Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (181)
    • Free (43)

Publication Year


224 results

Sort by
12...5>
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Title: Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
    Autor:in: Eduard Fuchs (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2010 , Grade: 1,0
    Price: US$ 16.99
  • Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Title: Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Autor:in: Christian Wimmer (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Webserver Security
    Title: Webserver Security
    Autor:in: Pavel Ermolin (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011
    Price: US$ 16.99
  • Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Title: Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,7
    Price: US$ 11.99
  • Wearable Computing. Datenschutz und Datensicherheit
    Title: Wearable Computing. Datenschutz und Datensicherheit
    Autor:in: Mario Möller (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015 , Grade: 1,5
    Price: US$ 42.99
  • Was heißt IT-Service-Management nach ITIL V3?
    Die Bedeutung für IT-Consulting
    Title: Was heißt IT-Service-Management nach ITIL V3?
    Autor:in: B.Sc. Christopher Krause (Author)
    Subject: Computer Science - IT-Security
    Category: Presentation (Elaboration) , 2009 , Grade: 2,0
    Price: US$ 14.99
  • Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
    Title: Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
    Autor:in: Sebastian Küsters (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2016 , Grade: 1
    Price: US$ 18.99
  • WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
    Title: WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2016 , Grade: 1,0
    Price: US$ 18.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • Verschleierungstechniken für Payloads
    Title: Verschleierungstechniken für Payloads
    Autor:in: Lee Kirsten (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2019 , Grade: 1,3
    Price: US$ 11.99
  • Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Title: Vergleich und Analyse verschiedener APT-Gruppen. Erstellung eines Vergleichsframeworks
    Autor:in: Danny Nothstein (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2023 , Grade: 1,3
    Price: US$ 0.99
  • Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
    Title: Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2022 , Grade: 1,0
    Price: US$ 16.99
  • Using Security Patterns in Web-Application
    Title: Using Security Patterns in Web-Application
    Autor:in: Shahnawaz Alam (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: "-"
    Price: US$ 40.99
  • Using Bittorent protocol to launch DDoS attacks
    Title: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2012
    Price: US$ 4.99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Title: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2017 , Grade: 9
    Price: US$ 16.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 16.99
  • Universal Reencryption
    Title: Universal Reencryption
    Autor:in: Christian Jungstand (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2003
    Price: US$ 0.99
  • Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
    Title: Trust in Bots. Zur Rolle von Vertrauen und Reputation in Multi-Agenten-Systemen
    Autor:in: Till Westermayer (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2000 , Grade: 1,3
    Price: US$ 34.99
  • Triple A und SSH. Versuchsprotokoll Rechnernetze
    Title: Triple A und SSH. Versuchsprotokoll Rechnernetze
    Autor:in: Noshaba Cheema (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2013 , Grade: 1.0
    Price: US$ 7.99
  • Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Title: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Autor:in: Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011
    Price: US$ 34.99
  • To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Security in Cloud Computing
    Title: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Autor:in: Ashwin Dhivakar (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2014
    Price: US$ 21.99
  • The pros and cons of modern web application security flaws and possible solutions
    Title: The pros and cons of modern web application security flaws and possible solutions
    Autor:in: Shahriat Hossain (Author), Kh Ashique Mahmud (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 10
    Price: US$ 18.99
  • The Theory and Reality of Wireless LAN Security
    Final Year project
    Title: The Theory and Reality of Wireless LAN Security
    Autor:in: Tomasz Halapacz (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011 , Grade: 72%
    Price: US$ 42.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Title: Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
    Autor:in: Philipp Schmidt (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper (Advanced seminar) , 2017 , Grade: 2,0
    Price: US$ 16.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Spying Software Development in Google Android
    Title: Spying Software Development in Google Android
    Autor:in: Fissha SeyoumTeshome (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011
    Price: US$ 21.99
  • Spell-checked Synonym-based Searchable Symmetric Encryption
    Title: Spell-checked Synonym-based Searchable Symmetric Encryption
    Autor:in: Sebastian Steindl (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,0
    Price: US$ 16.99
  • Specification of security in distributed computing systems
    Title: Specification of security in distributed computing systems
    Autor:in: Richard Burnham (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 1987
    Price: US$ 0.99
  • Spaßguerilla 2.0 oder globale Revolution?
    Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung
    Title: Spaßguerilla 2.0 oder globale Revolution?
    Autor:in: Julian Knab (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2012 , Grade: 1.7
    Price: US$ 34.99
  • Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren
    Einführung Spambekämpfung
    Title: Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren
    Autor:in: Alexander Mösinger (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2013
    Price: US$ 17.99
  • Side Channel Attacks auf den Advanced Encryption Standard (AES)
    Title: Side Channel Attacks auf den Advanced Encryption Standard (AES)
    Autor:in: Peter Hillmann (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2010 , Grade: 1,3
    Price: US$ 18.99
  • Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
    Angriffsvektoren und Maßnahmen
    Title: Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
    Autor:in: David Koller (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 1,3
    Price: US$ 21.99
  • Sicherheitsprobleme von Lokalisierungsdiensten. Vertrauenspotenziale und Risiken in Datenschutzverfahren
    Title: Sicherheitsprobleme von Lokalisierungsdiensten. Vertrauenspotenziale und Risiken in Datenschutzverfahren
    Autor:in: Suat Caglayan (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2012 , Grade: 2,0
    Price: US$ 42.99
  • Sicherheitsanalyse Webserver
    Title: Sicherheitsanalyse Webserver
    Autor:in: DI (fh) Reinhard Hofer (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Sicherheit von Android-Betriebssystemen
    Title: Sicherheit von Android-Betriebssystemen
    Autor:in: Daniel Szameitat (Author), Martin Haug (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2013 , Grade: 1.3
    Price: US$ 16.99
  • Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
    Title: Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
    Autor:in: David Koller (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2019 , Grade: 1,7
    Price: US$ 16.99
  • Sicherheit komplexer Informationssysteme
    Seminarthema: Vergleich von PKI, AAI und IDM
    Title: Sicherheit komplexer Informationssysteme
    Autor:in: Kai Subel (Author), Michel Schultz (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2010
    Price: US$ 16.99
  • Sicherheit in SIP-basierten VoIP-Netzen
    Title: Sicherheit in SIP-basierten VoIP-Netzen
    Autor:in: BSc Michael Sauer (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2013 , Grade: 2
    Price: US$ 42.99
  • Sichere Web-Anwendungen
    Title: Sichere Web-Anwendungen
    Autor:in: Daniel Szameitat (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2013 , Grade: 1.0
    Price: US$ 18.99
  • Seitenkanalangriffe: Power Analysis
    Title: Seitenkanalangriffe: Power Analysis
    Autor:in: Thomas Hoffmann (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2013 , Grade: 1,0
    Price: US$ 16.99
  • Segmentation automatique pour la reconnaissance numérique des chèques bancaires Algériens
    Title: Segmentation automatique pour la reconnaissance numérique des chèques bancaires Algériens
    Autor:in: Dr Abdeljalil Gattal (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2009
    Price: US$ 42.99
  • Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Title: Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Autor:in: Mashood Hassan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017
    Price: US$ 34.99
  • Security Issues of Big Data Hadoop
    Title: Security Issues of Big Data Hadoop
    Autor:in: Rohit Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2
    Price: US$ 6.99
  • Security Issues in Hardware Virtualization
    Title: Security Issues in Hardware Virtualization
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,3
    Price: US$ 16.99
  • Security Architectures for Next Generation Networks
    Title: Security Architectures for Next Generation Networks
    Autor:in: Amir Ahmed Omer Yousif (Author), Prof. Sami M. Sharif (Author), Dr. Hamid Abbas Ali (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014
    Price: US$ 0.99
Show 25 50 100
12...5>
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint