en
de
es
fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop
›
Results for «
bundesamt für sicherheit in der informationstechnik
»
Open Filters
Search in
Title
Author
Fulltext
Subject
Computer Science - Commercial Information Technology
(5)
Computer Science - IT-Security
(3)
Business economics - Supply, Production, Logistics
(1)
Nursing Science - Nursing Management
(1)
Computer Science - General
(1)
Organisation and administration - Miscellaneous
(1)
Computer Science - Applied
(1)
Computer Science - Internet, New Technologies
(1)
Computer Science - Technical Computer Science
(1)
Politics - Methods, Research
(1)
Politics - Basics and General
(1)
Business economics - Banking, Stock Exchanges, Insurance, Accounting
(1)
Law - Data protection
(1)
Computer Science - Miscellaneous
(1)
Business economics - Information Management
(1)
Law - IT law
(1)
Business economics - Business Management, Corporate Governance
(1)
Business economics - Law
(1)
Show all...
Show less...
Category of text
University student text
(14)
Thesis
(8)
Textbook, Science
(1)
Price
free
(1)
10 - 25 USD
(16)
25 - 50 USD
(7)
Language
German
(24)
Publication Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
Results for »
bundesamt für sicherheit in der informationstechnik
« (24 results)
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Die Umsetzung von IT-Sicherheit in KMU
Gemäß dem IT-Grundschutzhandbuch des Bundesamtes für Sicherheit in der Informationstechnik
Autor:in:
Patrick Düngel (Author)
,
A. Berenberg (Author)
,
R. Nowak (Author)
,
J. Paetzoldt (Author)
Subject:
Computer Science - Commercial Information Technology
Category:
Scientific Study , 2004 , Grade: 1,3
Price:
US$ 33.99
Analyse der Sicherheitsfunktionen von De-Mail
Autor:in:
Andre Kreykenbohm (Author)
Subject:
Computer Science - Internet, New Technologies
Category:
Bachelor Thesis , 2011 , Grade: 2,9
Price:
US$ 20.99
Konzept und Umsetzung eines versionsunabhängigen IT-Grundschutzbausteins am Beispiel von MS Exchange
Autor:in:
Philipp Rothmann (Author)
Subject:
Computer Science - Applied
Category:
Master's Thesis , 2009 , Grade: 1,1
Price:
US$ 41.99
Eignung von Cloud-Lösungen als Unternehmensressource unter Berücksichtigung von Datenschutz und Compliance
Autor:in:
Christian Köcher (Author)
Subject:
Computer Science - Commercial Information Technology
Category:
Bachelor Thesis , 2013 , Grade: 2,0
Price:
US$ 22.99
Sicherheit in SIP-basierten VoIP-Netzen
Autor:in:
BSc Michael Sauer (Author)
Subject:
Computer Science - IT-Security
Category:
Master's Thesis , 2013 , Grade: 2
Price:
US$ 36.99
Informationssicherheit in Unternehmen
Erstellung von Sicherheitskonzepten auf Basis des BSI-Standards 200-2
Autor:in:
Onur Güldali (Author)
Subject:
Business economics - Information Management
Category:
Bachelor Thesis , 2018 , Grade: 1,3
Price:
US$ 30.99
State of the Art: Sensoren in mobilen Endgeräten
Autor:in:
Maria Astafjeva (Author)
Subject:
Computer Science - Technical Computer Science
Category:
Seminar Paper , 2012 , Grade: 2,0
Price:
US$ 17.99
In welche Richtungen werden sich Datenbanksysteme entwickeln? (Stand 2003)
Autor:in:
Christoph Hanser (Author)
Subject:
Computer Science - General
Category:
Research Paper (undergraduate) , 2003 , Grade: 1,0
Price:
US$ 0.99
Der Smart Meter Rollout durch das Messstellenbetriebsgesetz
Autor:in: Anonymous
Subject:
Business economics - Law
Category:
Term Paper , 2022 , Grade: 1,3
Price:
US$ 18.99
Meldepflichten bei Internetstraftaten und deren praktische Relevanz. Lege lata und lege ferenda
Autor:in: Anonymous
Subject:
Law - IT law
Category:
Term Paper , 2021 , Grade: 1,7
Price:
US$ 17.99
Datenschutz in sozialen Netzwerken. Grundlagen und aktuelle Entwicklungen
Autor:in:
Norbert Hirschpek (Author)
Subject:
Law - Data protection
Category:
Seminar Paper , 2020 , Grade: 2,3
Price:
US$ 17.99
Das Gefährdungs- und Bedrohungspotential durch Cyberkriminalität in Deutschland
Autor:in: Anonymous
Subject:
Politics - Basics and General
Category:
Term Paper , 2018 , Grade: 2,0
Price:
US$ 17.99
Webserver Security
Autor:in:
Pavel Ermolin (Author)
Subject:
Computer Science - IT-Security
Category:
Seminar Paper , 2011
Price:
US$ 14.99
Wirksamkeit von Standardmaßnahmen gegen Social Engineering
Eine Analyse der Messbarkeit
Autor:in:
Sebastian Krüsmann (Author)
Subject:
Computer Science - Commercial Information Technology
Category:
Bachelor Thesis , 2014 , Grade: 2,0
Price:
US$ 31.99
Technische Grundlagen der Cloud-Technologie
Betriebswirtschaftliche Aspekte Cloud Computing
Autor:in: Anonymous
Subject:
Computer Science - Miscellaneous
Category:
Term Paper , 2017 , Grade: 2
Price:
US$ 14.99
Mit E-Government zum verbesserten Bürgerservice: Chancen und Probleme
Autor:in:
Jana Kuhlmey (Author)
Subject:
Organisation and administration - Miscellaneous
Category:
Term Paper , 2009 , Grade: 1,7
Price:
US$ 14.99
Hochverfügbarkeitsstrategien auf Open-Source-Basis
Autor:in:
Diplom-Wirtschaftsinformatiker (FH) Michael Gläß (Author)
Subject:
Computer Science - Commercial Information Technology
Category:
Diploma Thesis , 2009 , Grade: 1,0
Price:
US$ 36.99
RFID. Chancen, Risiken und Umsetzungen einer Technologie
Autor:in:
Tobias Westphal (Author)
Subject:
Business economics - Supply, Production, Logistics
Category:
Term Paper , 2005 , Grade: 1
Price:
US$ 18.99
Datensicherheit beim eBanking - Technologien und Risiken
Autor:in:
Sebastian Oehmig (Author)
Subject:
Computer Science - Commercial Information Technology
Category:
Seminar Paper , 2004 , Grade: 1,0
Price:
US$ 17.99
Nutzung allgemeiner Fintechs im Retailbanking
Autor:in:
F. A. Käsbauer (Author)
Subject:
Business economics - Banking, Stock Exchanges, Insurance, Accounting
Category:
Seminar Paper , 2019 , Grade: 1,7
Price:
US$ 18.99
Operatives Controlling für das Pflegemanagement im Krankenhaus
Autor:in:
Thomas Bodmer (Author)
Subject:
Nursing Science - Nursing Management
Category:
Diploma Thesis , 2006 , Grade: 1,7
Price:
US$ 36.99
Symmetrische und asymmetrische Verschlüsselungsverfahren samt Dateiverschlüsselung. Eine Analyse von VeraCrypt
Autor:in:
Philipp Schmidt (Author)
Subject:
Computer Science - IT-Security
Category:
Term Paper (Advanced seminar) , 2017 , Grade: 2,0
Price:
US$ 15.99
Design Thinking im IT-Management. Methode zur Verringerung von Schatten-IT
Autor:in: Anonymous
Subject:
Business economics - Business Management, Corporate Governance
Category:
Project Report , 2021 , Grade: 1,0
Price:
US$ 16.99
Salafistische Propaganda im Internet
Autor:in:
Marius Faust (Author)
Subject:
Politics - Methods, Research
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99