Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17039 open access dissertations and theses found for:
if(Security)  »   Refine Search
34.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
35.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
36.
The politics of deservingness: Discourses of gender, race, *class, and age in the 2005 Social Security debates
by Beechey, Susanne N., Ph.D.  The George Washington University. 2008: 258 pages; 3297154.
37.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
38.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
40.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
41.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
44.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
46.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
47.
Intelligence Sharing in the European Union
by Socias, Marc, M.A.  The American University of Paris (France). 2010: 84 pages; 10305791.
49.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
50.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
51.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
52.
Maternal health policy: Nursing's legacy and the Social Security Act of 1935
by Pope, Bonnie L., Ph.D.  Florida Atlantic University. 2011: 164 pages; 3462566.
53.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
56.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
58.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
59.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
31 - 60 of 17039 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest