Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17035 open access dissertations and theses found for:
if(Security)  »   Refine Search
301.
Removing a Thorn with a Thorn: Evaluating India's Use of Militias in Counterinsurgency
by Prasad, Hari, M.A.  The George Washington University. 2017: 200 pages; 10283726.
303.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
304.
305.
From anarchy to confederacy: A theory of international politics
by Snyder, Quddus Z., Ph.D.  University of Maryland, College Park. 2010: 189 pages; 3409878.
306.
The Responsibility to Protect Doctrine (R2P)
by Kine, Fatou, M.A.  The American University of Paris (France). 2014: 83 pages; 10305887.
307.
Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages: The Case of Bangladesh
by Berg, Claudia N., Ph.D.  The George Washington University. 2014: 165 pages; 3609079.
308.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
309.
310.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
311.
All-hazards and active shooter web-based training: Beneficial to the transportation security administration workforce
by Medina, Amira Jean, M.S.  California State University, Long Beach. 2016: 75 pages; 10096064.
316.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
320.
321.
322.
323.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
324.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
325.
Navigating the gaze: Young people's intimate knowledge with surveilled spaces at school
by Krueger, Patricia, Ph.D.  City University of New York. 2009: 325 pages; 3378666.
326.
An implementation of a multi-touch draw-a-secret password schema for windows-based computers
by Lichtenberger, Matthew, M.Eng.  University of Louisville. 2011: 89 pages; 1504201.
328.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
329.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
330.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
301 - 330 of 17035 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest