Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
20878 open access dissertations and theses found for:
if(Security maturity)  »   Refine Search
121.
Language and the formation of masculine potency in Peruvian Aymara boyhood
by Smith, Benjamin, Ph.D.  The University of Chicago. 2011: 260 pages; 3445051.
122.
Career decision-making process of second-generation Filipina American college students
by Encarnacion, Stefanie F., M.S.  California State University, Long Beach. 2010: 181 pages; 1486635.
123.
The Depositional Environment and Thermal Maturity of the Upper Wolfcamp Formation in Crockett County, TX
by Helm, Jolie M., M.S.  University of Louisiana at Lafayette. 2015: 80 pages; 10003711.
124.
Impact of Planting Date and Maturity Group on Management Strategies for Insect Pests in Soybean
by Bateman, Nicholas Ryan, Ph.D.  Mississippi State University. 2017: 175 pages; 10264792.
125.
An examination of the credit rating industry
by Schorno, Patrick Jason, Ph.D.  The University of North Carolina at Charlotte. 2013: 99 pages; 3594083.
129.
Three essays on the evolution of government domestic debt in the emerging market countries
by Guscina, Anastasia, Ph.D.  The George Washington University. 2010: 175 pages; 3389403.
130.
Switching sides: Political power, alignment, and alliances in post-Saddam Iraq
by Maye, Diane L., Ph.D.  George Mason University. 2015: 229 pages; 10027447.
131.
Effect of hot water immersion treatment (HWT) on the quality of 'Keitt' mangoes in Ghana
by Sebe, Akua Tiwaa, M.S.  Mississippi State University. 2016: 42 pages; 10100282.
132.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
135.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
137.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
139.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
140.
Life-history and energetics of the diamond-backed watersnake
by Chamberlain, Jeremy David, Ph.D.  University of Arkansas at Little Rock. 2016: 121 pages; 10195147.
141.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
142.
The politics of deservingness: Discourses of gender, race, *class, and age in the 2005 Social Security debates
by Beechey, Susanne N., Ph.D.  The George Washington University. 2008: 258 pages; 3297154.
143.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
145.
Integrate or Innovate: Controlling Schedule Risk in Major Defense Acquisition Programs
by Manuel, Daniel G., Jr., D.Engr.  The George Washington University. 2019: 118 pages; 13420282.
147.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
148.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
149.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
121 - 150 of 20878 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest