Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
30876 open access dissertations and theses found for:
if(Network security)  »   Refine Search
211.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
213.
A multi-channel defense against communication denial -of -service attacks in wireless networks
by Alnifie, Ghada Matooq, Ph.D.  George Mason University. 2008: 165 pages; 3338544.
214.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
215.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
216.
Routing in the dark: Pitch black
by Evans, Nathan S., M.S.  University of Denver. 2009: 84 pages; 1465595.
217.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
218.
Defining the International Accounting Standard Board's governance network
by Rossman, Patricia A., Ph.D.  Walden University. 2009: 176 pages; 3366983.
219.
Computational REST: A new model for decentralized, Internet-scale applications
by Erenkrantz, Justin Ryan, Ph.D.  University of California, Irvine. 2009: 208 pages; 3372349.
220.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
222.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
223.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
224.
Benchmarks for Evaluating Anomaly-Based Intrusion Detection Solutions
by Miller, Nicholas J., M.S.  California State University, Long Beach. 2018: 30 pages; 10752128.
225.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
226.
Multi-sensor-based occupancy monitoring for energy efficient smart buildings based on internet of things
by Pradeep Kumar, Harshvardhan, M.S.  California State University, Long Beach. 2016: 28 pages; 10096079.
227.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
229.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
230.
A uses and gratifications study of niche social network sites
by Weir, Shilo, M.A.  University of Missouri - Columbia. 2014: 89 pages; 10180884.
231.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
232.
Protecting Privacy of Data in the Internet of Things with Policy Enforcement Fog Module
by Al-Hasnawi, Abduljaleel, Ph.D.  Western Michigan University. 2018: 130 pages; 13877008.
233.
Interagency Coordination of Security Operations at a Large U.S. Seaport
by Levy, Edmund B., Ph.D.  Walden University. 2015: 150 pages; 3705026.
234.
Transnational, Trans-Sectarian Engagement: A Revised Approach to U.S. Public Diplomacy toward Lebanon
by Trent, Deborah Lee, Ph.D.  The George Washington University. 2012: 379 pages; 3524305.
235.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
236.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
238.
239.
Developing 21st century skills through the use of student personal learning networks
by Miller, Robert D., Ed.D.  Northcentral University. 2009: 191 pages; 3383118.
240.
211 - 240 of 30876 displayed.
« First < Previous |   5    6    7    8    9    10    11    12    13    14    15   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest