search
menu
Menu
Skip to content
Home
Catalog
Help
Login
Upload papers
Home
Catalog
Help
Login
Homepage
> Results for »
hacking
«
Search in
Title
Author
Fulltext
Subject
Law - Penology
(5)
Computer Science - IT-Security
(5)
Business economics - Offline Market...
(5)
Computer Science - Programming
(2)
Communications - Media and Politics...
(2)
Computer Science - Applied
(2)
Communications - Mass Media
(2)
Business economics - Business Manag...
(2)
Computer Science - Commercial Infor...
(2)
Pedagogy - Art education
(2)
Philosophy - Philosophy of the 19th...
(1)
Design (Industry, Graphics, Fashion)
(1)
Communications - Multimedia, Intern...
(1)
Communications - Media History
(1)
Communications - Journalism, Journa...
(1)
Philosophy - General Essays, Eras
(1)
Philosophy - Theoretical (Realisati...
(1)
Communications - Intercultural Comm...
(1)
Philosophy - Philosophy of the 20th...
(1)
Politics - General and Theories of ...
(1)
Business economics - Information Ma...
(1)
Communications - Miscellaneous
(1)
Energy Sciences
(1)
Psychology - Work, Business, Organi...
(1)
Electrotechnology
(1)
Art - Computer Art / Graphics / Art...
(1)
Business economics - Banking, Stock...
(1)
Tourism - Miscellaneous
(1)
Computer Science - Internet, New Te...
(1)
Business economics - Business Ethic...
(1)
Sociology - Individual, Groups, Soc...
(1)
Social Studies (General)
(1)
Computer Sciences - Internet of Thi...
(1)
Business economics - Miscellaneous
(1)
Sociology - Law and Delinquency
(1)
Search all subjects...
Category of text
Thesis
(3)
University student text
(1)
Price
free
(1)
10 - 25 USD
(1)
25 - 50 USD
(3)
Language
German
(4)
English
(1)
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
(Results for »
hacking
« (5 results))
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
Author:
Andy Reed (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis, 2012
Price:
US$ 31.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Authors:
Daniel Szameitat (Author)
Norman Luring (Author)
Sebastian Hollermann (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper, 2017
Price:
US$ 0.99
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
Author:
B.Sc. Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper, 2016
Price:
US$ 16.99
Spaßguerilla 2.0 oder globale Revolution?
Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung
Author:
Julian Knab (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis, 2012
Price:
US$ 31.99
Cyberbedrohungen. Eine Analyse von Kriterien zur Beschreibung von Advanced Persistent Threats
Author:
Anonymous
Subject:
Computer Science - IT-Security
Category:
Master's Thesis, 2017
Price:
US$ 36.99