Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17575 open access dissertations and theses found for:
if(Security)  »   Refine Search
662.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
663.
664.
Exploration of Complexities for Migration of Software-Licensing Models
by Mulchahey, Kenneth E., D.B.A.  Capella University. 2019: 157 pages; 13806407.
665.
Photo forensics from partial constraints
by Kee, Eric, Ph.D.  Dartmouth College. 2013: 124 pages; 3613660.
666.
667.
The legal-military dilemma in the response to international terrorism
by Allan, Matthew Wesley, Ph.D.  Texas A&M University. 2009: 253 pages; 3400678.
669.
Barriers to Knowledge Management in Saudi Arabia
by ALHussain, Ahmed Z., D.Sc.  The George Washington University. 2011: 213 pages; 3481091.
671.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
672.
Choosing materials for a writing center resource library in an ELL setting
by Baker, John R., Ph.D.  Indiana University of Pennsylvania. 2013: 437 pages; 3558065.
676.
The limits of détente: The United States, the Soviet Union, and the Arab-Israeli conflict, 1969–1973
by Daigle, Craig A., Ph.D.  The George Washington University. 2008: 420 pages; 3311383.
677.
The Big Payback: How Corruption Taints Offset Agreements in International Defense Trade
by Lambrecht, Ryan Jay, LL.M.  The George Washington University. 2012: 82 pages; 1531549.
679.
Infrastructure disaster management: Insight from small business leaders after a mega disaster
by Griffey, Arlen M., D.B.A.  University of Phoenix. 2010: 169 pages; 3448395.
680.
Informational privacy protections: Do state laws offer public health leaders the flexibility they need?
by O'Connor, Jean C., Dr.P.H.  The University of North Carolina at Chapel Hill. 2009: 137 pages; 3387969.
681.
End user software product line support for smart spaces
by Tzeremes, Vasilios, Ph.D.  George Mason University. 2016: 287 pages; 10249280.
682.
The art of art theft retrieval
by Agama, Susana P., M.S./M.P.H.  California State University, Long Beach. 2016: 175 pages; 10096069.
683.
“One misstep could trigger a great war”: Operation RYAN, Able Archer 83, and the 1983 war scare
by Jones, Nathan Bennett, M.A.  The George Washington University. 2009: 67 pages; 1465450.
684.
The Relationship between Privacy Notice Formats and Consumer Disclosure Decisions: A Quantitative Study
by Carlton, Alexys Mercedes, D.B.A.  Northcentral University. 2019: 102 pages; 13856998.
685.
Cyber Physical System Modeling of Smart Charging Process
by Langschwager, Matthew T., M.S.  University of Louisiana at Lafayette. 2018: 98 pages; 13420593.
686.
Congruence x employment tenure: A study with transitioning youth with disabilities
by Castan, Juliana Unis, M.A.  University of Maryland, College Park. 2010: 77 pages; 1478117.
687.
Analysis Of Decision Factors For The Application Of Information Access Controls Within The Organization
by Foerster, Carl A., D.Sc.  The George Washington University. 2013: 165 pages; 3553953.
688.
Mechanisms for database intrusion detection and response
by Kamra, Ashish, Ph.D.  Purdue University. 2010: 144 pages; 3444799.
689.
The Evolution of Israeli-sub-Saharan Africa relations: The case of Guinea
by Tal, Deborah, M.A.  The American University of Paris (France). 2012: 72 pages; 10305822.
661 - 690 of 17575 displayed.
« First < Previous |   20    21    22    23    24    25    26    27    28    29    30   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest