Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21996 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
121.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
122.
Student Perceptions of School Safety and Security
by Barnhardt, John, Ed.D.  University of Pennsylvania. 2020: 153 pages; 27830053.
123.
Statutory Response to Court Security Concerns
by Weller, Charles E., Ph.D.  University of Nevada, Reno. 2013: 169 pages; 3608800.
124.
Security, Computation and Data Issues in Clouds
by Li, Lifeng, M.S.  Arkansas State University. 2017: 112 pages; 10288061.
125.
Security and foreign policy of landlocked states
by Mahdi, Samiullah, M.A.  University of Massachusetts Boston. 2016: 111 pages; 10160222.
126.
Security and Performance Analysis for RFID Protocols
by Liang, Bing, M.Sc.  Singapore Management University (Singapore). 2011: 93 pages; 1489343.
127.
An Educational Operating System Supporting Computer Security
by McGee, Patrick J., M.S.  Marquette University. 2020: 52 pages; 27838086.
128.
Internet of Things Device Cybersecurity and National Security
by England, Suzanne K., M.S.  Utica College. 2020: 62 pages; 28094260.
129.
Homeland security and terrorism in selected European states
by Deutcher, Eric M., M.A.  University of Denver. 2009: 182 pages; 1462094.
130.
Implicit Counterinsurgency: Media, Development and Security in Afghanistan
by Zevely, Nicholas Ross, M.A.  The George Washington University. 2016: 73 pages; 10126151.
131.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
132.
Security system with motion detection and face recognition
by Patel, Ravi L., M.S.  California State University, Long Beach. 2017: 40 pages; 10251645.
134.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
135.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
136.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
137.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
138.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
139.
The Social Security retirement decision: Maximizing expected discounted worth
by Thompson, Gregory L., M.S.I.E.  Purdue University. 2011: 85 pages; 1501927.
140.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
141.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
142.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
143.
Myanmar's Rohingya Refugees The Search for Human Security
by Crossman, Linda, M.A.  Georgetown University. 2014: 127 pages; 1568320.
144.
Energy Security and Japan-China Relations: Competition or Cooperation?
by Minoura, Haruna, M.A.  The George Washington University. 2011: 222 pages; 1496651.
145.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
146.
The role of African leafy vegetables in food security
by Croft, Marcia M., Ph.D.  Purdue University. 2016: 254 pages; 10245801.
147.
Food Security in the DPRK Since the Great Famine of the Mid-1990s
by Park, Hee-Eun, M.A.  The George Washington University. 2016: 80 pages; 10159055.
148.
Stress Reduction Strategies for Improving Private Security Officer Performance
by Al-Mulla, Khalil I., D.B.A.  Walden University. 2018: 160 pages; 13427945.
149.
Parental payment abuse within the Supplemental Security Income program
by Taylor-King, Darlean, Ph.D.  Walden University. 2008: 154 pages; 3342465.
150.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
121 - 150 of 21996 displayed.
« First < Previous |   2    3    4    5    6    7    8    9    10    11    12   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest