Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17248 open access dissertations and theses found for:
if(Security)  »   Refine Search
181.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, D.Sc.  Capitol Technology University. 2014: 243 pages; 3741052.
183.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
184.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
185.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
186.
Unemployment Compensation: Coverage in the Federal-State System, 1935-1976
by Dempsey Chronister, Christina, M.A.  The George Washington University. 2012: 136 pages; 1510567.
187.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
188.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
189.
Information technology-related operational risk: An empirical study
by Goldstein, James Charles, Jr., Ph.D.  Syracuse University. 2009: 164 pages; 3410001.
190.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
191.
Secure Mobile Deployment of NFL Training Materials
by Corris, Alexander Grosholz, Ph.D.  Nova Southeastern University. 2014: 93 pages; 3642884.
192.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
193.
Implicit Counterinsurgency: Media, Development and Security in Afghanistan
by Zevely, Nicholas Ross, M.A.  The George Washington University. 2016: 73 pages; 10126151.
194.
Security system with motion detection and face recognition
by Patel, Ravi L., M.S.  California State University, Long Beach. 2017: 40 pages; 10251645.
195.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
198.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
199.
200.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
201.
FHIR: Cell-Level Security and Real Time Access with Accumulo
by Ruiz, Daniel Alfonso, M.S.  University of Colorado at Colorado Springs. 2016: 55 pages; 10108817.
202.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
204.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
206.
A framework for enforcing information flow policies
by Mital, Bhuvan, M.S.  State University of New York at Stony Brook. 2010: 70 pages; 1477837.
207.
The U.S. Army and nation -building: Explaining divergence in effective military innovation
by Patterson, Rebecca Damm, Ph.D.  The George Washington University. 2009: 350 pages; 3366200.
208.
A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
by Johnston, Reuben Aaron, Ph.D.  The George Washington University. 2018: 205 pages; 10828524.
209.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
181 - 210 of 17248 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest