Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19026 open access dissertations and theses found for:
if(Security)  »   Refine Search
242.
Securing the use of sensitive data on remote devices using a hardware-software architecture
by Dwoskin, Jeffrey Scott, Ph.D.  Princeton University. 2010: 249 pages; 3410991.
243.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
244.
Towards Secure and Usable Leakage-Resilient Password Entry
by Yan, Qiang, Ph.D.  Singapore Management University (Singapore). 2013: 138 pages; 3601350.
245.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
246.
Perceptions of school violence: School personnel views of violent behavior and preparedness
by Henriques, Jeanine M., Ph.D.  Capella University. 2010: 128 pages; 3433745.
247.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
248.
250.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
251.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
253.
Efficient optimization algorithms for pricing energy derivatives and standard vanilla options
by Ryabchenko, Valeriy V., Ph.D.  University of Florida. 2008: 136 pages; 3381472.
254.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
256.
Transboundary agreement: Case studies of marine mammal management in the bering strait
by Aho, Kelsey B., M.A.  University of Alaska Fairbanks. 2016: 165 pages; 10245619.
257.
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
by Wu, Hua, Ph.D.  The George Washington University. 2020: 248 pages; 27666292.
258.
Emergency Management Standards for NCAA Division I-A Football Stadia
by Hoogstra, Joshua R., Ph.D.  Walden University. 2012: 210 pages; 3543035.
259.
Africa as a laboratory for the US Light-Footprint Strategy: How the US preserves its interests in Africa today
by Matton, Jean-Baptiste, M.A.  The American University of Paris (France). 2014: 82 pages; 10305853.
260.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
262.
263.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
264.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
265.
Securing Secrets and Managing Trust in Modern Computing Applications
by Sayler, Andy, Ph.D.  University of Colorado at Boulder. 2016: 212 pages; 10108746.
267.
National decision making and nuclear fuel cycles: An analysis of influences
by Platte, James Edward, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 299 pages; 3559057.
269.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
270.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
241 - 270 of 19026 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest