Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
18017 open access dissertations and theses found for:
if(Security)  »   Refine Search
481.
Unconventional warfare in U.S. foreign policy: U.S. support of insurgencies in Afghanistan, Nicaragua, and Iraq from 1979-2001
by Linnington, Abigail T., Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 367 pages; 3559052.
482.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
484.
Balancing belligerents or feeding the beast: Transforming conflict traps
by Hayden, Nancy K., Ph.D.  University of Maryland, College Park. 2016: 474 pages; 10130005.
485.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
486.
No one in charge: A new theory of coordination and an analysis of US civil-military coordination in Afghanistan 2001–2009
by Strimling Yodsampa, Andrea, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 412 pages; 3465447.
491.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
492.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
493.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
494.
Removing a Thorn with a Thorn: Evaluating India's Use of Militias in Counterinsurgency
by Prasad, Hari, M.A.  The George Washington University. 2017: 200 pages; 10283726.
495.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
496.
497.
498.
The Responsibility to Protect Doctrine (R2P)
by Kine, Fatou, M.A.  The American University of Paris (France). 2014: 83 pages; 10305887.
499.
Developing Online Trust in Electronic Commerce: A Generational Cohort Study in Puerto Rico
by López Rivera, Ibrahim, D.B.A.  Universidad del Turabo (Puerto Rico). 2016: 119 pages; 10279353.
500.
From anarchy to confederacy: A theory of international politics
by Snyder, Quddus Z., Ph.D.  University of Maryland, College Park. 2010: 189 pages; 3409878.
501.
A Neoclassical Realist's Analysis of Sino-U.S. Space Policy
by Fabian, Christopher David, M.S.  The University of North Dakota. 2019: 184 pages; 13880083.
502.
504.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
505.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
506.
Navigating the gaze: Young people's intimate knowledge with surveilled spaces at school
by Krueger, Patricia, Ph.D.  City University of New York. 2009: 325 pages; 3378666.
507.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
508.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
510.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
481 - 510 of 18017 displayed.
« First < Previous |   14    15    16    17    18    19    20    21    22    23    24   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest