Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17736 open access dissertations and theses found for:
if(Security)  »   Refine Search
31.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
32.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
35.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
38.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
39.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
40.
The politics of deservingness: Discourses of gender, race, *class, and age in the 2005 Social Security debates
by Beechey, Susanne N., Ph.D.  The George Washington University. 2008: 258 pages; 3297154.
43.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
44.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
45.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
47.
Intelligence Sharing in the European Union
by Socias, Marc, M.A.  The American University of Paris (France). 2010: 84 pages; 10305791.
48.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
50.
Distributed Security Paradigm for Resource-constrained Wireless Sensors in the Context of Internet of Things (IoT)
by Iqbal, Muhammad Aamir, Ph.D.  University of Louisiana at Lafayette. 2017: 130 pages; 10254391.
51.
Maternal health policy: Nursing's legacy and the Social Security Act of 1935
by Pope, Bonnie L., Ph.D.  Florida Atlantic University. 2011: 164 pages; 3462566.
52.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
53.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
55.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
59.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
60.
Chasing the Climate Change Momentum: Linking DOD's Operational Energy Program Recommendations for the Department of Defense
by Didawick, Holly Higgins, LL.M.  The George Washington University. 2019: 71 pages; 13883074.
31 - 60 of 17736 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest