Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17041 open access dissertations and theses found for:
if(Security)  »   Refine Search
122.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
123.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
125.
127.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
128.
Transboundary agreement: Case studies of marine mammal management in the bering strait
by Aho, Kelsey B., M.A.  University of Alaska Fairbanks. 2016: 165 pages; 10245619.
129.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
130.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
131.
Security and foreign policy of landlocked states
by Mahdi, Samiullah, M.A.  University of Massachusetts Boston. 2016: 111 pages; 10160222.
132.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
133.
National decision making and nuclear fuel cycles: An analysis of influences
by Platte, James Edward, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 299 pages; 3559057.
134.
135.
Africa as a laboratory for the US Light-Footprint Strategy: How the US preserves its interests in Africa today
by Matton, Jean-Baptiste, M.A.  The American University of Paris (France). 2014: 82 pages; 10305853.
136.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
138.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
139.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
140.
Reliable and Efficient Routing for Wireless Sensor Networks
by Sinha, Saket, M.S.  California State University, Long Beach. 2017: 55 pages; 10263570.
141.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
142.
144.
Energy and security aspects of wireless networks: Performance and tradeoffs
by Abuzainab, Nof, Ph.D.  University of Maryland, College Park. 2013: 207 pages; 3599933.
145.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
146.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
147.
Divorced women, poverty, and the Social Security Act: A policy analysis
by Schellenberg, Diana Lynne, M.S.W.  California State University, Long Beach. 2010: 56 pages; 1486525.
148.
149.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
150.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
121 - 150 of 17041 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest