Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
44374 open access dissertations and theses found for:
if(Security process maturity)  »   Refine Search
271.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
272.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
274.
Validating the Use of pPerformance Risk Indices for System-Level Risk and Maturity Assessments
by Holloman, Sherrica S., Ph.D.  The George Washington University. 2016: 192 pages; 10086217.
275.
Discrete time stochastic volatility model
by Tang, Guojing, Ph.D.  University of Maryland, College Park. 2009: 99 pages; 3359756.
276.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
277.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
278.
Effective Strategies for Managing the Outsourcing of Information Technology
by Hopwood, Marsha, D.B.A.  Walden University. 2018: 205 pages; 10837226.
279.
Counterterrorism Policy towards Boko Haram in Nigeria during 2009-2015
by Ojelade, Steve Olufemi, Ph.D.  Walden University. 2018: 230 pages; 10982497.
280.
The Sarbanes -Oxley Act and the choice of bond market by foreign firms
by Gao, Yu, Ph.D.  The University of Chicago. 2007: 80 pages; 3272967.
282.
Armed for Arms Control? Presidents, Bureaucrats and the Role of Government Structure in Policymaking
by Dalton, Toby F., Ph.D.  The George Washington University. 2015: 502 pages; 3643434.
283.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
284.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
285.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
286.
A grounded theory of U.S. Army installation realignment and closure leadership characteristics
by Murray, Theresa Marie, D.M.  University of Phoenix. 2008: 363 pages; 3326209.
287.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
288.
Attributes effecting software testing estimation; is organizational trust an issue?
by Hammoud, Wissam, D.M.IST.  University of Phoenix. 2013: 172 pages; 3583478.
289.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
290.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
293.
295.
Parenting styles: Their impact on adolescent separation and college adjustment
by Rakipi, Sefedin, Psy.D.  Capella University. 2015: 154 pages; 3724897.
299.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
300.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
271 - 300 of 44374 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest