search
menu
Menu
Skip to content
Home
Catalog
Help
Login
Upload papers
Home
Catalog
Help
Login
Homepage
> Results for »
Security
«
Search in
Title
Author
Fulltext
Subject
Politics - Topic: Peace and Conflic...
(10)
Computer Science - IT-Security
(9)
Politics - Topic: International Org...
(4)
Computer Science - Internet, New Te...
(3)
Politics - Topic: Public Internatio...
(2)
Politics - Topic: History of Inerna...
(2)
Politics - Topic: European Union
(1)
Politics - Miscellaneous
(1)
Economics - International Economic ...
(1)
Computer Science - Applied
(1)
Engineering - Power Engineering
(1)
Health - Nutritional Science
(1)
Computer Science - General
(1)
Social Studies (General)
(1)
Engineering - Computer Engineering
(1)
Economics - Finance
(1)
Nature Protection, Landscape Conser...
(1)
Agrarian Studies
(1)
Business economics - Supply, Produc...
(1)
Economics - Other
(1)
Politics - Region: Africa
(1)
Sociology - Politics, Majorities, M...
(1)
Politics - Topic: International rel...
(1)
African Studies - Culture and Appli...
(1)
Computer Science - Commercial Infor...
(1)
Geography / Earth Science - Demogra...
(1)
Economics - Innovation economics
(1)
Sociology - Social System and Socia...
(1)
Politics - Other International Poli...
(1)
Geography / Earth Science - Meteoro...
(1)
Search all subjects...
Category of text
Textbook, Science
(3)
Thesis
(2)
University student text
(1)
Price
free
(9)
0 - 10 USD
(5)
10 - 25 USD
(11)
25 - 50 USD
(9)
Search all Prices...
Language
English
(9)
Search in all Languages...
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
(Results for »
Security
« (9 results))
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
The Contribution of Contextualized Security in Mobile Security Applications
Author:
Erick Larkin (Author)
Subject:
Computer Science - IT-Security
Category:
Research Paper (undergraduate), 2019
Price:
US$ 0.99
A framework for managing the security risks to customers on the mobile payment ecosystem in Tanzania
Author:
Ireneus Mathias (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis, 2015
Price:
US$ 0.99
Analysis and Applications of Web Security Services through the Network Features
Authors:
Muhammad Ismail Mohmand (Author)
David Young (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay, 2015
Price:
US$ 0.99
Security Architectures for Next Generation Networks
Authors:
Amir Ahmed Omer Yousif (Author)
Prof. Sami M. Sharif (Author)
Dr. Hamid Abbas Ali (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay, 2014
Price:
US$ 0.99
Cloud computing. A security analysis
Author:
Haitham Ismail (Author)
Subject:
Computer Science - IT-Security
Category:
Literature Review, 2017
Price:
US$ 0.99
An Efficient and Secure Approach to Image Encryption and Transmission
Authors:
P.K. Kumaresan (Author)
Dr. S. Palanivel (Author)
Subject:
Computer Science - IT-Security
Category:
Scientific Essay, 2014
Price:
US$ 0.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Authors:
Robert Joodat (Author)
Eric Wang (Author)
Subject:
Computer Science - IT-Security
Category:
Technical Report, 2017
Price:
US$ 0.99
Graph Theory Applications in Network Security
Authors:
Fernando Docemmilli (Author)
Jonathan Webb (Author)
Mikhail Bonin (Author)
Subject:
Computer Science - IT-Security
Category:
Project Report, 2015
Price:
US$ 0.99
Specification of security in distributed computing systems
Author:
Richard Burnham (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis, 1987
Price:
US$ 0.99