Shop
Shop
Tutorials
En
De
Shop
Tutorials
How to find your topic
How to research effectively
How to structure an academic paper
How to cite correctly
How to format in Word
Trends
FAQ
Go to shop
Open Filters
Subject
Computer Science - IT-Security
(156)
Search all subjects...
Category of text
University student text
(84)
Thesis
(21)
Textbook, Science
(16)
Secondary school text
(9)
Price
free
(24)
0 - 10 USD
(16)
10 - 25 USD
(100)
25 - 50 USD
(16)
Language
German
(104)
English
(51)
Spanish; Castilian
(1)
Year
Any Year
since 2024
since 2023
since 2022
since 2021
since 2020
since 2019
since 2018
since 2017
since 2016
since 2015
since 2010
since 2005
since 2000
156 results
Sort by
Most Relevant
Newest
Most Read
Alphabetic: A-Z
Alphabetic: Z-A
Price: Low to High
Price: High to low
<
1
2
3
4
...
7
>
Bedeutung von Schutz persönlicher und sensibler Daten im mobilen Endgerätebereich
Autor:in:
Daniel Schreiber (Author)
Category:
Seminar Paper , 2019 , Grade: 1,0
Price:
US$ 16.99
Differences Between the Security Models of Android and iOS
Autor:in:
Samuel Hopstock (Author)
Category:
Seminar Paper , 2018 , Grade: 1,0
Price:
US$ 14.99
Protecting PII (Personal Identifiable Information) & PHI (Protected Health Information)
How to protect (PII) and (PHI)?
Autor:in:
Haitham Ismail (Author)
Category:
Essay , 2019
Price:
US$ 15.99
Cloud computing. A security analysis
Autor:in:
Haitham Ismail (Author)
Category:
Literature Review , 2017 , Grade: A
Price:
US$ 0.99
Web-Browser basierter DDoS-Angriff mit HTML5 und JavaScript
Autor:in:
Lee Kirsten (Author)
Category:
Term Paper , 2018 , Grade: 1,7
Price:
US$ 11.99
Information Technology Infrastructure Library (ITIL) Framework. Theoretische Grundlagen und Anwendungsbeispiel anhand eines Unternehmens
Autor:in:
Julian Springer (Author)
Category:
Term Paper (Advanced seminar) , 2018 , Grade: 1,3
Price:
US$ 17.99
SSL/TLS. Sichere Kommunikation im Netzwerk
Autor:in:
Julian Springer (Author)
Category:
Term Paper , 2017 , Grade: 1,0
Price:
US$ 17.99
IT Application Security and Control
Autor:in:
Dileep Keshava Narayana (Author)
Category:
Elaboration , 2012 , Grade: 98
Price:
US$ 18.99
Survey on Network Security Threats and Attacks
Autor:in:
Santosh Malhotra (Author)
,
Amit Kumar (Author)
Category:
Academic Paper , 2018 , Grade: 1
Price:
US$ 5.99
Kennzahlensystem für das IT-Controlling
Autor:in:
Jasmina Nickel (Author)
Category:
Research Paper (undergraduate) , 2018 , Grade: 1,7
Price:
US$ 15.99
Cybercrime and Ethics among Kids and Teens. Study on top four countries in Cybercrime
Autor:in:
Dr. Manisha Kumari Deep (Author)
Category:
Scientific Essay , 2018 , Grade: 2.5
Price:
US$ 8.99
The pros and cons of modern web application security flaws and possible solutions
Autor:in:
Shahriat Hossain (Author)
,
Kh Ashique Mahmud (Author)
Category:
Academic Paper , 2018 , Grade: 10
Price:
US$ 16.99
WLAN. Logische Integration in die IT-Infrastruktur und Abläufe der WLAN-Kommunikation
Autor:in: Anonymous
Category:
Term Paper , 2016 , Grade: 1,0
Price:
US$ 17.99
Application Network Architecture for Payroll System
Autor:in:
Harry Mwololo (Author)
Category:
Academic Paper , 2017 , Grade: 9
Price:
US$ 6.99
Managing Threats of Cyber-Attacks on Mobile Devices
Autor:in:
Anthony Kithome (Author)
Category:
Academic Paper , 2017 , Grade: 2
Price:
US$ 15.99
Datenschutzgesetz in der IT
Autor:in:
Rochus Stobbe (Author)
Category:
Term Paper , 2014 , Grade: 1,0
Price:
US$ 16.99
Security Issues of Big Data Hadoop
Autor:in:
Rohit Sharma (Author)
Category:
Scientific Essay , 2018 , Grade: 2
Price:
US$ 6.99
Use of SaaS (Software as a Service) as a Cloud Computing Solution
Autor:in:
Harry Mwololo (Author)
Category:
Essay , 2017 , Grade: 9
Price:
US$ 14.99
RSA und dessen Ausbauversuch RSAODN. Vergleich zweier Kryptosysteme
Autor:in:
Moritz Jahn (Author)
Category:
Pre-University Paper , 2016 , Grade: 1,3
Price:
US$ 14.99
Distributed Denial of Service (DDOS) attacks and IoT Security
Autor:in:
Robert Joodat (Author)
,
Eric Wang (Author)
Category:
Technical Report , 2017 , Grade: N/A
Price:
US$ 0.99
Implementierung einer verschlüsselten Netzwerkkommunikation unter der Verwendung von Python Sockets und des RSA-Algorithmus
Autor:in:
Florian Wolf (Author)
,
Jonas Martin (Author)
Category:
Pre-University Paper , 2017 , Grade: 15 Punkte (entspricht 1+)
Price:
US$ 14.99
Die Methoden des Social Engineering. Überblick und mögliche Gegenmaßnahmen
Autor:in:
Kse Nia (Author)
Category:
Seminar Paper , 2017 , Grade: 2,7
Price:
US$ 16.99
Analyse und effiziente Überwachung sicherheitskritischer Bitcoin-Adressen
Autor:in:
Daniel Szameitat (Author)
,
Norman Luring (Author)
,
Sebastian Hollermann (Author)
Category:
Academic Paper , 2017 , Grade: 1,3
Price:
US$ 0.99
IT-Sicherheit. Eine Zusammenfassung zur Zertifikatsprüfung
Autor:in:
Daniela Petzoldt (Author)
Category:
Abstract , 2017 , Grade: 1
Price:
US$ 5.99
Secure Password Policy. Current Situation and Solutions
Autor:in:
Shiva Reddy (Author)
,
Saikat Sinha (Author)
,
G. Abirami (Author)
Category:
Research Paper (postgraduate) , 2017 , Grade: 80
Price:
US$ 6.99
Show
25
50
100
<
1
2
3
4
...
7
>