Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17248 open access dissertations and theses found for:
if(Security)  »   Refine Search
121.
Efficient optimization algorithms for pricing energy derivatives and standard vanilla options
by Ryabchenko, Valeriy V., Ph.D.  University of Florida. 2008: 136 pages; 3381472.
122.
School Security: A Study of Existing Measures and Plausible Solutions to Better Secure Students
by Julius, Jonathon D., Ph.D.  Indiana State University. 2019: 121 pages; 13812795.
124.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
125.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
126.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
128.
National decision making and nuclear fuel cycles: An analysis of influences
by Platte, James Edward, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 299 pages; 3559057.
129.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
130.
132.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
133.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
134.
Transboundary agreement: Case studies of marine mammal management in the bering strait
by Aho, Kelsey B., M.A.  University of Alaska Fairbanks. 2016: 165 pages; 10245619.
135.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
136.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
137.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
138.
140.
Africa as a laboratory for the US Light-Footprint Strategy: How the US preserves its interests in Africa today
by Matton, Jean-Baptiste, M.A.  The American University of Paris (France). 2014: 82 pages; 10305853.
141.
Security and foreign policy of landlocked states
by Mahdi, Samiullah, M.A.  University of Massachusetts Boston. 2016: 111 pages; 10160222.
142.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
143.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
144.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
145.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
146.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
147.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
148.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
150.
121 - 150 of 17248 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest