COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
3002 open access dissertations and theses found for:
if(Vulnerabilities)  »   Refine Search
272.
273.
Architectures for cryptography accelerators
by Cohen, Aaron Ethan, Ph.D.  University of Minnesota. 2007: 199 pages; 3277590.
275.
277.
A global study of hawala targeting regulations
by Pamer, Karen, M.S.  Utica College. 2016: 76 pages; 10153553.
278.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
279.
From FLOWCORE to JITFLOW: Improving the speed of Information Flow in JavaScript
by Hennigan, Eric, Ph.D.  University of California, Irvine. 2015: 193 pages; 3688532.
280.
Self-concept and recovery: The effects of stigma on survivors of sex trafficking
by Counts, Pamela Alquitran, Psy.D.  Pepperdine University. 2014: 155 pages; 3667389.
281.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
282.
How poverty is a fortress without drawbridges and why we must build bridges
by Asare, Otubea Mary-Shirley, M.A.L.S.  Georgetown University. 2011: 226 pages; 1503441.
283.
Consensus on the Effective Employment of Hybrid Airships in Future Disaster Logistics
by Lynch, Sarah R., Ph.D.  Capella University. 2018: 158 pages; 10747168.
284.
286.
An assessment of social vulnerability in Yuba County, California
by Hogg, Jeannine H., M.A.  California State University, Long Beach. 2014: 101 pages; 1690640.
287.
An examination of how American business must eliminate perceived bias towards Muslims and Arab Americans
by Horowitz, Jeffrey, M.A.  State University of New York Empire State College. 2010: 99 pages; 1484335.
289.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
291.
The application of Design for Six Sigma to the development of web-based training for clinical laboratory personnel
by Dunning, Theresa, M.S.  California State University, Dominguez Hills. 2008: 98 pages; 1455367.
292.
293.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
294.
Charismatic leadership: An exploratory investigation of the techniques of influence
by Sparks, George A., Ph.D.  Capella University. 2008: 88 pages; 3297036.
295.
Intervention workshops for members of multidisciplinary teams on hoarding: A grant proposal
by Martinez, Cecilia A., M.S.W.  California State University, Long Beach. 2013: 70 pages; 1523112.
297.
Micro-credit programs, vulnerable women and the enhancement of choices: A case study of Ethiopia
by Adeyemi, Andrea L., M.A.  State University of New York Empire State College. 2010: 60 pages; 1485223.
298.
Entangled Cycles: Creating Kinesthetic Empathy through Polarizing Mental States
by Cruz, Raul, M.F.A.  California State University, Long Beach. 2019: 36 pages; 13900147.
299.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
300.
Four degrees of proximity: Key factors that influence private sector preparedness and continuity planning
by Dunaway, W. Michael, D.Sc.  The George Washington University. 2010: 268 pages; 3386954.
271 - 300 of 3002 displayed.
« First < Previous |   7    8    9    10    11    12    13    14    15    16    17   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest