Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17532 open access dissertations and theses found for:
if(Security)  »   Refine Search
301.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
302.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
305.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
306.
No one in charge: A new theory of coordination and an analysis of US civil-military coordination in Afghanistan 2001–2009
by Strimling Yodsampa, Andrea, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 412 pages; 3465447.
307.
310.
Developing Online Trust in Electronic Commerce: A Generational Cohort Study in Puerto Rico
by López Rivera, Ibrahim, D.B.A.  Universidad del Turabo (Puerto Rico). 2016: 119 pages; 10279353.
311.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
312.
From anarchy to confederacy: A theory of international politics
by Snyder, Quddus Z., Ph.D.  University of Maryland, College Park. 2010: 189 pages; 3409878.
313.
The Responsibility to Protect Doctrine (R2P)
by Kine, Fatou, M.A.  The American University of Paris (France). 2014: 83 pages; 10305887.
316.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
317.
319.
320.
A Neoclassical Realist's Analysis of Sino-U.S. Space Policy
by Fabian, Christopher David, M.S.  The University of North Dakota. 2019: 184 pages; 13880083.
321.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
322.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
323.
324.
Removing a Thorn with a Thorn: Evaluating India's Use of Militias in Counterinsurgency
by Prasad, Hari, M.A.  The George Washington University. 2017: 200 pages; 10283726.
325.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
328.
Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages: The Case of Bangladesh
by Berg, Claudia N., Ph.D.  The George Washington University. 2014: 165 pages; 3609079.
301 - 330 of 17532 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest