Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
29968 open access dissertations and theses found for:
if(Web security)  »   Refine Search
1.
Web browsers as operating systems: Supporting robust and secure web programs
by Reis, Charles, Ph.D.  University of Washington. 2009: 173 pages; 3370601.
4.
Secure system simulation - Internet of Things
by Verma, Yukti, M.S.  California State University, Long Beach. 2016: 48 pages; 10116148.
5.
Computational REST: A new model for decentralized, Internet-scale applications
by Erenkrantz, Justin Ryan, Ph.D.  University of California, Irvine. 2009: 208 pages; 3372349.
6.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
8.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
9.
A Web-Based Security Framework in .NET Environment
by Melnikov, Arthur, M.S.  California State University, Long Beach. 2010: 107 pages; 1493039.
10.
Striking a Balance The Evolution of Today's Private Military and Security Industry in the United States
by Hagengruber, Dana, M.A.  The George Washington University. 2009: 119 pages; 1531253.
11.
Scraper—a program to instantly convert a static website to a dynamic website
by Sheth, Hemil M., M.S.  California State University, Long Beach. 2010: 71 pages; 1481772.
12.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
13.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
14.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
16.
Estimating the Fiscal Impacts of the Homeland Security Grants on State and Local Public Safety Spending
by Kirschner, Charlotte L., Ph.D.  The George Washington University. 2012: 256 pages; 3474049.
18.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
19.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
20.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
21.
Reducing call center intake utilizing health insurance company web-based provider tools
by Glisan, Kelly, D.H.A.  Central Michigan University. 2015: 132 pages; 3715063.
23.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
24.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
25.
National decision making and nuclear fuel cycles: An analysis of influences
by Platte, James Edward, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2013: 299 pages; 3559057.
26.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
28.
Talking about technology: A metaphoric analysis of cloud computing and web 2.0
by Cuttitta, Anthony R., M.A.  Northern Arizona University. 2013: 121 pages; 1550099.
29.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
30.
Exploring Web Simplification for People with Cognitive Disabilities
by Hoehl, Jeffery Arthur, Ph.D.  University of Colorado at Boulder. 2016: 120 pages; 10108753.
1 - 30 of 29968 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest