Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21996 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
63.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
64.
Professional certification: Does the security industry need a new yardstick?
by Mathews, Timothy J., D.Sc.  New Jersey City University. 2015: 282 pages; 3730746.
66.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
67.
Do warrants lead the underlying stocks and index futures?
by Kui, Lin Ying, M.Sc.  Singapore Management University (Singapore). 2008: 89 pages; 1483220.
69.
National Security and Wind Farms: Can They Co-Exist?
by Jameson, Sharoiha Pualani Kanehailua, LL.M.  The George Washington University. 2013: 77 pages; 1545818.
70.
The Security and Performance Impact of Object File Shuffling
by Buch, Jonathan, M.S.  University of Idaho. 2020: 68 pages; 27833446.
71.
Security Concept for VPN IPsec Site-to-Site Connections to Third Parties
by Schmalen, Daniel, M.S.  California State University, Long Beach. 2018: 74 pages; 10688606.
72.
Environmental Impacts on Guam's Water Security and Sustainable Management of the Resource
by Khalaj-Teimoury, Masoud, Ph.D.  University of Alaska Fairbanks. 2018: 76 pages; 10787879.
73.
Behavior-based admission and access control for network security
by Frias-Martinez, Vanessa, Ph.D.  Columbia University. 2008: 167 pages; 3333480.
75.
Techniques for Enhancing the Security of Future Smart Grids
by Saed, Mustafa, Ph.D.  University of Detroit Mercy. 2018: 444 pages; 10793626.
76.
The effects of experimentally induced attachment security on children's fear reactions
by Stupica, Brandi Shawn, Ph.D.  University of Maryland, College Park. 2012: 242 pages; 3543490.
77.
A Grassroots Approach to Peace and Security in West Africa
by Block, Lisa, M.A.  The American University of Paris (France). 2013: 114 pages; 10305824.
78.
Security and Privacy Challenges in Content-Centric Networks
by Wood, Christopher A., Ph.D.  University of California, Irvine. 2017: 337 pages; 10684217.
80.
Dynamic Partitioning of Security Systems
by Paxton, Eric B., M.Sc.C.S.  California State University, Long Beach. 2020: 74 pages; 27833492.
81.
Cyber Physical Security Analysis for Synchrophasor Applications
by Liu, Ren, Ph.D.  Washington State University. 2017: 148 pages; 10639030.
82.
Maternal health policy: Nursing's legacy and the Social Security Act of 1935
by Pope, Bonnie L., Ph.D.  Florida Atlantic University. 2011: 164 pages; 3462566.
83.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
84.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
85.
89.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
61 - 90 of 21996 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest