Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
304 open access dissertations and theses found for:
cybersecurity  »   Refine Search
31.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
32.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
33.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
34.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
36.
The Role of Diverse Skill Sets in Incident Response
by Moore, Sandra, T.D.  Capitol Technology University. 2019: 128 pages; 27662834.
37.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
39.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
40.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
42.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
43.
Solid State Disk forensics: Is there a path forward?
by Fulton, John William, M.S.  Utica College. 2014: 47 pages; 1555597.
44.
A General Purpose Neural Processor
by Mountain, David Jerome, Ph.D.  University of Maryland, Baltimore County. 2017: 171 pages; 10268058.
45.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
46.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
47.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, Dr.sc.  Capitol Technology University. 2014: 243 pages; 3692148.
50.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
51.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
52.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
53.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
54.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
55.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
56.
The Effects of Artificial Intelligence on the Youth
by Howley, Robert J., III, M.S.  Utica College. 2019: 41 pages; 22622916.
57.
Dynamic Malware Analysis of GPU-Assisted Cryptoviruses Using Contained AES Side-Channels
by Espinoza, Jesus Pastor, D.Sc.  Capitol Technology University. 2018: 503 pages; 13853787.
58.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
59.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
31 - 60 of 304 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest