Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
19023 open access dissertations and theses found for:
if(Security)  »   Refine Search
61.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
62.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
63.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
64.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
67.
Statutory Response to Court Security Concerns
by Weller, Charles E., Ph.D.  University of Nevada, Reno. 2013: 169 pages; 3608800.
68.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
69.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
70.
An Educational Operating System Supporting Computer Security
by McGee, Patrick J., M.S.  Marquette University. 2020: 52 pages; 27838086.
71.
Student Perceptions of School Safety and Security
by Barnhardt, John, Ed.D.  University of Pennsylvania. 2020: 153 pages; 27830053.
72.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
73.
Security and foreign policy of landlocked states
by Mahdi, Samiullah, M.A.  University of Massachusetts Boston. 2016: 111 pages; 10160222.
74.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
75.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
76.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
77.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
78.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
79.
Implicit Counterinsurgency: Media, Development and Security in Afghanistan
by Zevely, Nicholas Ross, M.A.  The George Washington University. 2016: 73 pages; 10126151.
80.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
81.
Security system with motion detection and face recognition
by Patel, Ravi L., M.S.  California State University, Long Beach. 2017: 40 pages; 10251645.
82.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
83.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
84.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
85.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
86.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
87.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
88.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
89.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
90.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
61 - 90 of 19023 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest