Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16791 open access dissertations and theses found for:
if(Cyber defense)  »   Refine Search
61.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
62.
A mentorship study of women in the Department of Defense acquisition sector
by Harris, Juanita M., D.M.  University of Phoenix. 2011: 183 pages; 3463543.
63.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
64.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
65.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
66.
The Role of Diverse Skill Sets in Incident Response
by Moore, Sandra, T.D.  Capitol Technology University. 2019: 128 pages; 27662834.
67.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
69.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
70.
Leadership: Implications for the Field of Project Management
by Ojo, Joseph, D.E.Lead.  University of Charleston - Beckley. 2018: 128 pages; 10980236.
71.
The welfare-warfare state: Perpetuating the U.S. Military economy
by Thorpe, Rebecca U., Ph.D.  University of Maryland, College Park. 2010: 332 pages; 3409854.
73.
Leadership competencies of successful systems engineers in the defense industry
by Melvin, James E., Ed.D.  University of Pennsylvania. 2016: 151 pages; 10158568.
75.
76.
A Review of the Department of the Army's Decentralized Cost Benefit Analysis Process
by Acosta, Gerard M., D.B.A.  Walden University. 2012: 119 pages; 3539046.
77.
78.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
79.
Critical infrastructure protection
by Shwani, Hazim G., M.S.  Utica College. 2014: 55 pages; 1555605.
81.
Factors influencing organizational change in the Department of Defense
by Majewska-Button, Marzena, Ph.D.  The University of Oklahoma. 2010: 189 pages; 3407990.
82.
A Study of Educators Experience in Managing Cyberbullying
by Gutierrez, Gilbert, EDD/CI  University of Phoenix. 2018: 128 pages; 10933381.
83.
Protecting Smart Devices from the Bottom-Up
by Machiry, Aravind K., Ph.D.  University of California, Santa Barbara. 2020: 179 pages; 28092431.
84.
Fansub cyber culture in China
by Tian, Yuan, M.A.  Georgetown University. 2011: 145 pages; 1491553.
85.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
87.
Towards Polymorphic Systems Engineering
by Mathieson, John T.J., Ph.D.  The George Washington University. 2021: 140 pages; 28257912.
88.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
90.
The first line of defense: Training teachers to address bullying in rural schools
by Townsend, LaSonya C., D.S.W.  Capella University. 2013: 90 pages; 3589465.
61 - 90 of 16791 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest