Shop
Shop
Tutorials
En
De
Shop
Tutorials
How to find your topic
How to research effectively
How to structure an academic paper
How to cite correctly
How to format in Word
Trends
FAQ
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(10)
Search all subjects...
Category of text
University student text
(68)
Thesis
(9)
Textbook, Science
(7)
Secondary school text
(4)
Search all categories...
Price
free
(9)
0 - 10 USD
(5)
10 - 25 USD
(10)
25 - 50 USD
(1)
Search all Prices...
Language
German
(5)
English
(5)
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
10 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
Critical Analysis of Ransomware in Relation to Cybercrime
Autor:in:
Rhoda Kariuki (Author)
Category:
Academic Paper , 2023 , Grade: A
Price:
US$ 17.99
Analysis of the BEM Code of Professional Guidelines
Autor:in:
Bandar Hezam (Author)
Category:
Academic Paper
Price:
US$ 17.99
Home Security Systems. Intrusion Detection with GSM
Autor:in:
Washington Mutwiri (Author)
Category:
Academic Paper , 2019 , Grade: 2.1
Price:
US$ 15.99
Sicherheit und Privatsphäre im Web. Client-Server-Kommunikation mittels Browser, HTTP-Header und Proxys
Autor:in:
David Koller (Author)
Category:
Technical Report , 2019 , Grade: 1,7
Price:
US$ 14.99
IT Application Security and Control
Autor:in:
Dileep Keshava Narayana (Author)
Category:
Elaboration , 2012 , Grade: 98
Price:
US$ 18.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 16.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 15.99
Side Channel Attacks auf den Advanced Encryption Standard (AES)
Autor:in:
Peter Hillmann (Author)
Category:
Elaboration , 2010 , Grade: 1,3
Price:
US$ 16.99
Warum ist der WEP-Standard für WLAN unsicher? PTW Angriff mit Fragmentation
Autor:in:
Sebastian Küsters (Author)
Category:
Project Report , 2016 , Grade: 1
Price:
US$ 16.99
IT-Sicherheit in Firmennetzwerken
Vergleich der IT-Governance Modelle Cobit®, ITIL® und MOF®
Autor:in:
DI(FH), M.A. Stefan Wiedner (Author)
Category:
Project Report , 2008 , Grade: 1
Price:
US$ 16.99