Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
10992 open access dissertations and theses found for:
if(Network-level security and protection)  »   Refine Search
1.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
2.
3.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
4.
Toward Automated Worldwide Monitoring of Network-Level Censorship
by Weinberg, Zachary, Ph.D.  Carnegie Mellon University. 2018: 112 pages; 13425933.
5.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
9.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
11.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
12.
Professional certification: Does the security industry need a new yardstick?
by Mathews, Timothy J., D.Sc.  New Jersey City University. 2015: 282 pages; 3730746.
13.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
14.
Stress Reduction Strategies for Improving Private Security Officer Performance
by Al-Mulla, Khalil I., D.B.A.  Walden University. 2018: 160 pages; 13427945.
15.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
17.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
18.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
19.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
20.
Client-centric Privacy Protection For Location-based Services
by Pingley, Aniket, D.Sc.  The George Washington University. 2011: 185 pages; 3469606.
21.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
24.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
25.
In the Name of Homeland Security: A Legal History of Post-9/11 Labor Policy at US Customs
by Marquis, Arthur-David, M.A.  State University of New York Empire State College. 2017: 78 pages; 10256835.
26.
Estimating the Fiscal Impacts of the Homeland Security Grants on State and Local Public Safety Spending
by Kirschner, Charlotte L., Ph.D.  The George Washington University. 2012: 256 pages; 3474049.
29.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
30.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
1 - 30 of 10992 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest