en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
›
Results for «
Security
»
Open Filters
Search in
Title
Author
Fulltext
Subject
Politics - Topic: Peace and Conflict, Security
(595)
Computer Science - IT-Security
(81)
Computer Science - Commercial Information Technology
(13)
Politics - Topic: European Union
(13)
Politics - Region: USA
(13)
Politics - Topic: International Organisations
(10)
Business economics - Banking, Stock Exchanges, Insurance, Accounting
(5)
Business economics - Business Management, Corporate Governance
(5)
Business economics - Miscellaneous
(4)
Politics - Topic: German Foreign Policy
(4)
Politics - General and Theories of International Politics
(4)
Business economics - Information Management
(4)
Business economics - Investment and Finance
(4)
Politics - Political systems in general and in comparison
(4)
Computer Science - Internet, New Technologies
(4)
Law - European and International Law, Intellectual Properties
(3)
Computer Science - Software
(3)
Politics - Region: Africa
(3)
Politics - Other International Politics Topics
(3)
Computer Science - Miscellaneous
(3)
History of Germany - Postwar Period, Cold War
(2)
American Studies - Culture and Applied Geography
(2)
Engineering - Industrial Engineering and Management
(2)
Politics - Political Theory and the History of Ideas Journal
(2)
Economics - International Economic Relations
(2)
Business economics - General
(2)
Politics - Region: Middle and South America
(2)
Politics - Topic: History of Inernational Relations
(2)
Law - Data protection
(2)
Sociology - War and Peace, Military
(2)
Politics - Region: Far East
(2)
Economy - Environment economics
(2)
Business economics - Supply, Production, Logistics
(2)
Tourism - Miscellaneous
(2)
Politics - Region: Russia
(2)
Business economics - Economic and Social History
(1)
Sociology - Law and Delinquency
(1)
Business economics - Law
(1)
Computer Science - Applied
(1)
Politics - Topic: Globalization, Political Economics
(1)
Law - Comparative Legal Systems, Comparative Law
(1)
Business economics - Economic Policy
(1)
Politics - Political Systems - Germany
(1)
Sociology - Miscellaneous
(1)
Geography / Earth Science - Physical Geography, Geomorphology, Envi...
(1)
Politics - Region: Western Europe
(1)
Politics - Region: Other States
(1)
Economics - History
(1)
Social Work
(1)
Psychology - Social Psychology
(1)
American Studies - Miscellaneous
(1)
Politics - Topic: Public International Law and Human Rights
(1)
Politics - Region: Australia, New Zealand
(1)
Law - Civil / Private, Trade, Anti Trust Law, Business Law
(1)
Business economics - Accounting and Taxes
(1)
Didactics - Mathematics
(1)
English Language and Literature Studies - Culture and Applied Geogr...
(1)
World History - Modern History
(1)
Politics - Miscellaneous
(1)
Economy - Theory of Competition, Competition Policy
(1)
Instructor Plans: Occupational Fields, general
(1)
Business economics - Trade and Distribution
(1)
Politics - Environmental Policy
(1)
Energy Sciences
(1)
Ethics
(1)
Sociology - Social System and Social Structure
(1)
Law - Miscellaneous
(1)
Law - Public Law / Constitutional Law / Basic Rights
(1)
Film Science
(1)
Computer Sciences - Artificial Intelligence
(1)
Business economics - Company formation, Business Plans
(1)
Politics - Topic: Development Politics
(1)
Organisation and administration - Disaster control
(1)
Transportation Science & Technology
(1)
Computer Science - General
(1)
History of Europe - Ages of World Wars
(1)
Sociology - Politics, Majorities, Minorities
(1)
Agrarian Studies
(1)
Engineering - Computer Engineering
(1)
Economics - Macro-economics, general
(1)
Psychology - Industrial and organizational psychology
(1)
Leadership and Human Resources - Employee Motivation, Employee Sati...
(1)
Economics - Industrial Economics
(1)
History of Germany - Modern History
(1)
Computer Science - Programming
(1)
Leadership and Human Resources - Employer Branding
(1)
Law - Penology
(1)
Politics - Topic: International relations
(1)
Law - Public Law / Miscellaneous
(1)
Search all subjects...
Category of text
University student text
(64)
Thesis
(4)
Textbook, Science
(4)
Secondary school text
(4)
Price
free
(12)
0 - 10 USD
(5)
10 - 25 USD
(81)
25 - 50 USD
(29)
Search all Prices...
Language
German
(81)
English
(26)
Search in all Languages...
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
Results for »
Security
« (81 results)
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Webserver Security
Autor:in:
Pavel Ermolin (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 14.99
Das Open Web Application Security Project (OWASP) und Schwachstellen in Web-Applikationen. Risikoabschätzung des Vorfalls "Panama Papers"
Autor:in:
Stefan Schärmeli (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2023 , Grade: 2.0
Price:
US$ 17.99
Open Source Intelligence im Bereich Cyber Security. OSINT-Methoden bei Phishing und Denial of Service
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,7
Price:
US$ 17.99
IT-Security und Datenschutz. Bedrohungsanalyse für eine Arztpraxis
Autor:in:
Constantin Sinowski (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2022 , Grade: 1,0
Price:
US$ 15.99
Protecting Against The Unknown
A guide to improving network security to protect the Internet against future forms of security hazards
Autor:in:
Kemal Akman (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay , 2000
Price:
US$ 20.99
IT-Security-Awareness. Schwachstelle Mensch
Autor:in:
Naveen Vimalan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 2,0
Price:
US$ 14.99
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
Autor:in:
B.Sc. Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 17.99
Die Informationssicherheit in der Cloud. Einsatzmöglichkeiten von CASB-Lösungen
Autor:in:
Onur Güldali (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,3
Price:
US$ 15.99
Wirtschaftlichkeitsaspekte von IT-Sicherheitsmanagement
Autor:in:
Eduard Fuchs (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2010 , Grade: 1,0
Price:
US$ 14.99
IT-Sicherheit in der Industrie 4.0
Wie gelingt der sichere Austausch und die Verknüpfung von Daten zwischen Unternehmen, sodass die Datensouveränität zu jeder Zeit gewährleistet ist?
Autor:in:
Mona Rebers (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 15.99
Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
Sicherheitsrisiken in der E-Mobilität. IT-Sicherheit und Standards der Ladeinfrastruktur
Angriffsvektoren und Maßnahmen
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2020 , Grade: 1,3
Price:
US$ 20.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 14.99
Encrypting File System (EFS)
Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
Autor:in:
M. Sc. Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Dezentrale E-Commerce Plattform. OpenBazaar
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Industrie 4.0 und Cybercrime. Sicherheitskonzepte für Cybersecurity
Autor:in:
Lisa Villing (Author)
,
Nora Bohland (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2014 , Grade: 1,7
Price:
US$ 17.99
Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister
Autor:in:
Markus Groß (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2012 , Grade: 1,3
Price:
US$ 14.99
Benachrichtigung bei Datenschutzverletzungen
Rechtliche Verpflichtungen bei einer Datenschutzverletzung
Autor:in:
Carina Rehberg (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,8
Price:
US$ 14.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99
Loganalysis Tools für Datamining in Logfiles
Autor:in:
Dominic Hurm (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2009 , Grade: 1,3
Price:
US$ 19.99
Implementierung von FIDO2 als Authentifizierungsmethode in der TravelFun-App. Eine Fallstudie zur Konzepterstellung und Umsetzung
Autor:in:
Heribert Tellerfink (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2024 , Grade: 2
Price:
US$ 14.99
Herausforderungen für Betreiber kritischer Infrastrukturen. Arten von Bedrohungsszenarien, rechtlicher Rahmen und Gegenmaßnahmen
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2020 , Grade: 1,0
Price:
US$ 15.99
Neuere Phishingmethoden und Möglichkeiten der Prävention
Autor:in:
Joachim Kienzler (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2023 , Grade: 1,0
Price:
US$ 17.99
IT-Sicherheit - Sicherheitsrisiken des BYOD Konzeptes und alternative Methoden
Autor:in:
Michelle Kaufmann (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2022 , Grade: 1.0
Price:
US$ 16.99
Analysis of the BEM Code of Professional Guidelines
Autor:in:
Bandar Hezam (Author)
Subject:
Computer Science - IT-Security
Category:
Academic Paper
Price:
US$ 17.99
Vergleich Informationssicherheits-Standards ISO/IEC 27000 und BSI IT-Grundschutz. Gemeinsamkeiten und Unterschiede beider Standards
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2022 , Grade: 1,0
Price:
US$ 14.99
Die Werkzeuge eines Hackers
Ein Beispielangriff mittels Metasploit
Autor:in:
Niklas Höfling (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2021 , Grade: 1,0
Price:
US$ 17.99
IT-Sicherheit für Kritische Infrastrukturen. Malware und seine Auswirkungen auf die deutsche Wirtschaft von 2015 bis 2021
Autor:in:
Naveen Vimalan (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,0
Price:
US$ 14.99
IT-Sicherheit. Das "Bring your own Device" Konzept
Autor:in:
Jens Bader (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2021
Price:
US$ 17.99
Bring Your Own Device. Einsatz und Sicherung sowie Alternativen von BYOD
Autor:in:
Nikolas Rittmeier (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 2,3
Price:
US$ 14.99
Datenschutz und Datensicherheit im Cloud Computing
Autor:in:
Steffen Friesen (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 14.99
Analyse des Datensatzes wage2 mit der Programmiersprache R
Wie wirken sich persönliche Attribute auf das Gehalt eines Angestellten aus?
Autor:in:
Daniel Gatz (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2021 , Grade: 2,0
Price:
US$ 20.99
Kreditkartenbetrug. Einbruch in Kreditkarten-Server
Autor:in:
Magister Gerald Oswald (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2015 , Grade: 2
Price:
US$ 17.99
Kalter Krieg im Netz. Die Position der NATO in einem neuen Wettrüsten
Autor:in:
Matthias Hartig (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,3
Price:
US$ 17.99
IT-Sicherheit und das Betriebssystem. Unterstützung durch das Betriebssystem und alternative Lösungsansätze
Autor:in:
Norbert Hirschpek (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 17.99
Blockchain Technology Enabled E-Voting System. Challenges, Impacts and Developments
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020
Price:
US$ 17.99
Malware-Obfuscation auf Basis des Frameworks DOSFUSCATION
Autor:in:
Marc Kasberger (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,7
Price:
US$ 16.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 15.99
Information Technology Infrastructure Library (ITIL) Framework. Theoretische Grundlagen und Anwendungsbeispiel anhand eines Unternehmens
Autor:in:
Julian Springer (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2018 , Grade: 1,3
Price:
US$ 17.99
Kennzahlensystem für das IT-Controlling
Autor:in:
Jasmina Nickel (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2018 , Grade: 1,7
Price:
US$ 15.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in: Anonymous
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Datenschutzgesetz in der IT
Autor:in:
Rochus Stobbe (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 17.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
Autor:in:
Florian Wolf (Author)
,
Jonas Martin (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
Price:
US$ 14.99
Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
Autor:in:
Kse Nia (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2017 , Grade: 2,7
Price:
US$ 17.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Subject:
Computer Science - IT-Security
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 17.99
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte
Autor:in:
Nicolas Wilken (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1-
Price:
US$ 14.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Subject:
Computer Science - IT-Security
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
Autor:in:
Denis Ruiz Lopez (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 20.99
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von "Corporate Owned, Personally Enabled" und "Bring your own Device"
Autor:in:
Daniel Kamps (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2015 , Grade: 3,0
Price:
US$ 17.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 17.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
SCRUM im IT-Großprojekt
Erarbeitung einer Entscheidungsmatrix zur Bestimmung der geeigneten architekturellen Vorgehensweise
Autor:in:
Sebastian Storch (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 17.99
Cloud Computing in der Versicherungsbranche
Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud
Autor:in:
Lisa Eicker (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2014 , Grade: 1,3
Price:
US$ 17.99
Rechtliche Rahmenbedingungen für vertrauliche und verbindliche Internetkommunikation und deren Umsetzung mit informationstechnologischen Verfahren
Autor:in:
Christoph Becker (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2015 , Grade: 1,0
Price:
US$ 15.99
20 Minuten für Digitales-Fingerprinting zur Betrugsprävention
Mit Fallbeispiel und Datenschutzrechtlicher Analyse
Autor:in:
Daniel Lautenbacher (Author)
Subject:
Computer Science - IT-Security
Category:
Textbook , 2014
Price:
US$ 15.99
Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
Autor:in:
Michelle Bernotti (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2014 , Grade: 1,3
Price:
US$ 11.99
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps
Sicherheitsanalyse von Microsoft Komponenten
Autor:in:
Daniel Szameitat (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (postgraduate) , 2014 , Grade: 1
Price:
US$ 20.99
Seitenkanalangriffe: Power Analysis
Autor:in:
Thomas Hoffmann (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2013 , Grade: 1,0
Price:
US$ 14.99
Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
Autor:in:
Alexander Hübert (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2013 , Grade: 1,3
Price:
US$ 15.99
Sicherheit von Android-Betriebssystemen
Autor:in:
Daniel Szameitat (Author)
,
Martin Haug (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2013 , Grade: 1.3
Price:
US$ 15.99
Sichere Web-Anwendungen
Autor:in:
Daniel Szameitat (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate) , 2013 , Grade: 1.0
Price:
US$ 17.99
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren
Einführung Spambekämpfung
Autor:in:
Alexander Mösinger (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2013
Price:
US$ 15.99
Der Hackerbegriff in den Medien
Ein Diskurs
Autor:in:
Randy Witte (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2012
Price:
US$ 14.99
Autonomie, Privatheit und Selbstbestimmung
Autor:in:
Peggy Werner (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2006 , Grade: 1,7
Price:
US$ 14.99
Was heißt IT-Service-Management nach ITIL V3?
Die Bedeutung für IT-Consulting
Autor:in:
B.Sc. Christopher Krause (Author)
Subject:
Computer Science - IT-Security
Category:
Presentation (Elaboration) , 2009 , Grade: 2,0
Price:
US$ 14.99
Cyberterrorismus - Definition, Arten, Gegenmaßnahmen
Autor:in:
Tonio Kröner (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2011 , Grade: 1,7
Price:
US$ 16.99
IT-Sicherheit in Firmennetzwerken
Vergleich der IT-Governance Modelle Cobit®, ITIL® und MOF®
Autor:in:
DI(FH), M.A. Stefan Wiedner (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report , 2008 , Grade: 1
Price:
US$ 16.99
Sicherheit komplexer Informationssysteme
Seminarthema: Vergleich von PKI, AAI und IDM
Autor:in:
Kai Subel (Author)
,
Michel Schultz (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2010
Price:
US$ 14.99
SSL-VPN: Grundlagen und Anwendungsmöglichkeiten
Network Defense und VPN Technologies
Autor:in:
Harald Bachner (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2009 , Grade: 1
Price:
US$ 14.99
Attacken und Gegenmaßnahmen
Informationsabfragen und Recommender Systeme
Autor:in:
Marko Haschej (Author)
Subject:
Computer Science - IT-Security
Category:
Bachelor Thesis , 2008 , Grade: A
Price:
US$ 14.99
Innovationen und IT-Sicherheit
Innovationen und Sicherheit von RFID-Systemen
Autor:in:
Daniel Hack (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2008 , Grade: 2,0
Price:
US$ 16.99
Firewall - Arten und Funktionsweise
Autor:in:
Andrej Smolarek (Author)
,
Hui Wang (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2006 , Grade: 2,0
Price:
US$ 17.99
Bedeutung von PGP (Pretty Good Privacy)
Autor:in:
Philipp Angstmann (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2002 , Grade: 6.0 (CH-Notensystem; D: 1.0)
Price:
US$ 17.99
Spell-checked Synonym-based Searchable Symmetric Encryption
Autor:in:
Sebastian Steindl (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2020 , Grade: 1,0
Price:
US$ 14.99
Digitale Signaturen. Das Lamport-Diffie-Einmal-Signaturverfahren, RSA-Signaturverfahren, Merkle-Signaturverfahren und der Digital Signature Algorithm
Autor:in:
Mika Landeck (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 15.99
Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
Autor:in:
Daniel Schreiber (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2019 , Grade: 1,0
Price:
US$ 17.99
Show
25
50
100