Shop
Shop
Tutorials
En
De
Shop
Tutorials
How to find your topic
How to research effectively
How to structure an academic paper
How to cite correctly
How to format in Word
Trends
FAQ
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(156)
Search all subjects...
Category of text
University student text
(84)
Thesis
(21)
Textbook, Science
(16)
Secondary school text
(9)
Price
free
(24)
0 - 10 USD
(16)
10 - 25 USD
(100)
25 - 50 USD
(16)
Language
German
(104)
English
(51)
Spanish; Castilian
(1)
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
156 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
1
2
...
4
>
Mobile Malware Anti-malware Coevolution
Autor:in:
Alexios Iosif Kotsis (Author)
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Malware Detection Avoidance through Mutexes
Autor:in:
Alexios Iosif Kotsis (Author)
Category:
Scientific Study , 2020 , Grade: 4.0
Price:
US$ 0.99
Hardware Trojan Threat Taxonomies 2017-2020
Autor:in:
Alexios Iosif Kotsis (Author)
Category:
Project Report , 2020 , Grade: 4.0
Price:
US$ 0.99
Efficient Fuzzing. Wie es bestehende Teststrategien effizient ergänzen kann
Autor:in:
Markus Dreher (Author)
Category:
Academic Paper , 2021 , Grade: 1 (90%)
Price:
US$ 0.99
Die Post-Quanten-Kryptographie. Ein Überblick
Autor:in:
Lukas Meinl (Author)
Category:
Term Paper (Advanced seminar) , 2021 , Grade: 1,0
Price:
US$ 0.99
How to do a Wi-Fi Forensics Analysis
Autor:in:
Alexios Iosif Kotsis (Author)
Category:
Research Paper (postgraduate) , 2019 , Grade: A
Price:
US$ 0.99
Writing a Cryptosystem Encoding RSA Code in C Language
Autor:in:
Alexios Iosif Kotsis (Author)
Category:
Academic Paper , 2019 , Grade: A
Price:
US$ 0.99
Cloud computing. A security analysis
Autor:in:
Haitham Ismail (Author)
Category:
Literature Review , 2017 , Grade: A
Price:
US$ 0.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Autor:in:
Robert Joodat (Author)
,
Eric Wang (Author)
Category:
Technical Report , 2017 , Grade: N/A
Price:
US$ 0.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
David Wall's "Cybercrime: The Transformation of Crime in the Information Age". A Literature Review
Autor:in:
Selina Kolls (Author)
Category:
Literature Review , 2016
Price:
US$ 0.99
Scriptbasierte Sicherungslösung für Windows Server 2008
Autor:in:
Hannes Schurig (Author)
Category:
Term Paper , 2013 , Grade: 1,7
Price:
US$ 0.99
Analysis and Applications of Web Security Services through the Network Features
Autor:in:
Muhammad Ismail Mohmand (Author)
,
David Young (Author)
Category:
Scientific Essay , 2015
Price:
US$ 0.99
Graph Theory Applications in Network Security
Autor:in:
Fernando Docemmilli (Author)
,
Jonathan Webb (Author)
,
Mikhail Bonin (Author)
Category:
Project Report , 2015
Price:
US$ 0.99
Prevención del Fraude a través del uso de las Tecnologías
Autor:in:
Leonel Ermides Paniagua López (Author)
,
Hada Marena Sequeira Pérez (Author)
Category:
Seminar Paper , 2015 , Grade: 94
Price:
US$ 0.-
Reversible data hiding in encrypted images
Autor:in:
Viraj Chorghe (Author)
Category:
Pre-University Paper , 2014 , Grade: 10
Price:
US$ 0.99
An Efficient and Secure Approach to Image Encryption and Transmission
Autor:in:
P.K. Kumaresan (Author)
,
Dr. S. Palanivel (Author)
Category:
Scientific Essay , 2014 , Grade: 9
Price:
US$ 0.99
ELSTER - Die elektronische Steuererklärung
Autor:in:
Susanne Dieter (Author)
Category:
Term Paper , 2014 , Grade: 1,3
Price:
US$ 0.99
Deanonymization of social network profiles by the use of pictures meta data
Autor:in:
Stefan Möstel (Author)
Category:
Seminar Paper , 2011 , Grade: 1.3
Price:
US$ 0.99
Man in the Middle Attack: Focus on SSLStrip
Autor:in:
Jordan Elks (Author)
Category:
Term Paper , 2011 , Grade: none
Price:
US$ 0.99
Universal Reencryption
Autor:in:
Christian Jungstand (Author)
Category:
Elaboration , 2003
Price:
US$ 0.99
Computerviren. Funktionsweise und Schutzmöglichkeiten
Autor:in:
Simon Trang (Author)
Category:
Presentation / Essay (Pre-University) , 2001 , Grade: 1
Price:
US$ 0.99
Gesetzliche Grundlagen für Kryptographie, Schlüssel und Signaturen
Autor:in:
Dennis Mohrmann (Author)
Category:
Presentation / Essay (Pre-University) , 2001 , Grade: 2
Price:
US$ 0.99
Kryptokontroverse - Ist es sinnvoll, die Verschlüsselung von elektronischen Dokumenten gesetzlich zu regeln?
Autor:in:
Kai Jan Runte (Author)
Category:
Seminar Paper , 1999
Price:
US$ 0.99
Detecting Veracity
A New door to keep Safe from fake Posts
Autor:in:
M.Tech Hemant Kumar Saini (Author)
,
Nitesh Chouhan (Author)
Category:
Literature Review , 2014 , Grade: 1.0
Price:
US$ 3.99
Using Bittorent protocol to launch DDoS attacks
Autor:in:
Ashan Maduranga (Author)
Category:
Essay , 2012
Price:
US$ 4.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Autor:in:
Daniela Petzoldt (Author)
Category:
Abstract , 2017 , Grade: 1
Price:
US$ 5.99
IT-Security als Aufgabe des Netzbetreibers gem. § 11 EnWG
Autor:in:
Marianne Karpp (Author)
Category:
Term Paper , 2020 , Grade: 1,0
Price:
US$ 6.99
The Concept of Defense in Depth
Autor:in:
Oluwagbenga Afolabi (Author)
Category:
Academic Paper , 2017 , Grade: A
Price:
US$ 5.99
Improved RSA Algorithm based on cloud database using Proth Number and Mersenne Prime Number
Autor:in:
Aditya Kumar (Author)
Category:
Research Paper (undergraduate) , 2019
Price:
US$ 6.99
Password as the first line of defence. How to create a strong and unique password
Autor:in:
Haitham Ismail (Author)
Category:
Essay , 2019
Price:
US$ 6.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
Application Network Architecture for Payroll System
Autor:in:
Harry Mwololo (Author)
Category:
Academic Paper , 2017 , Grade: 9
Price:
US$ 6.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Secure Password Policy. Current Situation and Solutions
Autor:in:
Shiva Reddy (Author)
,
Saikat Sinha (Author)
,
G. Abirami (Author)
Category:
Research Paper (postgraduate) , 2017 , Grade: 80
Price:
US$ 6.99
Computerviren und Schutzmaßnahmen. Ein Überblick
Autor:in:
Dirk Höppner (Author)
Category:
Pre-University Paper , 2015
Price:
US$ 6.99
Information security for national security: The Snowden and NSA case study
Autor:in:
Majed Alkhammash (Author)
Category:
Scientific Essay , 2014 , Grade: 70
Price:
US$ 6.99
Backdoor Add-ons. A new way to harbor the data
Autor:in:
Hemant Kumar Saini (Author)
Category:
Textbook , 2014 , Grade: 1
Price:
US$ 6.99
Gefährdung der digitalen Infrastruktur. Russland als "Hackerparadies"?
Autor:in: Anonymous
Category:
Pre-University Paper , 2023 , Grade: 1
Price:
US$ 8.99
Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
Autor:in:
Dr. Manisha Kumari Deep (Author)
Category:
Scientific Essay , 2018 , Grade: 2.5
Price:
US$ 8.99
Encrypting File System (EFS)
Einordnung von EFS in die Kryptographie, Aspekte bezüglich der Nutzung von EFS
Autor:in:
M. Sc. Lee Kirsten (Author)
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Verschleierungstechniken für Payloads
Autor:in:
Lee Kirsten (Author)
Category:
Term Paper , 2019 , Grade: 1,3
Price:
US$ 10.99
Dezentrale E-Commerce Plattform. OpenBazaar
Autor:in:
Lee Kirsten (Author)
Category:
Term Paper , 2019 , Grade: 1,7
Price:
US$ 10.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
Autor:in:
Michelle Bernotti (Author)
Category:
Seminar Paper , 2014 , Grade: 1,3
Price:
US$ 11.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
Autor:in:
Florian Wolf (Author)
,
Jonas Martin (Author)
Category:
Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
Price:
US$ 14.99
Die Wirkungsweise kryptologischer Verfahren am Beispiel der EC-Karte
Autor:in:
Nicolas Wilken (Author)
Category:
Pre-University Paper , 2016 , Grade: 1-
Price:
US$ 14.99
Kryptografie. Algorithmen zur Verschlüsselung Rijndael (AES) und Twofish im Vergleich
Autor:in:
Jonas El-Sirwy (Author)
Category:
Pre-University Paper , 2016 , Grade: 1
Price:
US$ 14.99
Management von Passwörtern. Tools und Heuristiken
Autor:in:
Tobias Steinicke (Author)
Category:
Presentation (Elaboration) , 2014 , Grade: 1,3
Price:
US$ 14.99
Show
25
50
100
1
2
...
4
>