Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17248 open access dissertations and theses found for:
if(Security)  »   Refine Search
216.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
217.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
218.
Counter-Radicalization: An Analysis on Violent Extremist Ideologies
by Ayres, Jolene M., D.S.S.  National American University. 2018: 199 pages; 13807573.
220.
Do warrants lead the underlying stocks and index futures?
by Kui, Lin Ying, M.Sc.  Singapore Management University (Singapore). 2008: 89 pages; 1483220.
221.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
222.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
223.
224.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
225.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
226.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
227.
228.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
229.
Credibility in Crises: The Role of Leadership Beliefs in State Threat Assessments
by Macdonald, Julia Mary, Ph.D.  The George Washington University. 2016: 417 pages; 10150230.
230.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
231.
Internet Protocol version Six (IPv6) at UC Davis: Traffic Analysis with a Security Perspective
by Ard, Julia Boxwell, M.S.  University of California, Davis. 2012: 115 pages; 1519649.
232.
Analyzing the impact of job dissatisfaction among social workers in managed care
by Hooper, Tina L., Ph.D.  Capella University. 2016: 106 pages; 10164284.
233.
Hegemonic ambition: Offensive Realist Prescriptions for Regional Hegemons in External Regio
by Cantelmo, Robert G., M.A.  The George Washington University. 2015: 80 pages; 10002419.
236.
When Control Becomes Constraint: Organizations and the Transitional Occupation of Iraq
by Caan, Christina, Ph.D.  The George Washington University. 2014: 222 pages; 3609080.
237.
Modularizing crosscutting concerns in software
by Saigal, Nalin, Ph.D.  University of South Florida. 2011: 70 pages; 3449499.
238.
The Economic Opportunities of Retirement Migration in Central America and the Caribbean
by Legister, Calvester, D.P.S.  Pace University. 2016: 236 pages; 13421642.
239.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
240.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
211 - 240 of 17248 displayed.
« First < Previous |   5    6    7    8    9    10    11    12    13    14    15   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest