Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19026 open access dissertations and theses found for:
if(Security)  »   Refine Search
301.
When Control Becomes Constraint: Organizations and the Transitional Occupation of Iraq
by Caan, Christina, Ph.D.  The George Washington University. 2014: 222 pages; 3609080.
303.
Architecture and protocols for a high-performance, secure IEEE 802.11-based wireless mesh network
by Raniwala, Ashish, Ph.D.  State University of New York at Stony Brook. 2009: 215 pages; 3401726.
304.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
305.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
307.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
309.
The Effects of Quantum Dot Nanoparticles on the Polyjet Direct 3D Printing Process
by Elliott, Amelia McDow, Ph.D.  Virginia Polytechnic Institute and State University. 2014: 201 pages; 10595255.
310.
The Geopolitics of United States Energy Independence
by Mukundan, Bhavna, M.A.  The American University of Paris (France). 2014: 94 pages; 10305855.
311.
AEO and C-TPAT in the light of Art. XX GATT, with emphasis on lit. (b) and lit. (d)
by Carter, Angela Sandra, M.B.A.  Hochschule fuer Angewandte Wissenschaften Hamburg (Germany). 2014: 160 pages; 1527168.
312.
Automatic verification of string manipulating programs
by Yu, Fang, Ph.D.  University of California, Santa Barbara. 2010: 239 pages; 3422651.
313.
On the feasibility of intrusion detection system in wireless sensor network
by Murarka, Kishore Ramkisan, M.S.  California State University, Long Beach. 2012: 86 pages; 1517746.
317.
Improving Texas Disability Determination Services
by Pierce, Tracy, M.A.  American Military University. 2012: 55 pages; 10724222.
318.
Learning from the Uighurs: Correcting Inadequate Due Process in Terrorist Financing Sanction Regimes
by Pulsifer, Jessica Elizabeth, LL.M.  The George Washington University. 2012: 72 pages; 1515271.
319.
Do Costly Signals Matter?: Unifying Theories of Signaling and Perceptions in International Relations
by Kim, Seok Joon, Ph.D.  The George Washington University. 2016: 351 pages; 10152997.
320.
Authenticating executions for trusted systems
by Aktas, Erdem, Ph.D.  State University of New York at Binghamton. 2013: 215 pages; 3596989.
321.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
322.
The Role of Diverse Skill Sets in Incident Response
by Moore, Sandra, T.D.  Capitol Technology University. 2019: 128 pages; 27662834.
323.
Creativity Paradox in Social Media Culture
by Moore-Corpier, Frances Ann, M.A.  Regent University. 2019: 93 pages; 22621912.
324.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
327.
Modularizing crosscutting concerns in software
by Saigal, Nalin, Ph.D.  University of South Florida. 2011: 70 pages; 3449499.
328.
Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection
by Trumble, Brandon, M.S.  Kutztown University of Pennsylvania. 2015: 50 pages; 1590429.
330.
Reliable SRAM Fingerprinting
by Kim, Joonsoo, Ph.D.  The University of Texas at Austin. 2011: 175 pages; 3572874.
301 - 330 of 19026 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest