Shop
Shop
Tutorials
En
De
Shop
Tutorials
How to find your topic
How to research effectively
How to structure an academic paper
How to cite correctly
How to format in Word
Trends
FAQ
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(156)
Search all subjects...
Category of text
University student text
(84)
Thesis
(21)
Textbook, Science
(16)
Secondary school text
(9)
Price
free
(24)
0 - 10 USD
(16)
10 - 25 USD
(100)
25 - 50 USD
(16)
Language
German
(104)
English
(51)
Spanish; Castilian
(1)
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
156 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
<
1
2
3
4
5
...
7
>
Computerviren und Schutzmaßnahmen. Ein Überblick
Autor:in:
Dirk Höppner (Author)
Category:
Pre-University Paper , 2015
Price:
US$ 6.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 16.99
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte
Autor:in:
Nicolas Wilken (Author)
Category:
Pre-University Paper , 2016 , Grade: 1-
Price:
US$ 14.99
Advanced Persistent Threats. Bedrohungen durch zielgerichtete und andauernde Cyberattacken
Autor:in:
B.Sc. Tobias Steinicke (Author)
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 16.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Bring your own Device. Einführungsoptimierung von BYOD unter Datenschutzaspekten im Unternehmen
Autor:in:
Denis Ruiz Lopez (Author)
Category:
Seminar Paper , 2016 , Grade: 1,3
Price:
US$ 19.99
Industrie 4.0 und Cybercrime. Sicherheitskonzepte für Cybersecurity
Autor:in:
Lisa Villing (Author)
,
Nora Bohland (Author)
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 16.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Category:
Literature Review , 2016
Price:
US$ 0.99
Mobile Device Management Ansätze im Vergleich. Potenzial und Risiken von "Corporate Owned, Personally Enabled" und "Bring your own Device"
Autor:in:
Daniel Kamps (Author)
Category:
Term Paper , 2015 , Grade: 3,0
Price:
US$ 17.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 16.99
Analysis and Applications of Web Security Services through the Network Features
Autor:in:
Muhammad Ismail Mohmand (Author)
,
David Young (Author)
Category:
Scientific Essay , 2015
Price:
US$ 0.99
Internationaler IT-Sicherheitsmarkt. Zahlen, Fakten, Trends
Autor:in:
Tobias Steinicke (Author)
Category:
Seminar Paper , 2014 , Grade: 1,7
Price:
US$ 16.99
Graph Theory Applications in Network Security
Autor:in:
Fernando Docemmilli (Author)
,
Jonathan Webb (Author)
,
Mikhail Bonin (Author)
Category:
Project Report , 2015
Price:
US$ 0.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Kryptographie von Cäsar bis RSA. Klassische und moderne Verfahren im Vergleich
Autor:in:
Tobias Steinicke (Author)
Category:
Presentation (Elaboration) , 2012 , Grade: 1,0
Price:
US$ 14.99
Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
Autor:in:
MSc Andy Reed (Author)
Category:
Research Paper (undergraduate) , 2015
Price:
US$ 14.99
SCRUM im IT-Großprojekt
Erarbeitung einer Entscheidungsmatrix zur Bestimmung der geeigneten architekturellen Vorgehensweise
Autor:in:
Sebastian Storch (Author)
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 16.99
Information security for national security: The Snowden and NSA case study
Autor:in:
Majed Alkhammash (Author)
Category:
Scientific Essay , 2014 , Grade: 70
Price:
US$ 6.99
Analyzing Online Voting Systems for Flaw Detection
Autor:in:
Md. Shamsur Rahim (Author)
,
AZM Ehtesham Chowdhury (Author)
Category:
Research Paper (postgraduate) , 2015 , Grade: A
Price:
US$ 14.99
Cloud Computing in der Versicherungsbranche
Sichere Infrastrukturen und Standardisierung mittels der Trusted German Insurance Cloud
Autor:in:
Lisa Eicker (Author)
Category:
Term Paper , 2014 , Grade: 1,3
Price:
US$ 16.99
Prevención del Fraude a través del uso de las Tecnologías
Autor:in:
Leonel Ermides Paniagua López (Author)
,
Hada Marena Sequeira Pérez (Author)
Category:
Seminar Paper , 2015 , Grade: 94
Price:
US$ 0.-
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
Autor:in:
Pradheep Manisekaran (Author)
Category:
Doctoral Thesis / Dissertation , 2014
Price:
US$ 19.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Category:
Essay , 2012
Price:
US$ 4.99
Detecting Veracity
A New door to keep Safe from fake Posts
Autor:in:
M.Tech Hemant Kumar Saini (Author)
,
Nitesh Chouhan (Author)
Category:
Literature Review , 2014 , Grade: 1.0
Price:
US$ 3.99
Show
25
50
100
<
1
2
3
4
5
...
7
>