Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
44433 open access dissertations and theses found for:
if(Security process maturity)  »   Refine Search
93.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
94.
An Analysis of Leader Life Calling and Organizational Mission Statements in CESA Schools
by Gelatt, Philip D., Ed.D.  Indiana Wesleyan University. 2014: 194 pages; 3716282.
95.
Servant leadership and transformational leadership in church organizations
by Scuderi, Noelle F., Ph.D.  The George Washington University. 2010: 274 pages; 3413541.
97.
Searching for silver: An examination of the physical and environmental characteristics of maturing American eels
by Mount, Sarah J., M.S.  State University of New York College of Environmental Science and Forestry. 2016: 170 pages; 10117994.
98.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
99.
Self-authorship in undergraduate students in a blended-learning multicultural course
by Abel, Vicki Ziegler, M.S.  Iowa State University. 2011: 126 pages; 1494631.
100.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
102.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
104.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
105.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
106.
107.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
108.
The data narrativist: Leading analytics organizations in value creation using data driven communication
by Bradbury, Judd D., Ph.D.  The University of Texas at Dallas. 2016: 164 pages; 10113850.
109.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
111.
Identification of Supply Chain Cost Drivers in Primary Care in the United States
by Essila Mvogo, Jean Clement, D.Engr.  The George Washington University. 2018: 96 pages; 10688299.
112.
An Evaluation of the Emotionally Healthy Spirituality Course at Community Alliance Church, Butler, Pennsylvania
by Ammerman, James D., D.Min.  Nyack College, Alliance Theological Seminary. 2018: 145 pages; 10746848.
114.
Critical thinking, metacognition, and epistemological beliefs
by Wyre, Steven Henry, Ed.D.  University of Phoenix. 2007: 164 pages; 3285587.
115.
Pre-harvest Glyphosate Effects on Properties of Beta-glucan from Oat Groats
by Alahmed, Abdulrahman Khalid Yousef, M.S.  North Dakota State University. 2019: 61 pages; 13904421.
116.
What Do Work Value Differentiation and Profile Elevation Predict?
by Chi, Jinhao, M.A.  The University of Southern Mississippi. 2017: 92 pages; 10638184.
120.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
91 - 120 of 44433 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest