Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
381 open access dissertations and theses found for:
if(Firewalls)  »   Refine Search
1.
On the Modular Verification and Design of Firewalls
by Bhattacharya, Hrishikesh, Ph.D.  The University of Texas at Austin. 2012: 118 pages; 3572873.
2.
Performance analysis of software and hardware based firewalls against DDoS attacks
by Agus, Ruben, M.S.  California State University, Long Beach. 2014: 66 pages; 1568899.
4.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
5.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
6.
Wildfire-traversal of network address translation routers to provide end-to-end connectivity to firewalled hosts
by Casaburi, James D., M.S.  California State University, Long Beach. 2010: 78 pages; 1486538.
9.
Application of SIEM/UEBA/SOAR/SOC (Cyber SUSS) Concepts on MSCS 6560 Computer Lab
by Singh, Kunal, M.S.  Marquette University. 2020: 82 pages; 28029141.
10.
11.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
12.
Scalable, fault -tolerant management of grid services: Application to messaging middleware
by Gadgil, Harshawardhan, Ph.D.  Indiana University. 2007: 164 pages; 3274256.
14.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
15.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
16.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
17.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
18.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
19.
Organizational conflicts of interest rules: Reform—A proposed way forward
by Golden, Lisa Marie, LL.M.  The George Washington University. 2010: 61 pages; 1515349.
20.
IslaNet: An isolated and secure approach to implementing computer networking laboratories
by Cruz-Zendejas, Rogelio, M.S.  California State University, Long Beach. 2013: 121 pages; 1527541.
23.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
24.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
25.
Leveraging Internet Background Radiation for Opportunistic Network Analysis
by Benson, Karyn, Ph.D.  University of California, San Diego. 2016: 278 pages; 10161733.
26.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
27.
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
by Nwankwo, Mercy Ikhuoria, D.I.T.  Walden University. 2020: 273 pages; 28150989.
29.
30.
Fusia: Future situation and impact awareness
by Holsopple, Jared, Ph.D.  State University of New York at Buffalo. 2016: 193 pages; 10127757.
1 - 30 of 381 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest