Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17039 open access dissertations and theses found for:
if(Security)  »   Refine Search
151.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
152.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
153.
Convergence – A Homeland Security and Educational Problem: A Mixed Methodological Study
by Ippolito, Steven Christopher, Ph.D.  Northcentral University. 2017: 495 pages; 10624690.
156.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
158.
159.
160.
Core versus peripheral positions: An integrated model
by Jiang, Lixin, Ph.D.  Washington State University. 2013: 170 pages; 3587112.
161.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
163.
The Case for Engagement: Building a Framework and Policy to Move U.S.-Iranian Relations Forward
by West, Graham F., M.A.  The George Washington University. 2016: 128 pages; 10159048.
166.
Core Flight System Cryptography Library
by Lucas, John Patrick, M.S.  West Virginia University. 2017: 115 pages; 10268719.
168.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
169.
Architectures for secure cloud computing servers
by Szefer, Jakub M., Ph.D.  Princeton University. 2013: 355 pages; 3597568.
170.
Data governance: The missing approach to improving data quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
171.
Counterterrorism Policy towards Boko Haram in Nigeria during 2009-2015
by Ojelade, Steve Olufemi, Ph.D.  Walden University. 2018: 230 pages; 10982497.
173.
Implicit Counterinsurgency: Media, Development and Security in Afghanistan
by Zevely, Nicholas Ross, M.A.  The George Washington University. 2016: 73 pages; 10126151.
174.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
175.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, Dr.sc.  Capitol Technology University. 2014: 243 pages; 3692148.
176.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
177.
Security system with motion detection and face recognition
by Patel, Ravi L., M.S.  California State University, Long Beach. 2017: 40 pages; 10251645.
178.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
180.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
151 - 180 of 17039 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest