Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Results for  «global governance»

Search in

  • Title
  • Author
  • Fulltext

Language

    • English (15)
    • Deutsch (5)
    • Français (1)

Price

    • Paid (16)
    • Free (5)

Publication Year


Results for » global governance «  (21 results)

Sort by
  • Spaßguerilla 2.0 oder globale Revolution?
    Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung
    Title: Spaßguerilla 2.0 oder globale Revolution?
    Autor:in: Julian Knab (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2012 , Grade: 1.7
    Price: US$ 34.99
  • IT-Sicherheit in Firmennetzwerken
    Vergleich der IT-Governance Modelle Cobit®, ITIL® und MOF®
    Title: IT-Sicherheit in Firmennetzwerken
    Autor:in: DI(FH), M.A. Stefan Wiedner (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2008 , Grade: 1
    Price: US$ 18.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Information security for national security: The Snowden and NSA case study
    Title: Information security for national security: The Snowden and NSA case study
    Autor:in: Majed Alkhammash (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 70
    Price: US$ 6.99
  • Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Title: Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020
    Price: US$ 18.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Title: Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
    Autor:in: Onur Güldali (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2018 , Grade: 1,3
    Price: US$ 16.99
  • A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Title: A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Autor:in: Sven Elmers (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2009 , Grade: 2,1
    Price: US$ 21.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Etude Approfondie sur l’Usage des Protocoles SSH et Open SSH dans un Man
    Title: Etude Approfondie sur l’Usage des Protocoles SSH et Open SSH dans un Man
    Autor:in: Roland Nathan Kalonji (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014
    Price: US$ 34.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • Using Security Patterns in Web-Application
    Title: Using Security Patterns in Web-Application
    Autor:in: Shahnawaz Alam (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: "-"
    Price: US$ 40.99
  • Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
    Angriffsvektoren und Maßnahmen
    Title: Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
    Autor:in: David Koller (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 1,3
    Price: US$ 21.99
  • A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    A Conceptual Framework to Mitigate Cyber and Physical Attacks
    - New
    Title: A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    Autor:in: Olayemi Phillips (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 16.99
  • Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Title: Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Autor:in: Andy Reed (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2012 , Grade: Merit
    Price: US$ 34.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • Managing Threats of Cyber-Attacks on Mobile Devices
    Title: Managing Threats of Cyber-Attacks on Mobile Devices
    Autor:in: Anthony Kithome (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 2
    Price: US$ 16.99
  • How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Title: How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018 , Grade: B
    Price: US$ 42.99
  • Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Title: Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Autor:in: Mashood Hassan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017
    Price: US$ 34.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint