Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16934 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
361.
The Implications of the Internet's Topological Structure for Its Efficiency, Security, and Reliability
by Nur, Abdullah Yasin, Ph.D.  University of Louisiana at Lafayette. 2018: 170 pages; 10980025.
362.
Exploring the Lived Experiences of Program Managers Regarding an Automated Logistics Environment
by Allen, Ronald Timothy, Ph.D.  Northcentral University. 2014: 352 pages; 3579717.
363.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
364.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
365.
Computational modeling and utilization of attention, surprise and attention gating
by Mundhenk, Terrell Nathan, Ph.D.  University of Southern California. 2009: 312 pages; 3368710.
367.
Do Auditors Help Prevent Data Breaches?
by Liu, Lisa Yao, Ph.D.  The University of Chicago. 2020: 77 pages; 27958971.
368.
The Nature and Impact of Cyberbullying on the Middle School Student
by Pilkey, Jacqueline K., Ed.D.  Walden University. 2011: 168 pages; 3458135.
373.
Bullying victimization among adolescent students: A qualitative study
by Lara, Cecy, M.S.W.  California State University, Long Beach. 2015: 52 pages; 1590123.
374.
A grant proposal for program "Tech Connect": Bridging the generations through technology coaching
by Rus, Emily L., M.S.W.  California State University, Long Beach. 2017: 72 pages; 10263550.
376.
An informed LGBT educational program on bullying for middle school professionals: A grant proposal
by Navarro, Salvador, M.S.W.  California State University, Long Beach. 2014: 80 pages; 1527737.
377.
Application of System Maturity Level to Cost and Schedule Risk in Major DoD Programs
by Walan, Alexander M.G., D.Engr.  The George Washington University. 2018: 121 pages; 10846206.
378.
China's Response to the US Asia-Pacific "Rebalance" and Its Implications for Sino-US Relations
by Adamson, Timothy, M.A.  The George Washington University. 2013: 115 pages; 1540562.
379.
Jihadist Media Networks and Virtual Propaganda in the Russian Cyberspace
by Sweet, Julia I., Ph.D.  Rutgers The State University of New Jersey, Graduate School - Newark. 2020: 413 pages; 27961198.
381.
The forgotten Cold War: The National Fallout Shelter Survey and the establishment of public shelters
by Plimpton, Kathryn, M.S.  University of Colorado at Denver. 2015: 74 pages; 1588205.
382.
Trauma, dissociation, and archetypes
by Owen, Mary Hargett, M.A.  Pacifica Graduate Institute. 2011: 121 pages; 1492830.
383.
Competing Existential Motives: A Step toward Integration
by Mantovani, Josh, M.A.  University of Colorado Colorado Springs. 2019: 51 pages; 13812147.
387.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
388.
Validating the Use of Performance Risk Indices for System-Level Risk and Maturity Assessments
by Holloman, Sherrica S., Ph.D.  The George Washington University. 2016: 192 pages; 10086217.
389.
To flatter the jury: Ingratiation effects during closing arguments
by Ziemke, Mitchell Hunter, M.A.  The University of Alabama. 2009: 87 pages; 1468047.
390.
Cyberpal: A mobile resource for cyberbullying
by Shieh, Beverly S., Psy.D.  Pepperdine University. 2016: 212 pages; 10100577.
361 - 390 of 16934 displayed.
« First < Previous |   10    11    12    13    14    15    16    17    18    19    20   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest