines
Author:
Bandar Hezam (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper
Price:
US$ 17.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Author:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration, 2010
Price:
US$ 16.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Author:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report, 2016
Price:
US$ 16.99
IT-Sicherheit in Firmennetzwerken
Vergleich der IT-Governance Modelle Cobit®, ITIL® und MOF®
Author:
DI(FH), M.A. Stefan Wiedner (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report, 2008
Price:
US$ 16.99
Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten
Author:
Ralph Schimpf (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report, 2011
Price:
US$ 31.99