Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46458 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
301.
302.
Interagency Coordination of Security Operations at a Large U.S. Seaport
by Levy, Edmund B., Ph.D.  Walden University. 2015: 150 pages; 3705026.
303.
Defense Institutional Building - Integrating the Work
by McIlwain, Carol J., Ph.D.  University of Maryland, College Park. 2017: 525 pages; 10269397.
304.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
306.
Total Relaxation Center, LLC
by Mayberry, Darrell S., M.S.  California State University, Long Beach. 2017: 64 pages; 10599647.
307.
MD your way
by Kassem, Nora, M.S.  California State University, Long Beach. 2016: 59 pages; 10147307.
308.
Examining Critical Material Supply Chains Through a Bayesian Network Model
by Kling, Joseph A., D.Engr.  The George Washington University. 2018: 110 pages; 10928265.
309.
Systems optimization for mobility management
by Dutta, Ashutosh, Ph.D.  Columbia University. 2010: 576 pages; 3428701.
310.
The Management of Feral Pig Socio-Ecological Systems in Far North Queensland, Australia
by Shuster, Gabriela, Ph.D.  Antioch University. 2012: 253 pages; 10817702.
312.
313.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
315.
316.
317.
Knowledge management practices in U.S. federal agencies: The catalyst for E-Government transformation
by Rhoads, Elsa P., D.Sc.  The George Washington University. 2006: 265 pages; 3407418.
319.
Tribal organizations and energy development: Recognized sovereignty, regulations, and planning
by Wilson, Amy James, M.U.R.P.  University of Colorado at Denver. 2016: 193 pages; 10247680.
320.
Experts' recommendations to create effective teams for successful crisis management: A delphi study
by McClelland, Tommy Bennett, Jr., D.M.  University of Phoenix. 2016: 169 pages; 10291136.
321.
322.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
323.
Lone -insider boards: Improved monitoring or a recipe for disaster?
by Martin, John A., Ph.D.  The Florida State University. 2008: 110 pages; 3340737.
324.
Problem Management: A System Engineering Management Framework
by Olson, Bill A., Ph.D.  The George Washington University. 2012: 110 pages; 3499216.
326.
Subsystem contexts and policy information: Conditional effects on information in congressional hearings
by Jatkowski, Walter J., III, Ph.D.  The University of Oklahoma. 2012: 454 pages; 3547850.
327.
La Paz Home Care Agency: A Business Plan
by Atilano, Edwin, M.S.  California State University, Long Beach. 2018: 66 pages; 10831022.
329.
External and internal agency characteristics as determinants of Program Assessment Rating Tool (PART) scores
by Sayasithsena, Jennifer Deets, Ph.D.  The George Washington University. 2010: 150 pages; 3417960.
330.
Towards information polycentricity theory– Investigation of a hospital revenue cycle
by Singh, Rajendra, Ph.D.  Georgia State University. 2011: 212 pages; 3490067.
301 - 330 of 46458 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest