Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite

Fach

    • Informatik - IT-Security (54)
    • In allen Fächern suchen...

Kategorie des Textes

    • Akademische Arbeit (9)
    • Masterarbeit (6)
    • Wissenschaftlicher Aufsatz (6)
    • Seminararbeit (6)
    • Essay (4)
    • Forschungsarbeit (4)
    • Projektarbeit (3)
    • Rezension / Literaturbericht (3)
    • Bachelorarbeit (3)
    • Hausarbeit (2)
    • Studienarbeit (2)
    • Doktorarbeit / Dissertation (1)
    • Facharbeit (Schule) (1)
    • Ausarbeitung (1)
    • Fachbuch (1)
    • Wissenschaftliche Studie (1)
    • Technischer Bericht (1)
    Alle anzeigen... Weniger anzeigen...

Preis

    • paid (39)
    • free (15)

54 Ergebnisse

Sortieren nach
123>
  • Security Issues of Big Data Hadoop
    Titel: Security Issues of Big Data Hadoop
    Autor:in: Rohit Sharma (Autor:in)
    Kategorie: Wissenschaftlicher Aufsatz , 2018 , Note: 2
    Preis: US$ 6,99
  • Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Titel: Use of SaaS (Software as a Service) as a Cloud Computing Solution
    Autor:in: Harry Mwololo (Autor:in)
    Kategorie: Essay , 2017 , Note: 9
    Preis: US$ 14,99
  • Distributed Denial of Service (DDOS) attacks and IoT Security
    Titel: Distributed Denial of Service (DDOS) attacks and IoT Security
    Autor:in: Robert Joodat (Autor:in), Eric Wang (Autor:in)
    Kategorie: Technischer Bericht , 2017 , Note: N/A
    Preis: US$ 0,99
  • Secure Password Policy. Current Situation and Solutions
    Titel: Secure Password Policy. Current Situation and Solutions
    Autor:in: Shiva Reddy (Autor:in), Saikat Sinha (Autor:in), G. Abirami (Autor:in)
    Kategorie: Forschungsarbeit , 2017 , Note: 80
    Preis: US$ 6,99
  • David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Titel: David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
    Autor:in: Selina Kolls (Autor:in)
    Kategorie: Rezension / Literaturbericht , 2016
    Preis: US$ 0,99
  • Analysis and Applications of Web Security Services through the Network Features
    Titel: Analysis and Applications of Web Security Services through the Network Features
    Autor:in: Muhammad Ismail Mohmand (Autor:in), David Young (Autor:in)
    Kategorie: Wissenschaftlicher Aufsatz , 2015
    Preis: US$ 0,99
  • Graph Theory Applications in Network Security
    Titel: Graph Theory Applications in Network Security
    Autor:in: Fernando Docemmilli (Autor:in), Jonathan Webb (Autor:in), Mikhail Bonin (Autor:in)
    Kategorie: Projektarbeit , 2015
    Preis: US$ 0,99
  • Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Titel: Improving Intrusion Detection in MANETs. Researching Systems in Mobile Ad Hoc Networks
    Autor:in: MSc Andy Reed (Autor:in)
    Kategorie: Studienarbeit , 2015
    Preis: US$ 14,99
  • Information security for national security: The Snowden and NSA case study
    Titel: Information security for national security: The Snowden and NSA case study
    Autor:in: Majed Alkhammash (Autor:in)
    Kategorie: Wissenschaftlicher Aufsatz , 2014 , Note: 70
    Preis: US$ 6,99
  • Analyzing Online Voting Systems for Flaw Detection
    Titel: Analyzing Online Voting Systems for Flaw Detection
    Autor:in: Md. Shamsur Rahim (Autor:in), AZM Ehtesham Chowdhury (Autor:in)
    Kategorie: Forschungsarbeit , 2015 , Note: A
    Preis: US$ 14,99
  • A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    A Model To Enhance The Performance Of Cloud Computing File System Using Round Robin Algorithm
    Titel: A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm
    Autor:in: Pradheep Manisekaran (Autor:in)
    Kategorie: Doktorarbeit / Dissertation , 2014
    Preis: US$ 19,99
  • Using Bittorent protocol to launch DDoS attacks
    Titel: Using Bittorent protocol to launch DDoS attacks
    Autor:in: Ashan Maduranga (Autor:in)
    Kategorie: Essay , 2012
    Preis: US$ 3,99
  • Detecting Veracity
    A New door to keep Safe from fake Posts
    Titel: Detecting Veracity
    Autor:in: M.Tech Hemant Kumar Saini (Autor:in), Nitesh Chouhan (Autor:in)
    Kategorie: Rezension / Literaturbericht , 2014 , Note: 1.0
    Preis: US$ 3,99
  • Reversible data hiding in encrypted images
    Titel: Reversible data hiding in encrypted images
    Autor:in: Viraj Chorghe (Autor:in)
    Kategorie: Facharbeit (Schule) , 2014 , Note: 10
    Preis: US$ 0,99
  • Backdoor Add-ons. A new way to harbor the data
    Titel: Backdoor Add-ons. A new way to harbor the data
    Autor:in: Hemant Kumar Saini (Autor:in)
    Kategorie: Fachbuch , 2014 , Note: 1
    Preis: US$ 6,99
  • An Efficient and Secure Approach to Image Encryption and Transmission
    Titel: An Efficient and Secure Approach to Image Encryption and Transmission
    Autor:in: P.K. Kumaresan (Autor:in), Dr. S. Palanivel (Autor:in)
    Kategorie: Wissenschaftlicher Aufsatz , 2014 , Note: 9
    Preis: US$ 0,99
  • Intrusion Detection System in mobile ad hoc network in MAC layer
    Titel: Intrusion Detection System in mobile ad hoc network in MAC layer
    Autor:in: Tapan Gondaliya (Autor:in)
    Kategorie: Masterarbeit , 2013 , Note: C
    Preis: US$ 20,99
  • To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Security in Cloud Computing
    Titel: To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach
    Autor:in: Ashwin Dhivakar (Autor:in)
    Kategorie: Masterarbeit , 2014
    Preis: US$ 19,99
  • Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Titel: Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
    Autor:in: Andy Reed (Autor:in)
    Kategorie: Masterarbeit , 2012 , Note: Merit
    Preis: US$ 31,99
  • Potential for Data Loss from Security Protected Smartphones
    Investigate how to use protective security measures from the PC world to secure Smartphones
    Titel: Potential for Data Loss from Security Protected Smartphones
    Autor:in: Vikas Rajole (Autor:in)
    Kategorie: Masterarbeit , 2011 , Note: 75
    Preis: US$ 19,99
  • Using Security Patterns in Web-Application
    Titel: Using Security Patterns in Web-Application
    Autor:in: Shahnawaz Alam (Autor:in)
    Kategorie: Masterarbeit , 2011 , Note: "-"
    Preis: US$ 36,99
  • Development and Implementation of secure GSM algorithm for Mobile Banking
    Telecommunication Security
    Titel: Development and Implementation of secure GSM algorithm for Mobile Banking
    Autor:in: Ali Raheem (Autor:in)
    Kategorie: Masterarbeit , 2011 , Note: MERIT
    Preis: US$ 19,99
  • Preformace study of WiMAX Network Security
    Security Network
    Titel: Preformace study of WiMAX Network Security
    Autor:in: Ali Raheem (Autor:in)
    Kategorie: Forschungsarbeit , 2011
    Preis: US$ 14,99
  • Instant Messaging and Cross Site Scripting (XSS)
    Titel: Instant Messaging and Cross Site Scripting (XSS)
    Autor:in: MSc. Katharina Kurek (Autor:in)
    Kategorie: Seminararbeit , 2011
    Preis: US$ 16,99
  • Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Titel: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
    Autor:in: Sharmin Rashid Linta (Autor:in), Md. Ridgewan Khan (Autor:in)
    Kategorie: Bachelorarbeit , 2011
    Preis: US$ 32,99
Zeige 25 50 100
123>
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum