Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
44374 open access dissertations and theses found for:
if(Security process maturity)  »   Refine Search
61.
Quality assurance strategies for the organization in transition
by Leclair, Marc A., M.S.  California State University, Dominguez Hills. 2008: 92 pages; 1455368.
62.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
63.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
64.
Integrate or Innovate: Controlling Schedule Risk in Major Defense Acquisition Programs
by Manuel, Daniel G., Jr., D.Engr.  The George Washington University. 2019: 118 pages; 13420282.
65.
Improving Enterprise Data Governance Through Ontology and Linked Data
by DeStefano, R.J., D.P.S.  Pace University. 2016: 150 pages; 10097925.
66.
Functional Regressions for General Exponential Families: A Theoretical and Applied Study
by Dou, Wei, Ph.D.  Yale University. 2010: 116 pages; 3440627.
68.
70.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
72.
Integrating Immature Systems and Program Schedule Growth
by Kamp, John C., D.Engr.  The George Washington University. 2019: 116 pages; 10979355.
73.
The effects of leadership roles on e-government performance in Oman
by Al-Bulushi, Yaqoob Dur Mohammed, DM/IST  University of Phoenix. 2017: 212 pages; 10260914.
74.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
75.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
76.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
78.
Understanding the Value of Enterprise Architecture for Organizations: A Grounded Theory Approach
by Nassiff, Edwin, Ph.D.  Nova Southeastern University. 2012: 134 pages; 3523496.
79.
What explains Credit default swaps bid-ask spread?
by Chen, Yaru, M.Sc.  Singapore Management University (Singapore). 2008: 69 pages; 1483216.
81.
On the Calibration of the LIBOR Market Model
by Lagunzad, Demelinda U., M.Sc.  Singapore Management University (Singapore). 2007: 95 pages; 1483217.
82.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
83.
Fixed -income portfolio construction via simulation and stochastic programming
by Diaco, Anthony Joseph, Ph.D.  Stanford University. 2009: 126 pages; 3343952.
85.
Data-Driven Decision Making as a Tool to Improve Software Development Productivity
by Brown, Mary Erin, Ph.D.  Walden University. 2013: 242 pages; 3591716.
86.
The ones who hold the world: Career choice process of Asian American first-generation college students
by Fujii, Allison M., M.S.  California State University, Long Beach. 2012: 137 pages; 1517626.
88.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
89.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
61 - 90 of 44374 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest