Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47450 open access dissertations and theses found for:
if(IT Security)  »   Refine Search
63.
Do it My Way, it Will Be Easier on the Both of Us: "Changing the Learning"
by Fanizzo, William J., D.B.A.  Argosy University/Schaumburg (Chicago Northwest). 2013: 100 pages; 10757178.
64.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
65.
Cell phone contraband in Georgia prison: How dangerous is it?
by Williams, Angela, D.M.IST.  University of Phoenix. 2014: 116 pages; 3691996.
66.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
67.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
68.
Social presence: What is it? How do we measure it?
by Lowenthal, Patrick Ryan, Ph.D.  University of Colorado at Denver. 2012: 187 pages; 3506428.
70.
Implementing Sustainability: The Factors That Drive It and the Perspectives That Thrive in It
by Stoughton, Anne Marie, Ph.D.  Benedictine University. 2011: 283 pages; 3488561.
71.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
73.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
75.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
77.
A Grassroots Approach to Peace and Security in West Africa
by Block, Lisa, M.A.  The American University of Paris (France). 2013: 114 pages; 10305824.
78.
The effects of experimentally induced attachment security on children's fear reactions
by Stupica, Brandi Shawn, Ph.D.  University of Maryland, College Park. 2012: 242 pages; 3543490.
79.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
80.
Maternal health policy: Nursing's legacy and the Social Security Act of 1935
by Pope, Bonnie L., Ph.D.  Florida Atlantic University. 2011: 164 pages; 3462566.
82.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
84.
If It Isn't Broke, Don't Fix It - Evidence of Financial Socialization of Children
by Hill, Nicolette, M.A.  California State University, Fullerton. 2017: 100 pages; 10260182.
85.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
86.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
87.
Interagency Coordination of Security Operations at a Large U.S. Seaport
by Levy, Edmund B., Ph.D.  Walden University. 2015: 150 pages; 3705026.
88.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
89.
The Role of Relationship Building in a United States National Security Strategy for the Asia Pacific
by Paz y Mino, Jonathan D., M.A.  The American University of Paris (France). 2013: 66 pages; 10305828.
90.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
61 - 90 of 47450 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest