Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Go to shop › Computer Science - IT-Security

Subject

    • Computer Science - IT-Security (54)
    • Search all subjects...

Category of text

    • Academic Paper (9)
    • Master's Thesis (6)
    • Scientific Essay (6)
    • Seminar Paper (6)
    • Essay (4)
    • Research Paper (postgraduate) (4)
    • Project Report (3)
    • Literature Review (3)
    • Bachelor Thesis (3)
    • Term Paper (2)
    • Research Paper (undergraduate) (2)
    • Doctoral Thesis / Dissertation (1)
    • Pre-University Paper (1)
    • Elaboration (1)
    • Textbook (1)
    • Scientific Study (1)
    • Technical Report (1)
    Show all... Show less...

Price

    • paid (39)
    • free (15)

Computer Science - IT-Security  (54 results)

Grin offers a vital collection for students in Information and Cybersecurity. Discover essential academic papers, theses, and essays focusing on critical areas like network security threats, cloud security strategies, and cybercrime investigations. Our texts delve into innovative approaches to data security, including advanced encryption techniques and robust system security. Access these valuable resources instantly via PDF, eBook, or print-on-demand, perfect for advancing your studies.

Sort by
123>
  • Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Title: Technology and its influence on Cyber Activities. The Need for Adequate Cyber Security Policies to Manage its occurrences
    Autor:in: Enowsoum Konrad (Author)
    Category: Academic Paper , 2025
    Price: US$ 0.99
  • Usage of Process Mining for Security in Process-Aware Information Systems
    Title: Usage of Process Mining for Security in Process-Aware Information Systems
    Autor:in: Marlon Müller (Author)
    Category: Seminar Paper , 2024 , Grade: 1,7
    Price: US$ 14.99
  • Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Title: Comparison of information security standards ISO/IEC 27000 and BSI IT-Grundschutz
    Autor:in: Anonym (Author)
    Category: Seminar Paper , 2022 , Grade: 1,0
    Price: US$ 7.99
  • Critical Analysis of Ransomware in Relation to Cybercrime
    Title: Critical Analysis of Ransomware in Relation to Cybercrime
    Autor:in: Rhoda Kariuki (Author)
    Category: Academic Paper , 2023 , Grade: A
    Price: US$ 16.99
  • Data Encryption Standard (DES) and Issues of DES and its Replacement
    Title: Data Encryption Standard (DES) and Issues of DES and its Replacement
    Autor:in: Haitham Ismail (Author)
    Category: Scientific Essay , 2022 , Grade: 75%
    Price: US$ 15.99
  • Malware Detection Avoidance through Mutexes
    Title: Malware Detection Avoidance through Mutexes
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Scientific Study , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Mobile Malware Anti-malware Coevolution
    Title: Mobile Malware Anti-malware Coevolution
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • Hardware Trojan Threat Taxonomies 2017-2020
    Title: Hardware Trojan Threat Taxonomies 2017-2020
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Project Report , 2020 , Grade: 4.0
    Price: US$ 0.99
  • On the security of TLS 1.2 and TLS 1.3. A comparison
    Title: On the security of TLS 1.2 and TLS 1.3. A comparison
    Autor:in: Sarah Syed-Winkler (Author)
    Category: Term Paper , 2021 , Grade: 95%
    Price: US$ 20.99
  • Security Issues in Hardware Virtualization
    Title: Security Issues in Hardware Virtualization
    Autor:in: Samuel Hopstock (Author)
    Category: Seminar Paper , 2020 , Grade: 1,3
    Price: US$ 14.99
  • The Concept of Defense in Depth
    Title: The Concept of Defense in Depth
    Autor:in: Oluwagbenga Afolabi (Author)
    Category: Academic Paper , 2017 , Grade: A
    Price: US$ 6.99
  • How to do a Wi-Fi Forensics Analysis
    Title: How to do a Wi-Fi Forensics Analysis
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Research Paper (postgraduate) , 2019 , Grade: A
    Price: US$ 0.99
  • Writing a Cryptosystem Encoding RSA Code in C Language
    Title: Writing a Cryptosystem Encoding RSA Code in C Language
    Autor:in: Alexios Iosif Kotsis (Author)
    Category: Academic Paper , 2019 , Grade: A
    Price: US$ 0.99
  • Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Title: Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
    Autor:in: Aditya Kumar (Author)
    Category: Research Paper (undergraduate) , 2019
    Price: US$ 6.99
  • Home Security Systems. Intrusion Detection with GSM
    Title: Home Security Systems. Intrusion Detection with GSM
    Autor:in: Washington Mutwiri (Author)
    Category: Academic Paper , 2019 , Grade: 2.1
    Price: US$ 15.99
  • Password as the first line of defence. How to create a strong and unique password
    Title: Password as the first line of defence. How to create a strong and unique password
    Autor:in: Haitham Ismail (Author)
    Category: Essay , 2019
    Price: US$ 6.99
  • Differences Between the Security Models of Android and iOS
    Title: Differences Between the Security Models of Android and iOS
    Autor:in: Samuel Hopstock (Author)
    Category: Seminar Paper , 2018 , Grade: 1,0
    Price: US$ 14.99
  • Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    How to protect (PII) and (PHI)?
    Title: Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
    Autor:in: Haitham Ismail (Author)
    Category: Essay , 2019
    Price: US$ 14.99
  • Cloud computing. A security analysis
    Title: Cloud computing. A security analysis
    Autor:in: Haitham Ismail (Author)
    Category: Literature Review , 2017 , Grade: A
    Price: US$ 0.99
  • IT Application Security and Control
    Title: IT Application Security and Control
    Autor:in: Dileep Keshava Narayana (Author)
    Category: Elaboration , 2012 , Grade: 98
    Price: US$ 19.99
  • Survey on Network Security Threats and Attacks
    Title: Survey on Network Security Threats and Attacks
    Autor:in: Santosh Malhotra (Author), Amit Kumar (Author)
    Category: Academic Paper , 2018 , Grade: 1
    Price: US$ 6.99
  • Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Title: Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
    Autor:in: Dr. Manisha Kumari Deep (Author)
    Category: Scientific Essay , 2018 , Grade: 2.5
    Price: US$ 8.99
  • The pros and cons of modern web application security flaws and possible solutions
    Title: The pros and cons of modern web application security flaws and possible solutions
    Autor:in: Shahriat Hossain (Author), Kh Ashique Mahmud (Author)
    Category: Academic Paper , 2018 , Grade: 10
    Price: US$ 16.99
  • Application Network Architecture for Payroll System
    Title: Application Network Architecture for Payroll System
    Autor:in: Harry Mwololo (Author)
    Category: Academic Paper , 2017 , Grade: 9
    Price: US$ 6.99
  • Managing Threats of Cyber-Attacks on Mobile Devices
    Title: Managing Threats of Cyber-Attacks on Mobile Devices
    Autor:in: Anthony Kithome (Author)
    Category: Academic Paper , 2017 , Grade: 2
    Price: US$ 15.99
Show 25 50 100
123>

Dive deep into the crucial field of Information and Cybersecurity with Grin's extensive collection. Our resources cover cutting-edge topics from robust network security threats and sophisticated cybercrime analysis to designing secure cloud infrastructure and understanding data encryption methodologies. Students will discover diverse academic approaches in Master's Theses, Doctoral Dissertations, and Research Papers, addressing everything from national security challenges to ethical considerations in digital spaces. Whether you're researching blockchain security or static code analysis, find your next essential read. All texts are instantly accessible as PDF or eBook, with print-on-demand options available for your convenience.

Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Payment & Shipping
  • About us
  • Contact
  • Privacy
  • Terms
  • Imprint