Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47450 open access dissertations and theses found for:
if(IT Security)  »   Refine Search
122.
Implicit Counterinsurgency: Media, Development and Security in Afghanistan
by Zevely, Nicholas Ross, M.A.  The George Washington University. 2016: 73 pages; 10126151.
123.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
124.
Security and foreign policy of landlocked states
by Mahdi, Samiullah, M.A.  University of Massachusetts Boston. 2016: 111 pages; 10160222.
126.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
128.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
129.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
130.
The politics of deservingness: Discourses of gender, race, *class, and age in the 2005 Social Security debates
by Beechey, Susanne N., Ph.D.  The George Washington University. 2008: 258 pages; 3297154.
131.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
132.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
133.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
134.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
135.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
136.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
137.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
138.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
141.
Chasing the Climate Change Momentum: Linking DOD's Operational Energy Program Recommendations for the Department of Defense
by Didawick, Holly Higgins, LL.M.  The George Washington University. 2019: 71 pages; 13883074.
142.
145.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
146.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
147.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
149.
150.
Technology transfer and U.S. national security policy: The Joint Strike Fighter
by Krueger, Richard D., Ph.D.  George Mason University. 2010: 360 pages; 3421719.
121 - 150 of 47450 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest