Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17342 open access dissertations and theses found for:
if(Security)  »   Refine Search
333.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
334.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
335.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
336.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
338.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
340.
Enabling User Space Secure Hardware
by Coughlin, Aimee, Ph.D.  University of Colorado at Boulder. 2018: 137 pages; 10791863.
341.
Correlating factors of the manager's decision to use Virtual Private Networks
by McEady, Erasmus W., Ph.D.  Capella University. 2009: 93 pages; 3366093.
342.
Navigating the gaze: Young people's intimate knowledge with surveilled spaces at school
by Krueger, Patricia, Ph.D.  City University of New York. 2009: 325 pages; 3378666.
343.
344.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
346.
The Effects of Organizational Agility on Transnational Crime in Jamaica
by King, Raymond, Ed.D.  St. Thomas University. 2015: 118 pages; 3738900.
348.
Crossroads in a Crisis: The Syrian Refugee Response in Lebanon
by Ngo, Catherine, M.A.  The American University of Paris (France). 2014: 71 pages; 13871608.
349.
Cell phone contraband in Georgia prison: How dangerous is it?
by Williams, Angela, D.M.IST.  University of Phoenix. 2014: 116 pages; 3691996.
350.
Collusion Preserving Computation
by Alwen, Joel, Ph.D.  New York University. 2011: 105 pages; 3482849.
351.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
352.
Patterns of dissaving among U.S. elders
by Gray, Deborah, Ph.D.  University of Massachusetts Boston. 2014: 168 pages; 3622193.
353.
Connectivity Between Two Distant Sites with Automatic Failover to IPsec
by Singh, Mankaran, M.S.  California State University, Long Beach. 2017: 39 pages; 10262849.
354.
Modeling and analyzing service-oriented enterprise architectural styles
by Tang, Longji, Ph.D.  The University of Texas at Dallas. 2011: 269 pages; 3494567.
355.
Forcible Regime Change, War, and Democracy
by Ohtsuki, Kazuto, Ph.D.  New York University. 2014: 143 pages; 3635286.
356.
A Novel Cooperative Intrusion Detection System for Mobile Ad Hoc Networks
by Solomon, Adam, Ph.D.  Nova Southeastern University. 2018: 242 pages; 13426423.
357.
Digital currency wallet for mobile devices
by Jose, Mamitha, M.S.  California State University, Long Beach. 2011: 102 pages; 1504486.
358.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
359.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
360.
A model of forensic analysis using goal-oriented logging
by Peisert, Sean Philip, Ph.D.  University of California, San Diego. 2007: 182 pages; 3246091.
331 - 360 of 17342 displayed.
« First < Previous |   9    10    11    12    13    14    15    16    17    18    19   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest