Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17951 open access dissertations and theses found for:
if(Security)  »   Refine Search
91.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
92.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
93.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
95.
96.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
97.
Do warrants lead the underlying stocks and index futures?
by Kui, Lin Ying, M.Sc.  Singapore Management University (Singapore). 2008: 89 pages; 1483220.
98.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
99.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
100.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
101.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
103.
104.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
105.
106.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
107.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
108.
109.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
110.
China Study: Emerging Challenges in Social Security, Health Care, and Leadership: Volume I
by Huff, Patrick D., Ed.D.  Pepperdine University. 2019: 415 pages; 13807532.
111.
112.
The Social Security retirement decision: Maximizing expected discounted worth
by Thompson, Gregory L., M.S.I.E.  Purdue University. 2011: 85 pages; 1501927.
113.
Smoking and violence: An exploratory study within a maximum security forensic institution
by Cryns, Yvonne Lapp, M.S.N.  California State University, Long Beach. 2011: 84 pages; 1493106.
114.
The Integration of China's Dual-track Social Security System and Its Impact
by Lingxiao, Luo, M.S.  National University of Singapore (Singapore). 2015: 44 pages; 10006057.
115.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
116.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
117.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
118.
Ensuring security and authentication using zero knowledge protocol in wireless sensor network applications
by Matta Veera Venkata, Sudheer, M.S.  California State University, Long Beach. 2015: 55 pages; 1604873.
119.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
120.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
91 - 120 of 17951 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest