Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19049 open access dissertations and theses found for:
if(Security)  »   Refine Search
121.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
122.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
123.
A Case Study in Safety Engineering Processes for Security Engineering Use
by Hall, Jeffery, D.Sc.  Capitol Technology University. 2018: 165 pages; 27835541.
124.
A three tier security system with mobile sinks in wireless sensor networks
by Pebbeti, Mounika, M.S.  California State University, Long Beach. 2016: 51 pages; 10007409.
125.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
126.
127.
Smoking and violence: An exploratory study within a maximum security forensic institution
by Cryns, Yvonne Lapp, M.S.N.  California State University, Long Beach. 2011: 84 pages; 1493106.
128.
India as a Model for Environmental Security: The Lynchpin of South Asia
by Jarvis, Teresa Marie, M.S.  Villanova University. 2019: 159 pages; 27735666.
129.
Evaluation of security methods for the prevention of malware on mobile devices
by Giacalone, Anthony S., M.S.  California State University, Long Beach. 2014: 87 pages; 1527936.
130.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
132.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
133.
The Process of Foreseeing: A Case Study of National Security Strategy Development
by Morgan, Brian, Ed.D.  The George Washington University. 2016: 213 pages; 3733631.
134.
Technology transfer and U.S. national security policy: The Joint Strike Fighter
by Krueger, Richard D., Ph.D.  George Mason University. 2010: 360 pages; 3421719.
136.
Assessing the Influence of Building Geometry on Active Shooter Event Outcomes
by Dane, Kristopher R., D.Engr.  The George Washington University. 2018: 115 pages; 10841977.
138.
Chasing the Climate Change Momentum: Linking DOD's Operational Energy Program Recommendations for the Department of Defense
by Didawick, Holly Higgins, LL.M.  The George Washington University. 2019: 71 pages; 13883074.
139.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
140.
Marital history and retirement security: An empirical analysis of the work, family, and gender relationship
by Palmer, Lauren A. Martin, Ph.D.  University of Massachusetts Boston. 2015: 210 pages; 10010752.
141.
144.
Counter-Radicalization: An Analysis on Violent Extremist Ideologies
by Ayres, Jolene M., D.S.S.  National American University. 2018: 199 pages; 13807573.
146.
147.
Do warrants lead the underlying stocks and index futures?
by Kui, Lin Ying, M.Sc.  Singapore Management University (Singapore). 2008: 89 pages; 1483220.
148.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
150.
Human Trafficking: Flying under the Radar
by Hulsey, Amber Lee, Ph.D.  The University of Southern Mississippi. 2018: 239 pages; 10752077.
121 - 150 of 19049 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest