Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
17737 open access dissertations and theses found for:
if(Security)  »   Refine Search
91.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
93.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
94.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
95.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
96.
The Role of Relationship Building in a United States National Security Strategy for the Asia Pacific
by Paz y Mino, Jonathan D., M.A.  The American University of Paris (France). 2013: 66 pages; 10305828.
98.
99.
In the Name of Homeland Security: A Legal History of Post-9/11 Labor Policy at US Customs
by Marquis, Arthur-David, M.A.  State University of New York Empire State College. 2017: 78 pages; 10256835.
100.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
101.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
102.
Citizen Security and Democratization in Latin America: Implications of Law Enforcement Reforms and Demilitarization
by Gutiérrez-Merino, Fernanda A., M.A.  The University of Mississippi. 2017: 59 pages; 10615483.
103.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
104.
Security and privacy in location-based mobile ad-hoc networks
by El Defrawy, Karim, Ph.D.  University of California, Irvine. 2010: 174 pages; 3422236.
105.
Side channel attack resistance: Migrating towards high level methods
by Borowczak, Mike, Ph.D.  University of Cincinnati. 2013: 183 pages; 3601397.
106.
107.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
108.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
109.
The role of African leafy vegetables in food security
by Croft, Marcia M., Ph.D.  Purdue University. 2016: 254 pages; 10245801.
110.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
111.
112.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
113.
114.
Religion, Peacebuilding, and Human Security in Africa (A Case Study of Jos Plateau State Nigeria)
by Enyiaka, Canice Chinyeaka, Ph.D.  Howard University. 2019: 275 pages; 13886819.
115.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
116.
Perceptions of school violence: School personnel views of violent behavior and preparedness
by Henriques, Jeanine M., Ph.D.  Capella University. 2010: 128 pages; 3433745.
117.
Statutory Response to Court Security Concerns
by Weller, Charles E., Ph.D.  University of Nevada, Reno. 2013: 169 pages; 3608800.
118.
Efficient optimization algorithms for pricing energy derivatives and standard vanilla options
by Ryabchenko, Valeriy V., Ph.D.  University of Florida. 2008: 136 pages; 3381472.
119.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
120.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
91 - 120 of 17737 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest