Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
18026 open access dissertations and theses found for:
if(Security)  »   Refine Search
214.
Citizen Security and Democratization in Latin America: Implications of Law Enforcement Reforms and Demilitarization
by Gutiérrez-Merino, Fernanda A., M.A.  The University of Mississippi. 2017: 59 pages; 10615483.
216.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
217.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
218.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
219.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
220.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
221.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
222.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
224.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
225.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
226.
227.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
228.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
229.
Perceptions of school violence: School personnel views of violent behavior and preparedness
by Henriques, Jeanine M., Ph.D.  Capella University. 2010: 128 pages; 3433745.
231.
Efficient optimization algorithms for pricing energy derivatives and standard vanilla options
by Ryabchenko, Valeriy V., Ph.D.  University of Florida. 2008: 136 pages; 3381472.
232.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
233.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
234.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
235.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
238.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
240.
211 - 240 of 18026 displayed.
« First < Previous |   5    6    7    8    9    10    11    12    13    14    15   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest