Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop

Language

    • Deutsch (133)
    • English (86)
    • Français (3)
    • Español (2)

Price

    • Paid (57)
    • Free (29)

Publication Year


86 results

Sort by
  • Cybersecurity in Digital Healthcare Services
    A Comprehensive Study of Cybercrime Challenges and Approaches to Address the Same in Modern Digital Healthcare Services
    Title: Cybersecurity in Digital Healthcare Services
    Autor:in: Manoj Tewari (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023
    Price: US$ 0.99
  • A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Title: A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
    Autor:in: Ireneus Mathias (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2015
    Price: US$ 0.99
  • Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Title: Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
    Autor:in: Adrian O'Gara (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2014 , Grade: 90.00
    Price: US$ 0.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Title: An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
    Autor:in: Muhammad Waseem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: A
    Price: US$ 0.99
  • Virtual Private Networks in Theory and Practice
    Title: Virtual Private Networks in Theory and Practice
    Autor:in: Zeeshan Ashraf (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2018 , Grade: A
    Price: US$ 0.99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Title: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2016
    Price: US$ 0.99
  • An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Title: An Improved Modular Exponentiation To Resist Power Analysis Attacks
    Autor:in: Moushumi Barman (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2019 , Grade: A
    Price: US$ 21.99
  • A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Title: A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing
    Autor:in: Dr. Helen Parimala (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2019 , Grade: 87 %
    Price: US$ 46.99
  • On the security of TLS 1.2 and TLS 1.3. A comparison
    Title: On the security of TLS 1.2 and TLS 1.3. A comparison
    Autor:in: Sarah Syed-Winkler (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2021 , Grade: 95%
    Price: US$ 21.99
  • A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Title: A conceptual framework for the automated assessment of IT security risks based on enterprise architecture
    Autor:in: Tim Huse (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2020 , Grade: 1.0
    Price: US$ 42.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 9.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 16.99
  • Security Issues of Big Data Hadoop
    Title: Security Issues of Big Data Hadoop
    Autor:in: Rohit Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2018 , Grade: 2
    Price: US$ 6.99
  • Spying Software Development in Google Android
    Title: Spying Software Development in Google Android
    Autor:in: Fissha SeyoumTeshome (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011
    Price: US$ 21.99
  • A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
    Title: A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    Autor:in: Pradheep Manisekaran (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2014
    Price: US$ 21.99
  • Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Title: Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Autor:in: Andy Reed (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2012 , Grade: Merit
    Price: US$ 34.99
  • Detecting Veracity
    A New door to keep Safe from fake Posts
    Title: Detecting Veracity
    Autor:in: M.Tech Hemant Kumar Saini (Author), Nitesh Chouhan (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2014 , Grade: 1.0
    Price: US$ 3.99
  • Backdoor Add-ons. A new way to harbor the data
    Title: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2014 , Grade: 1
    Price: US$ 6.99
  • Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Title: Wireless LAN Security in a SOHO Environment: A Holistic Approach
    Autor:in: Christian Wimmer (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2006 , Grade: 1.7
    Price: US$ 42.99
  • Man in the Middle Attack: Focus on SSLStrip
    Title: Man in the Middle Attack: Focus on SSLStrip
    Autor:in: Jordan Elks (Author)
    Subject: Computer Science - IT-Security
    Category: Term Paper , 2011 , Grade: none
    Price: US$ 0.99
  • Deanonymization of social network profiles by the use of pictures meta data
    Title: Deanonymization of social network profiles by the use of pictures meta data
    Autor:in: Stefan Möstel (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011 , Grade: 1.3
    Price: US$ 0.99
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • A Study in Protocol Obfuscation Techniques and their Effectiveness
    Title: A Study in Protocol Obfuscation Techniques and their Effectiveness
    Autor:in: James Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017 , Grade: 4
    Price: US$ 0.99
  • Reversible data hiding in encrypted images
    Title: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Author)
    Subject: Computer Science - IT-Security
    Category: Pre-University Paper , 2014 , Grade: 10
    Price: US$ 0.99
  • Long-Term Archival of Encrypted Records
    Title: Long-Term Archival of Encrypted Records
    Autor:in: Angel Rivera (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2008 , Grade: A
    Price: US$ 0.99
  • Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Title: Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
    Autor:in: Randhir Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2021 , Grade: A
    Price: US$ 46.99
  • Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Title: Implentation of Critical Information Infrastructure Protection Techniques against Cyber Attacks
    Autor:in: Torty Vincent (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis
    Price: US$ 42.99
  • Incremental Construction of Code Property Graphs
    Title: Incremental Construction of Code Property Graphs
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2021 , Grade: 2,0
    Price: US$ 21.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 18.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 16.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Analyzing Online Voting Systems for Flaw Detection
    Title: Analyzing Online Voting Systems for Flaw Detection
    Autor:in: Md. Shamsur Rahim (Author), AZM Ehtesham Chowdhury (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2015 , Grade: A
    Price: US$ 16.99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Title: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2017 , Grade: 9
    Price: US$ 16.99
  • Secure Password Policy. Current Situation and Solutions
    Title: Secure Password Policy. Current Situation and Solutions
    Autor:in: Shiva Reddy (Author), Saikat Sinha (Author), G. Abirami (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2017 , Grade: 80
    Price: US$ 6.99
  • The pros and cons of modern web application security flaws and possible solutions
    Title: The pros and cons of modern web application security flaws and possible solutions
    Autor:in: Shahriat Hossain (Author), Kh Ashique Mahmud (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2018 , Grade: 10
    Price: US$ 18.99
  • Robust Graph-Based Static Code Analysis
    Title: Robust Graph-Based Static Code Analysis
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2019 , Grade: 1,0
    Price: US$ 21.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • Preformace study of WiMAX Network Security
    Security Network
    Title: Preformace study of WiMAX Network Security
    Autor:in: Ali Raheem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2011
    Price: US$ 16.99
  • Instant Messaging and Cross Site Scripting (XSS)
    Title: Instant Messaging and Cross Site Scripting (XSS)
    Autor:in: MSc. Katharina Kurek (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2011
    Price: US$ 18.99
  • The Theory and Reality of Wireless LAN Security
    Final Year project
    Title: The Theory and Reality of Wireless LAN Security
    Autor:in: Tomasz Halapacz (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011 , Grade: 72%
    Price: US$ 42.99
  • Analysis and Applications of Web Security Services through the Network Features
    Title: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Author), David Young (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2015
    Price: US$ 0.99
  • The Robust Urban Transportation Network Design Problem
    Title: The Robust Urban Transportation Network Design Problem
    Autor:in: Alireza Naimi (Author)
    Subject: Computer Science - IT-Security
    Category: Doctoral Thesis / Dissertation , 2016 , Grade: 4
    Price: US$ 0.99
  • Specification of security in distributed computing systems
    Title: Specification of security in distributed computing systems
    Autor:in: Richard Burnham (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 1987
    Price: US$ 0.99
  • Cryptography and Steganography in Digital Images
    Title: Cryptography and Steganography in Digital Images
    Autor:in: Wassim Al Chamaa (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2009 , Grade: 19.61 / 20
    Price: US$ 0.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Title: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Author), Dr. S. Palanivel (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 9
    Price: US$ 0.99
  • Cryptography and Steganography. A multilayer Data Security Approach
    Title: Cryptography and Steganography. A multilayer Data Security Approach
    Autor:in: Jagdish Chandra Patni (Author), Hitesh Kumar Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Textbook , 2021 , Grade: 2
    Price: US$ 42.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 16.99
  • Data Privacy: A Fundamental Human Right or a Privilege?
    Biases in Surveillance: Ethical Implications and Mitigation Strategies for Marginalized Communities
    - New
    Title: Data Privacy: A Fundamental Human Right or a Privilege?
    Autor:in: Franklin Nelson Djeunga Mbakakeu (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2024 , Grade: 1,0
    Price: US$ 6.99
  • Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Title: Cyberterrorism and its Implications. An In-depth Analysis of India's Cybersecurity
    Autor:in: Purvi Sharma (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2023
    Price: US$ 21.99
  • IT Application Security and Control
    Title: IT Application Security and Control
    Autor:in: Dileep Keshava Narayana (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2012 , Grade: 98
    Price: US$ 21.99
  • Security Issues in Hardware Virtualization
    Title: Security Issues in Hardware Virtualization
    Autor:in: Samuel Hopstock (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2020 , Grade: 1,3
    Price: US$ 16.99
  • Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Title: Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Autor:in: Aditya Kumar (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 6.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Cyber security, crime and warfare in Pakistan
    Title: Cyber security, crime and warfare in Pakistan
    Autor:in: Qamar Atta Ul Haq (Author)
    Subject: Computer Science - IT-Security
    Category: Elaboration , 2016 , Grade: A
    Price: US$ 6.99
  • Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Title: Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Autor:in: MSc Andy Reed (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2015
    Price: US$ 16.99
  • Using Bittorent protocol to launch DDoS attacks
    Title: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2012
    Price: US$ 4.99
  • To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Security in Cloud Computing
    Title: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Autor:in: Ashwin Dhivakar (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2014
    Price: US$ 21.99
  • Using Security Patterns in Web-Application
    Title: Using Security Patterns in Web-Application
    Autor:in: Shahnawaz Alam (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: "-"
    Price: US$ 40.99
  • Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Title: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Autor:in: Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2011
    Price: US$ 34.99
  • Detection of Sarcastic and Abusive Comments Containing Positive Words - New
    Title: Detection of Sarcastic and Abusive Comments Containing Positive Words
    Autor:in: Go Sato (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2026
    Price: US$ 0.99
  • A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    A Conceptual Framework to Mitigate Cyber and Physical Attacks
    - New
    Title: A Multi-Layered, Tamper-Resistant Security Appliance for Financial Terminals
    Autor:in: Olayemi Phillips (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2025
    Price: US$ 16.99
  • The Contribution of Contextualized Security in Mobile Security Applications
    Title: The Contribution of Contextualized Security in Mobile Security Applications
    Autor:in: Erick Larkin (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 0.99
  • Graph Theory Applications in Network Security
    Title: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Author), Jonathan Webb (Author), Mikhail Bonin (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2015
    Price: US$ 0.99
  • Hardware Trojan Threat Taxonomies 2017-2020
    Title: Hardware Trojan Threat Taxonomies 2017-2020
    Autor:in: Alexios Iosif Kotsis (Author)
    Subject: Computer Science - IT-Security
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Distributed Denial of Service (DDOS) attacks and IoT Security
    Title: Distributed Denial of Service (DDOS) attacks and IoT Security
    Autor:in: Robert Joodat (Author), Eric Wang (Author)
    Subject: Computer Science - IT-Security
    Category: Technical Report , 2017 , Grade: N/A
    Price: US$ 0.99
  • Credit Card Fraud Detection Using Supervised Learning Algorithms
    Title: Credit Card Fraud Detection Using Supervised Learning Algorithms
    Autor:in: Daniyal Baig (Author), Muhammad Farrukh Nadeem (Author)
    Subject: Computer Science - IT-Security
    Category: Research Paper (postgraduate) , 2020 , Grade: 3.16
    Price: US$ 0.99
  • Security Architectures for Next Generation Networks
    Title: Security Architectures for Next Generation Networks
    Autor:in: Amir Ahmed Omer Yousif (Author), Prof. Sami M. Sharif (Author), Dr. Hamid Abbas Ali (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014
    Price: US$ 0.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Subject: Computer Science - IT-Security
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
    Title: Peer-to-peer payment system and crypto-currency using blockchain technology with a secure wallet and multi-signature transactions
    Autor:in: Eranda Gunasena (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018
    Price: US$ 23.99
  • Home Security Systems. Intrusion Detection with GSM
    Title: Home Security Systems. Intrusion Detection with GSM
    Autor:in: Washington Mutwiri (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2019 , Grade: 2.1
    Price: US$ 16.99
  • How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Title: How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2018 , Grade: B
    Price: US$ 42.99
  • Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    How to protect (PII) and (PHI)?
    Title: Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2019
    Price: US$ 16.99
  • Password as the first line of defence. How to create a strong and unique password
    Title: Password as the first line of defence. How to create a strong and unique password
    Autor:in: Haitham Ismail (Author)
    Subject: Computer Science - IT-Security
    Category: Essay , 2019
    Price: US$ 6.99
  • Managing Threats of Cyber-Attacks on Mobile Devices
    Title: Managing Threats of Cyber-Attacks on Mobile Devices
    Autor:in: Anthony Kithome (Author)
    Subject: Computer Science - IT-Security
    Category: Academic Paper , 2017 , Grade: 2
    Price: US$ 16.99
  • Information security for national security: The Snowden and NSA case study
    Title: Information security for national security: The Snowden and NSA case study
    Autor:in: Majed Alkhammash (Author)
    Subject: Computer Science - IT-Security
    Category: Scientific Essay , 2014 , Grade: 70
    Price: US$ 6.99
  • Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Title: Security and Internet of Things (IoT). Analysing the difference between Austria and India in consumer awareness of IoT Vulnerabilities, perception towards IoT Privacy and Value
    Autor:in: Mashood Hassan (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2017
    Price: US$ 34.99
  • Intrusion Detection System in mobile ad hoc network in MAC layer
    Title: Intrusion Detection System in mobile ad hoc network in MAC layer
    Autor:in: Tapan Gondaliya (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2013 , Grade: C
    Price: US$ 21.99
  • Potential for Data Loss from Security Protected Smartphones
    Investigate how to use protective security measures from the PC world to secure Smartphones
    Title: Potential for Data Loss from Security Protected Smartphones
    Autor:in: Vikas Rajole (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: 75
    Price: US$ 21.99
  • Process Mining and Network Protocols
    Probing the application of process mining techniques and algorithms to network protocols
    Title: Process Mining and Network Protocols
    Autor:in: Matthias Leeb (Author)
    Subject: Computer Science - IT-Security
    Category: Diploma Thesis , 2015 , Grade: 1
    Price: US$ 42.99
  • Development and Implementation of secure GSM algorithm for Mobile Banking
    Telecommunication Security
    Title: Development and Implementation of secure GSM algorithm for Mobile Banking
    Autor:in: Ali Raheem (Author)
    Subject: Computer Science - IT-Security
    Category: Master's Thesis , 2011 , Grade: MERIT
    Price: US$ 21.99
  • A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Title: A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
    Autor:in: Sven Elmers (Author)
    Subject: Computer Science - IT-Security
    Category: Bachelor Thesis , 2009 , Grade: 2,1
    Price: US$ 21.99
Show 25 50 100
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint