Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21999 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
302.
303.
Ready-to-use? - Bridging the Climate Science-usability Gap for Adaptation
by Jagannathan, Kripa Akila, Ph.D.  University of California, Berkeley. 2019: 159 pages; 13884664.
304.
Performance evaluation of SIP authentication and TLS
by Maguluri, Swapna, M.S.C.E.  California State University, Long Beach. 2012: 121 pages; 1520910.
305.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
306.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
307.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
308.
The Prevalence of Prescription Stimulant Use in a Sample of Nursing Students
by Estes, Sandra Ambrose, Ed.D.  The University of Alabama. 2017: 105 pages; 10260176.
309.
Guidelines for Healthcare Providers When User Testing Computerized Provider Order Entry
by Whiteside, Martin P., M.S.  University of California, Davis. 2013: 143 pages; 1565738.
310.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
311.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
312.
Perceptions of school violence: School personnel views of violent behavior and preparedness
by Henriques, Jeanine M., Ph.D.  Capella University. 2010: 128 pages; 3433745.
313.
Core versus peripheral positions: An integrated model
by Jiang, Lixin, Ph.D.  Washington State University. 2013: 170 pages; 3587112.
314.
Software vulnerabilities: Lifespans, metrics, and case study
by Wright, Jason L., M.S.  University of Idaho. 2014: 117 pages; 1556964.
316.
Examining continued use of software as a service in organizations
by Gilleo, Wayne M., D.B.A.  Capella University. 2014: 129 pages; 3646094.
318.
Identifying and Overcoming the Barriers to Cloud Adoption within the Government Space
by Taylor, Cyril Mark, Sr., D.Engr.  The George Washington University. 2018: 145 pages; 10636122.
320.
Beneath the Attack Surface
by Mowery, Keaton, Ph.D.  University of California, San Diego. 2015: 200 pages; 3712726.
321.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
323.
Online mindful stress management for the military: A study using a civilian population
by Sorgi, Anthony, Psy.D.  Adler School of Professional Psychology. 2016: 121 pages; 10295735.
325.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
326.
A Cybersecurity Strategy for the Small Business
by Perez, Cesar, M.S.  Utica College. 2020: 49 pages; 28092738.
327.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
329.
Transboundary agreement: Case studies of marine mammal management in the bering strait
by Aho, Kelsey B., M.A.  University of Alaska Fairbanks. 2016: 165 pages; 10245619.
330.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
301 - 330 of 21999 displayed.
« First < Previous |   8    9    10    11    12    13    14    15    16    17    18   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest