Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17941 open access dissertations and theses found for:
if(Security)  »   Refine Search
61.
Chasing the Climate Change Momentum: Linking DOD's Operational Energy Program Recommendations for the Department of Defense
by Didawick, Holly Higgins, LL.M.  The George Washington University. 2019: 71 pages; 13883074.
62.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
64.
Stress Reduction Strategies for Improving Private Security Officer Performance
by Al-Mulla, Khalil I., D.B.A.  Walden University. 2018: 160 pages; 13427945.
65.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
66.
Marital history and retirement security: An empirical analysis of the work, family, and gender relationship
by Palmer, Lauren A. Martin, Ph.D.  University of Massachusetts Boston. 2015: 210 pages; 10010752.
67.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
69.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
70.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
71.
Estimating the Fiscal Impacts of the Homeland Security Grants on State and Local Public Safety Spending
by Kirschner, Charlotte L., Ph.D.  The George Washington University. 2012: 256 pages; 3474049.
75.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
77.
Detecting attacks in building automation system
by Nama, Sumanth, M.S.  California State University, Long Beach. 2015: 45 pages; 1597784.
78.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
79.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
80.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
81.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
82.
National security and transparency: The legal frameworks and factors federal courts use to balance competing democratic values
by Silver, Derigan A., Ph.D.  The University of North Carolina at Chapel Hill. 2009: 323 pages; 3352712.
83.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
84.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
85.
Mitigating Privilege Escalation
by Brookes, Scott, Ph.D.  Dartmouth College. 2018: 215 pages; 10822683.
86.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
87.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
89.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
90.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
61 - 90 of 17941 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest