Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17248 open access dissertations and theses found for:
if(Security)  »   Refine Search
301.
No one in charge: A new theory of coordination and an analysis of US civil-military coordination in Afghanistan 2001–2009
by Strimling Yodsampa, Andrea, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2011: 412 pages; 3465447.
304.
307.
Cybersecurity of unmanned aircraft systems (UAS)
by Gomez, Cesar A., M.S.  Utica College. 2015: 70 pages; 1605296.
308.
Developing Online Trust in Electronic Commerce: A Generational Cohort Study in Puerto Rico
by López Rivera, Ibrahim, D.B.A.  Universidad del Turabo (Puerto Rico). 2016: 119 pages; 10279353.
309.
From anarchy to confederacy: A theory of international politics
by Snyder, Quddus Z., Ph.D.  University of Maryland, College Park. 2010: 189 pages; 3409878.
310.
The Responsibility to Protect Doctrine (R2P)
by Kine, Fatou, M.A.  The American University of Paris (France). 2014: 83 pages; 10305887.
312.
Towards usable end-user authentication
by Tanviruzzaman, Mohammad, Ph.D.  Marquette University. 2014: 138 pages; 3623762.
313.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
315.
316.
Removing a Thorn with a Thorn: Evaluating India's Use of Militias in Counterinsurgency
by Prasad, Hari, M.A.  The George Washington University. 2017: 200 pages; 10283726.
317.
319.
321.
Relativistic quantum cryptography
by Kaniewski, Jedrzej, Ph.D.  National University of Singapore (Singapore). 2015: 136 pages; 10006026.
323.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
324.
A method for automatically generating rules for a requires-provides security model of a system
by Orvis, William Snow, M.S.  University of California, Davis. 2009: 109 pages; 1470280.
325.
Traffic management between two locations across multiprotocol label switching backbone cloud with enhanced network security
by Rao, Ashish Rao Janardhan, M.S.  California State University, Long Beach. 2015: 86 pages; 1605182.
326.
327.
All-hazards and active shooter web-based training: Beneficial to the transportation security administration workforce
by Medina, Amira Jean, M.S.  California State University, Long Beach. 2016: 75 pages; 10096064.
328.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
329.
Impact of Microfinance on Food Security, Informal Credit, and Agricultural Wages: The Case of Bangladesh
by Berg, Claudia N., Ph.D.  The George Washington University. 2014: 165 pages; 3609079.
301 - 330 of 17248 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest