Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47420 open access dissertations and theses found for:
if(IT Security)  »   Refine Search
151.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
152.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
153.
Design Automation for Carbon Nanotube Circuits Considering Performance and Security Optimization
by Liu, Lin, Ph.D.  Michigan Technological University. 2017: 169 pages; 10267186.
154.
Credibility in Crises: The Role of Leadership Beliefs in State Threat Assessments
by Macdonald, Julia Mary, Ph.D.  The George Washington University. 2016: 417 pages; 10150230.
155.
Environmental Impacts on Guam's Water Security and Sustainable Management of the Resource
by Khalaj-Teimoury, Masoud, Ph.D.  University of Alaska Fairbanks. 2018: 76 pages; 10787879.
156.
School Security: A Study of Existing Measures and Plausible Solutions to Better Secure Students
by Julius, Jonathon D., Ph.D.  Indiana State University. 2019: 121 pages; 13812795.
157.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
158.
Security system with motion detection and face recognition
by Patel, Ravi L., M.S.  California State University, Long Beach. 2017: 40 pages; 10251645.
159.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
160.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
161.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
163.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
164.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
165.
China Study: Emerging Challenges in Social Security, Health Care, and Leadership: Volume II
by Huff, Patrick D., Ed.D.  Pepperdine University. 2019: 443 pages; 13812642.
166.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
167.
168.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
169.
Counter-Radicalization: An Analysis on Violent Extremist Ideologies
by Ayres, Jolene M., D.S.S.  National American University. 2018: 199 pages; 13807573.
170.
Energy Security and Japan-China Relations: Competition or Cooperation?
by Minoura, Haruna, M.A.  The George Washington University. 2011: 222 pages; 1496651.
171.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
172.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
173.
Thailand's energy security: Strategic Petroleum Reserve and its economic impacts
by Leesombatpiboon, Poonpat, Ph.D.  The George Washington University. 2010: 257 pages; 3403306.
174.
Public-key cryptography security-based analysis of the underlying intractable problems
by Al Khulaif, Husain H., M.S.  University of Colorado at Denver. 2013: 143 pages; 1549537.
176.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
177.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
179.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
180.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
151 - 180 of 47420 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest