Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2463 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
272.
New Mexico's nuclear enchantment: Local politics, national imperatives, and radioactive waste disposal
by Richter, Jennifer, Ph.D.  The University of New Mexico. 2013: 255 pages; 3601288.
273.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
274.
“Can you give me respect?”: Experiences of the urban poor with advanced disease
by Hughes, Anne M., Ph.D.  University of California, San Francisco. 2007: 211 pages; 3274968.
275.
RSA in Young Adults: Identifying Naturally-Occurring Response Patterns and Correlates
by Willey, Brittany, Ph.D.  Seattle Pacific University. 2019: 74 pages; 13883362.
277.
Nature, Technology, & the Pursuit of Justice: Urban Agriculture Networks in San Diego County
by O'Neal, Blaire Michael, Ph.D.  University of California, Santa Barbara. 2019: 200 pages; 13900586.
279.
Assessing City Preparedness for a Biological Attack
by Moore, Joseph T., Ph.D.  Walden University. 2011: 113 pages; 3457361.
280.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
281.
Malware Vectors: A Technique for Discovering Defense Logics
by Stocco, Gabriel Fortunato, Ph.D.  Dartmouth College. 2014: 121 pages; 3685144.
282.
Dacamented: An Ethnographic Account of the Lives of Students with Deferred Action for Childhood Arrivals (DACA)
by Hernandez, Edgar, M.A.  California State University, Long Beach. 2018: 86 pages; 10752287.
283.
285.
Foreign aid in Africa in the new millennium: The China and U.S. model fight for relevance
by McDonald, Michael Elliott, M.A.L.S.  Georgetown University. 2013: 110 pages; 1536609.
287.
Predicting Future Risk of Liability in Police Officer Candidates Using M-PULSE Inventory™
by Foreman, Mark E., Psy.D.  Alliant International University. 2014: 109 pages; 3612238.
288.
Classification of Health Information Technology-Related Contributing Factors to Patient Safety Events
by Castro, Gerard Michael, Ph.D.  University of Illinois at Chicago. 2014: 113 pages; 3668931.
289.
An applied anthropological approach to human trafficking prevention: "I am not for sale"
by Bellenger, Morgan Alexandra, M.A.  California State University, Long Beach. 2016: 97 pages; 10196520.
291.
292.
With One Hand in My Pocket: An Exploration of Individuation With Visible Physical Anomaly
by Walker, Michael Lon, M.A.  Pacifica Graduate Institute. 2011: 118 pages; 1504565.
293.
294.
295.
Adapting Swarm Applications: A Systematic and Quantitative Approach
by Zhang, Ben, Ph.D.  University of California, Berkeley. 2018: 100 pages; 10931111.
296.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
298.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
299.
The Conceptualization of Schizophrenia by Siblings of Individuals with Schizophrenia
by Chin, Sammantha, Psy.D.  Roosevelt University. 2018: 112 pages; 10750967.
300.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
271 - 300 of 2463 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest