Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Dates: 2000 – 2004 Language: English

You searched for subject:( security). Showing records 1 – 30 of 294 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Country

▼ Search Limiters


University of KwaZulu-Natal

1. Stefano, Lynn. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.

Degree: M.Agric., Food security, 2004, University of KwaZulu-Natal

 Printed information access, preferences and use by small-scale farmers in KwaZulu-Natal, who are experimenting with or converting to organic farming, were investigated to establish the… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stefano, L. (2004). Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/6252

Chicago Manual of Style (16th Edition):

Stefano, Lynn. “Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.” 2004. Masters Thesis, University of KwaZulu-Natal. Accessed November 17, 2019. http://hdl.handle.net/10413/6252.

MLA Handbook (7th Edition):

Stefano, Lynn. “Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal.” 2004. Web. 17 Nov 2019.

Vancouver:

Stefano L. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/10413/6252.

Council of Science Editors:

Stefano L. Printed information access, preferences and use by farmers with potential for small-scale organic production, KwaZulu-Natal. [Masters Thesis]. University of KwaZulu-Natal; 2004. Available from: http://hdl.handle.net/10413/6252


University of Georgia

2. Mazzucco, Esteban. Security interests in intellectual property rights : the time has come for the enactment of new laws.

Degree: LLM, Law, 2003, University of Georgia

 This study deals with all the problematic issues surrounding the use of intellectual property as "collateral," analyzing two legal systems, and addressing that the time… (more)

Subjects/Keywords: Security interest

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mazzucco, E. (2003). Security interests in intellectual property rights : the time has come for the enactment of new laws. (Thesis). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mazzucco, Esteban. “Security interests in intellectual property rights : the time has come for the enactment of new laws.” 2003. Thesis, University of Georgia. Accessed November 17, 2019. http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mazzucco, Esteban. “Security interests in intellectual property rights : the time has come for the enactment of new laws.” 2003. Web. 17 Nov 2019.

Vancouver:

Mazzucco E. Security interests in intellectual property rights : the time has come for the enactment of new laws. [Internet] [Thesis]. University of Georgia; 2003. [cited 2019 Nov 17]. Available from: http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mazzucco E. Security interests in intellectual property rights : the time has come for the enactment of new laws. [Thesis]. University of Georgia; 2003. Available from: http://purl.galileo.usg.edu/uga_etd/mazzucco_esteban_200308_llm

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

3. Chelashaw, Karl. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .

Degree: 2001, University of Nairobi

 The Windows IP Security integrated into Windows 2000 Server should provide network managers with a critically important line of security. Windows IP Security is an… (more)

Subjects/Keywords: Protocol Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chelashaw, K. (2001). Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Thesis, University of Nairobi. Accessed November 17, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chelashaw, Karl. “Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) .” 2001. Web. 17 Nov 2019.

Vancouver:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Internet] [Thesis]. University of Nairobi; 2001. [cited 2019 Nov 17]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chelashaw K. Review and evaluation of internet protocol security (ipsec) in microsoft windows 2000 (build 2195) . [Thesis]. University of Nairobi; 2001. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20927

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

4. Ndung'u, Catherine. A Framework for development of an information security auditing capability .

Degree: 2004, University of Nairobi

 The aim of this study was to determine how Kenyan organizations have embraced Information System (IS) security audit and development of a framework which the… (more)

Subjects/Keywords: Security Auditing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ndung'u, C. (2004). A Framework for development of an information security auditing capability . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ndung'u, Catherine. “A Framework for development of an information security auditing capability .” 2004. Thesis, University of Nairobi. Accessed November 17, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ndung'u, Catherine. “A Framework for development of an information security auditing capability .” 2004. Web. 17 Nov 2019.

Vancouver:

Ndung'u C. A Framework for development of an information security auditing capability . [Internet] [Thesis]. University of Nairobi; 2004. [cited 2019 Nov 17]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ndung'u C. A Framework for development of an information security auditing capability . [Thesis]. University of Nairobi; 2004. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/22131

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

5. Van Dyke, Colin William. An in-depth analysis of common software vulnerabilities and their solutions.

Degree: MS, Electrical and Computer Engineering, 2004, Oregon State University

 With the current security climate throughout the Internet, a large emphasis is being placed on protecting software systems from attack by a malicious entity. Most… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Dyke, C. W. (2004). An in-depth analysis of common software vulnerabilities and their solutions. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/22487

Chicago Manual of Style (16th Edition):

Van Dyke, Colin William. “An in-depth analysis of common software vulnerabilities and their solutions.” 2004. Masters Thesis, Oregon State University. Accessed November 17, 2019. http://hdl.handle.net/1957/22487.

MLA Handbook (7th Edition):

Van Dyke, Colin William. “An in-depth analysis of common software vulnerabilities and their solutions.” 2004. Web. 17 Nov 2019.

Vancouver:

Van Dyke CW. An in-depth analysis of common software vulnerabilities and their solutions. [Internet] [Masters thesis]. Oregon State University; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/1957/22487.

Council of Science Editors:

Van Dyke CW. An in-depth analysis of common software vulnerabilities and their solutions. [Masters Thesis]. Oregon State University; 2004. Available from: http://hdl.handle.net/1957/22487


University of Tasmania

6. McMahon, JF. External and internal security in the Australian colonies from their founding to the end of the Macquarie era.

Degree: 2004, University of Tasmania

 This thesis considers external and internal security in the Australian colonies from the founding of New South Wales to the end of the Macquarie era.… (more)

Subjects/Keywords: Internal security; National security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McMahon, J. (2004). External and internal security in the Australian colonies from their founding to the end of the Macquarie era. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McMahon, JF. “External and internal security in the Australian colonies from their founding to the end of the Macquarie era.” 2004. Thesis, University of Tasmania. Accessed November 17, 2019. https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McMahon, JF. “External and internal security in the Australian colonies from their founding to the end of the Macquarie era.” 2004. Web. 17 Nov 2019.

Vancouver:

McMahon J. External and internal security in the Australian colonies from their founding to the end of the Macquarie era. [Internet] [Thesis]. University of Tasmania; 2004. [cited 2019 Nov 17]. Available from: https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McMahon J. External and internal security in the Australian colonies from their founding to the end of the Macquarie era. [Thesis]. University of Tasmania; 2004. Available from: https://eprints.utas.edu.au/20579/1/whole_McMahonJohnFarquhar2004_thesis.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

7. Gichuru, David C. An investigation of computer security status at the University of Nairobi .

Degree: 2000, University of Nairobi

 The problem addressed in this study is inadequacy in the current security mechanism in the relation to the three control mechanisms of physical control, logical… (more)

Subjects/Keywords: Computer Security Status

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gichuru, D. C. (2000). An investigation of computer security status at the University of Nairobi . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gichuru, David C. “An investigation of computer security status at the University of Nairobi .” 2000. Thesis, University of Nairobi. Accessed November 17, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gichuru, David C. “An investigation of computer security status at the University of Nairobi .” 2000. Web. 17 Nov 2019.

Vancouver:

Gichuru DC. An investigation of computer security status at the University of Nairobi . [Internet] [Thesis]. University of Nairobi; 2000. [cited 2019 Nov 17]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gichuru DC. An investigation of computer security status at the University of Nairobi . [Thesis]. University of Nairobi; 2000. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/20069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


McGill University

8. Palsson, Ulrika. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.

Degree: Master of Laws, Institute of Comparative Law, 2002, McGill University

Note: title page missing

This thesis describes and analyzes the practice of 're-pledge', by which pledgees use the pledged collateral to secure their own borrowings… (more)

Subjects/Keywords: Security (Law)  – Europe.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Palsson, U. (2002). Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. (Masters Thesis). McGill University. Retrieved from http://digitool.library.mcgill.ca/thesisfile161869.pdf

Chicago Manual of Style (16th Edition):

Palsson, Ulrika. “Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.” 2002. Masters Thesis, McGill University. Accessed November 17, 2019. http://digitool.library.mcgill.ca/thesisfile161869.pdf.

MLA Handbook (7th Edition):

Palsson, Ulrika. “Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union.” 2002. Web. 17 Nov 2019.

Vancouver:

Palsson U. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. [Internet] [Masters thesis]. McGill University; 2002. [cited 2019 Nov 17]. Available from: http://digitool.library.mcgill.ca/thesisfile161869.pdf.

Council of Science Editors:

Palsson U. Re-pledge of investment property : developments under revised article 9 of the Uniform Commercial Code and in the European Union. [Masters Thesis]. McGill University; 2002. Available from: http://digitool.library.mcgill.ca/thesisfile161869.pdf

9. CHEW WAI MENG. Applying mobile agents technology to intrusion detection and response.

Degree: 2004, National University of Singapore

Subjects/Keywords: mobile agents security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MENG, C. W. (2004). Applying mobile agents technology to intrusion detection and response. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/13912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MENG, CHEW WAI. “Applying mobile agents technology to intrusion detection and response.” 2004. Thesis, National University of Singapore. Accessed November 17, 2019. http://scholarbank.nus.edu.sg/handle/10635/13912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MENG, CHEW WAI. “Applying mobile agents technology to intrusion detection and response.” 2004. Web. 17 Nov 2019.

Vancouver:

MENG CW. Applying mobile agents technology to intrusion detection and response. [Internet] [Thesis]. National University of Singapore; 2004. [cited 2019 Nov 17]. Available from: http://scholarbank.nus.edu.sg/handle/10635/13912.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MENG CW. Applying mobile agents technology to intrusion detection and response. [Thesis]. National University of Singapore; 2004. Available from: http://scholarbank.nus.edu.sg/handle/10635/13912

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

10. Cheung, Chun-Hom. A learning-based approach to false alarm reduction for signature-based intrusion detection systems.

Degree: 2004, Hong Kong University of Science and Technology

 Intrusion detection has become an important approach to computer and network security. However, existing intrusion detection systems usually generate too many alarm messages, most of… (more)

Subjects/Keywords: Computer security; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, C. (2004). A learning-based approach to false alarm reduction for signature-based intrusion detection systems. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheung, Chun-Hom. “A learning-based approach to false alarm reduction for signature-based intrusion detection systems.” 2004. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheung, Chun-Hom. “A learning-based approach to false alarm reduction for signature-based intrusion detection systems.” 2004. Web. 17 Nov 2019.

Vancouver:

Cheung C. A learning-based approach to false alarm reduction for signature-based intrusion detection systems. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2004. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheung C. A learning-based approach to false alarm reduction for signature-based intrusion detection systems. [Thesis]. Hong Kong University of Science and Technology; 2004. Available from: https://doi.org/10.14711/thesis-b818949 ; http://repository.ust.hk/ir/bitstream/1783.1-5787/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Michigan State University

11. Westran, Timothy Robert. The last line of defense : a host-based, kernel-level intrusion detection system.

Degree: MS, Department of Computer Science, 2003, Michigan State University

Subjects/Keywords: Computer security; Computer networks – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Westran, T. R. (2003). The last line of defense : a host-based, kernel-level intrusion detection system. (Masters Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:32939

Chicago Manual of Style (16th Edition):

Westran, Timothy Robert. “The last line of defense : a host-based, kernel-level intrusion detection system.” 2003. Masters Thesis, Michigan State University. Accessed November 17, 2019. http://etd.lib.msu.edu/islandora/object/etd:32939.

MLA Handbook (7th Edition):

Westran, Timothy Robert. “The last line of defense : a host-based, kernel-level intrusion detection system.” 2003. Web. 17 Nov 2019.

Vancouver:

Westran TR. The last line of defense : a host-based, kernel-level intrusion detection system. [Internet] [Masters thesis]. Michigan State University; 2003. [cited 2019 Nov 17]. Available from: http://etd.lib.msu.edu/islandora/object/etd:32939.

Council of Science Editors:

Westran TR. The last line of defense : a host-based, kernel-level intrusion detection system. [Masters Thesis]. Michigan State University; 2003. Available from: http://etd.lib.msu.edu/islandora/object/etd:32939


University of Cincinnati

12. KASPAREK, JASON W. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.

Degree: M. Arch., Design, Architecture, Art and Planning : Architecture, 2004, University of Cincinnati

 The primary thesis of this project is that a successful implementation of security measures in a historic city hall must be mediated by the public… (more)

Subjects/Keywords: Architecture; Security Measures; City Halls; Public Buildings and Security; Security and Historic Buildings

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

KASPAREK, J. W. (2004). SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798

Chicago Manual of Style (16th Edition):

KASPAREK, JASON W. “SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.” 2004. Masters Thesis, University of Cincinnati. Accessed November 17, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798.

MLA Handbook (7th Edition):

KASPAREK, JASON W. “SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL.” 2004. Web. 17 Nov 2019.

Vancouver:

KASPAREK JW. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. [Internet] [Masters thesis]. University of Cincinnati; 2004. [cited 2019 Nov 17]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798.

Council of Science Editors:

KASPAREK JW. SECURITY WITHOUT SACRIFICE: MEDIATING SECURITY IN THE HISTORIC CITY HALL. [Masters Thesis]. University of Cincinnati; 2004. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083350798


Georgia Tech

13. Levine, John G. (John Glenn). A Methodology for Detecting and Classifying Rootkit Exploits.

Degree: PhD, Electrical and Computer Engineering, 2004, Georgia Tech

 A Methodology for Detecting and Classifying Rootkit Exploits John G. Levine 164 Pages Directed by Dr. Henry L. Owen We propose a methodology to detect… (more)

Subjects/Keywords: Computer security; Rootkits; Computer security; Computer hackers; Computer networks (Security measures)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Levine, J. G. (. G. (2004). A Methodology for Detecting and Classifying Rootkit Exploits. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5139

Chicago Manual of Style (16th Edition):

Levine, John G (John Glenn). “A Methodology for Detecting and Classifying Rootkit Exploits.” 2004. Doctoral Dissertation, Georgia Tech. Accessed November 17, 2019. http://hdl.handle.net/1853/5139.

MLA Handbook (7th Edition):

Levine, John G (John Glenn). “A Methodology for Detecting and Classifying Rootkit Exploits.” 2004. Web. 17 Nov 2019.

Vancouver:

Levine JG(G. A Methodology for Detecting and Classifying Rootkit Exploits. [Internet] [Doctoral dissertation]. Georgia Tech; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/1853/5139.

Council of Science Editors:

Levine JG(G. A Methodology for Detecting and Classifying Rootkit Exploits. [Doctoral Dissertation]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5139


Michigan State University

14. Knoester, David B. Using developmental learning for network intrusion detection.

Degree: MS, Department of Computer Science, 2004, Michigan State University

Subjects/Keywords: Computer networks – Security measures; Internet – Security measures; Computer security; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Knoester, D. B. (2004). Using developmental learning for network intrusion detection. (Masters Thesis). Michigan State University. Retrieved from http://etd.lib.msu.edu/islandora/object/etd:32386

Chicago Manual of Style (16th Edition):

Knoester, David B. “Using developmental learning for network intrusion detection.” 2004. Masters Thesis, Michigan State University. Accessed November 17, 2019. http://etd.lib.msu.edu/islandora/object/etd:32386.

MLA Handbook (7th Edition):

Knoester, David B. “Using developmental learning for network intrusion detection.” 2004. Web. 17 Nov 2019.

Vancouver:

Knoester DB. Using developmental learning for network intrusion detection. [Internet] [Masters thesis]. Michigan State University; 2004. [cited 2019 Nov 17]. Available from: http://etd.lib.msu.edu/islandora/object/etd:32386.

Council of Science Editors:

Knoester DB. Using developmental learning for network intrusion detection. [Masters Thesis]. Michigan State University; 2004. Available from: http://etd.lib.msu.edu/islandora/object/etd:32386


University of Hong Kong

15. Cheung, Lai-sze. Delegation of rights using PKI-based components.

Degree: M. Phil., 2004, University of Hong Kong

toc

published_or_final_version

abstract

Computer Science

Master

Master of Philosophy

Advisors/Committee Members: Hui, CK.

Subjects/Keywords: Computer security.; Internet - Security measures.; Public key cryptography.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheung, L. (2004). Delegation of rights using PKI-based components. (Masters Thesis). University of Hong Kong. Retrieved from Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428

Chicago Manual of Style (16th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Masters Thesis, University of Hong Kong. Accessed November 17, 2019. Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

MLA Handbook (7th Edition):

Cheung, Lai-sze. “Delegation of rights using PKI-based components.” 2004. Web. 17 Nov 2019.

Vancouver:

Cheung L. Delegation of rights using PKI-based components. [Internet] [Masters thesis]. University of Hong Kong; 2004. [cited 2019 Nov 17]. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428.

Council of Science Editors:

Cheung L. Delegation of rights using PKI-based components. [Masters Thesis]. University of Hong Kong; 2004. Available from: Cheung, L. [張麗詩]. (2004). Delegation of rights using PKI-based components. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2997305 ; http://dx.doi.org/10.5353/th_b2997305 ; http://hdl.handle.net/10722/31428


Hong Kong University of Science and Technology

16. Ye, Ruyi. An economic model of investment in information security.

Degree: 2004, Hong Kong University of Science and Technology

 Information security is becoming an increasingly serious problem faced by many enterprises and organizations that perform part of their business processes via the Internet. It… (more)

Subjects/Keywords: Computer security  – Economic aspects; Electronic commerce  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, R. (2004). An economic model of investment in information security. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ye, Ruyi. “An economic model of investment in information security.” 2004. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ye, Ruyi. “An economic model of investment in information security.” 2004. Web. 17 Nov 2019.

Vancouver:

Ye R. An economic model of investment in information security. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2004. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ye R. An economic model of investment in information security. [Thesis]. Hong Kong University of Science and Technology; 2004. Available from: https://doi.org/10.14711/thesis-b834877 ; http://repository.ust.hk/ir/bitstream/1783.1-5020/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

17. Wong, Yung. A risk analysis model for enterprise network.

Degree: 2001, Hong Kong University of Science and Technology

 For a long time, there existed only guidelines for network security risk analysis. In risk analysis, methodologies existed for calculating the risks or losses are… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer security; Risk assessment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, Y. (2001). A risk analysis model for enterprise network. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wong, Yung. “A risk analysis model for enterprise network.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wong, Yung. “A risk analysis model for enterprise network.” 2001. Web. 17 Nov 2019.

Vancouver:

Wong Y. A risk analysis model for enterprise network. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wong Y. A risk analysis model for enterprise network. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: https://doi.org/10.14711/thesis-b692728 ; http://repository.ust.hk/ir/bitstream/1783.1-5707/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

18. Li, Chi-Pan. A distributed scheme to detect and defend against distributed denial of service attacks.

Degree: 2003, Hong Kong University of Science and Technology

 Distributed denial of service (DDoS) attacks present a serious threat to the Internet. They exhaust the critical resources at a target by engaging the power… (more)

Subjects/Keywords: Internet  – Security measures; Computer networks  – Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, C. (2003). A distributed scheme to detect and defend against distributed denial of service attacks. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Li, Chi-Pan. “A distributed scheme to detect and defend against distributed denial of service attacks.” 2003. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Li, Chi-Pan. “A distributed scheme to detect and defend against distributed denial of service attacks.” 2003. Web. 17 Nov 2019.

Vancouver:

Li C. A distributed scheme to detect and defend against distributed denial of service attacks. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2003. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Li C. A distributed scheme to detect and defend against distributed denial of service attacks. [Thesis]. Hong Kong University of Science and Technology; 2003. Available from: https://doi.org/10.14711/thesis-b805961 ; http://repository.ust.hk/ir/bitstream/1783.1-5781/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


McGill University

19. Milton-Feasby, Christine. An exploration of the domains of work insecurity.

Degree: PhD, Faculty of Management., 2003, McGill University

 This thesis explores insecurity about four types of involuntary work transition. These are labeled here domain insecurities and include job facet insecurity, job loss insecurity,… (more)

Subjects/Keywords: Job security.; Security (Psychology); Adjustment (Psychology); Career changes.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Milton-Feasby, C. (2003). An exploration of the domains of work insecurity. (Doctoral Dissertation). McGill University. Retrieved from http://digitool.library.mcgill.ca/thesisfile84532.pdf

Chicago Manual of Style (16th Edition):

Milton-Feasby, Christine. “An exploration of the domains of work insecurity.” 2003. Doctoral Dissertation, McGill University. Accessed November 17, 2019. http://digitool.library.mcgill.ca/thesisfile84532.pdf.

MLA Handbook (7th Edition):

Milton-Feasby, Christine. “An exploration of the domains of work insecurity.” 2003. Web. 17 Nov 2019.

Vancouver:

Milton-Feasby C. An exploration of the domains of work insecurity. [Internet] [Doctoral dissertation]. McGill University; 2003. [cited 2019 Nov 17]. Available from: http://digitool.library.mcgill.ca/thesisfile84532.pdf.

Council of Science Editors:

Milton-Feasby C. An exploration of the domains of work insecurity. [Doctoral Dissertation]. McGill University; 2003. Available from: http://digitool.library.mcgill.ca/thesisfile84532.pdf

20. NG KENG SENG. Securing mobile ad hoc network routing protocols.

Degree: 2004, National University of Singapore

Subjects/Keywords: Ad hoc Networks; Security; Routing; Security Extension; Simulation; Performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SENG, N. K. (2004). Securing mobile ad hoc network routing protocols. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/13862

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

SENG, NG KENG. “Securing mobile ad hoc network routing protocols.” 2004. Thesis, National University of Singapore. Accessed November 17, 2019. http://scholarbank.nus.edu.sg/handle/10635/13862.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

SENG, NG KENG. “Securing mobile ad hoc network routing protocols.” 2004. Web. 17 Nov 2019.

Vancouver:

SENG NK. Securing mobile ad hoc network routing protocols. [Internet] [Thesis]. National University of Singapore; 2004. [cited 2019 Nov 17]. Available from: http://scholarbank.nus.edu.sg/handle/10635/13862.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

SENG NK. Securing mobile ad hoc network routing protocols. [Thesis]. National University of Singapore; 2004. Available from: http://scholarbank.nus.edu.sg/handle/10635/13862

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

21. Boyle, Michael George. Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period.

Degree: Politics, 2002, University of New South Wales

Subjects/Keywords: Thesis Digitisation Program; Australia national security; Indonesia national security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boyle, M. G. (2002). Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/59666 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:49280/SOURCE01?view=true

Chicago Manual of Style (16th Edition):

Boyle, Michael George. “Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period.” 2002. Doctoral Dissertation, University of New South Wales. Accessed November 17, 2019. http://handle.unsw.edu.au/1959.4/59666 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:49280/SOURCE01?view=true.

MLA Handbook (7th Edition):

Boyle, Michael George. “Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period.” 2002. Web. 17 Nov 2019.

Vancouver:

Boyle MG. Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period. [Internet] [Doctoral dissertation]. University of New South Wales; 2002. [cited 2019 Nov 17]. Available from: http://handle.unsw.edu.au/1959.4/59666 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:49280/SOURCE01?view=true.

Council of Science Editors:

Boyle MG. Policy-making and pragmatism : Australia's management of security cooperation with Indonesia during the new order period. [Doctoral Dissertation]. University of New South Wales; 2002. Available from: http://handle.unsw.edu.au/1959.4/59666 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:49280/SOURCE01?view=true


Aberystwyth University

22. Bilgin, Hatice Pinar. Regional Security in the Middle East: A Critical Security Studies Perspective .

Degree: 2000, Aberystwyth University

 This is a study of regional security in the Middle East from a Critical Security Studies perspective. The main aim of the thesis is to… (more)

Subjects/Keywords: regional security; Cold War; Critical Security Studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bilgin, H. P. (2000). Regional Security in the Middle East: A Critical Security Studies Perspective . (Thesis). Aberystwyth University. Retrieved from http://hdl.handle.net/2160/1929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bilgin, Hatice Pinar. “Regional Security in the Middle East: A Critical Security Studies Perspective .” 2000. Thesis, Aberystwyth University. Accessed November 17, 2019. http://hdl.handle.net/2160/1929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bilgin, Hatice Pinar. “Regional Security in the Middle East: A Critical Security Studies Perspective .” 2000. Web. 17 Nov 2019.

Vancouver:

Bilgin HP. Regional Security in the Middle East: A Critical Security Studies Perspective . [Internet] [Thesis]. Aberystwyth University; 2000. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/2160/1929.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bilgin HP. Regional Security in the Middle East: A Critical Security Studies Perspective . [Thesis]. Aberystwyth University; 2000. Available from: http://hdl.handle.net/2160/1929

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Kuusisto, Rauno. Aspects on Availability. A Teleological Adventure of Information in the Lifeworld.

Degree: 2004, Helsinki University of Technology

Availability is a feature of information. Availability is frequently connected to information security. So it is now. But in this thesis, the viewpoint is slightly… (more)

Subjects/Keywords: making security; availability; time; information; social system; decision-making

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuusisto, R. (2004). Aspects on Availability. A Teleological Adventure of Information in the Lifeworld. (Thesis). Helsinki University of Technology. Retrieved from http://lib.tkk.fi/Diss/2004/isbn9512274639/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuusisto, Rauno. “Aspects on Availability. A Teleological Adventure of Information in the Lifeworld.” 2004. Thesis, Helsinki University of Technology. Accessed November 17, 2019. http://lib.tkk.fi/Diss/2004/isbn9512274639/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuusisto, Rauno. “Aspects on Availability. A Teleological Adventure of Information in the Lifeworld.” 2004. Web. 17 Nov 2019.

Vancouver:

Kuusisto R. Aspects on Availability. A Teleological Adventure of Information in the Lifeworld. [Internet] [Thesis]. Helsinki University of Technology; 2004. [cited 2019 Nov 17]. Available from: http://lib.tkk.fi/Diss/2004/isbn9512274639/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuusisto R. Aspects on Availability. A Teleological Adventure of Information in the Lifeworld. [Thesis]. Helsinki University of Technology; 2004. Available from: http://lib.tkk.fi/Diss/2004/isbn9512274639/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

24. Ptanawanit, Surapone. Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia.

Degree: 2002, University of Sydney

 Rich people in Thailand are enjoying higher shares in income transfer than their poor counterparts. This strange phenomenon implies the malfunction of the Thai social… (more)

Subjects/Keywords: social security; social policy; Thailand

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ptanawanit, S. (2002). Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia. (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/487

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ptanawanit, Surapone. “Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia.” 2002. Thesis, University of Sydney. Accessed November 17, 2019. http://hdl.handle.net/2123/487.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ptanawanit, Surapone. “Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia.” 2002. Web. 17 Nov 2019.

Vancouver:

Ptanawanit S. Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia. [Internet] [Thesis]. University of Sydney; 2002. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/2123/487.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ptanawanit S. Crucial Factors in teh Development of Social Security in Thailand in Comparison with Australia. [Thesis]. University of Sydney; 2002. Available from: http://hdl.handle.net/2123/487

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

25. Kim, Hyungchul. Evaluation of power system security and development of transmission pricing method.

Degree: 2004, Texas A&M University

 The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services.… (more)

Subjects/Keywords: Power System; Reliability; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, H. (2004). Evaluation of power system security and development of transmission pricing method. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/1057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kim, Hyungchul. “Evaluation of power system security and development of transmission pricing method.” 2004. Thesis, Texas A&M University. Accessed November 17, 2019. http://hdl.handle.net/1969.1/1057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kim, Hyungchul. “Evaluation of power system security and development of transmission pricing method.” 2004. Web. 17 Nov 2019.

Vancouver:

Kim H. Evaluation of power system security and development of transmission pricing method. [Internet] [Thesis]. Texas A&M University; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/1969.1/1057.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kim H. Evaluation of power system security and development of transmission pricing method. [Thesis]. Texas A&M University; 2004. Available from: http://hdl.handle.net/1969.1/1057

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Oregon State University

26. Tawalbeh, Lo'ai Ali. A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography.

Degree: PhD, Electrical and Computer Engineering, 2004, Oregon State University

 The spread of the internet and communications techniques increases the necessity for security in applications that involves sharing or exchange of secret or private infor-… (more)

Subjects/Keywords: Public key infrastructure (Computer security)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tawalbeh, L. A. (2004). A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/10460

Chicago Manual of Style (16th Edition):

Tawalbeh, Lo'ai Ali. “A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography.” 2004. Doctoral Dissertation, Oregon State University. Accessed November 17, 2019. http://hdl.handle.net/1957/10460.

MLA Handbook (7th Edition):

Tawalbeh, Lo'ai Ali. “A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography.” 2004. Web. 17 Nov 2019.

Vancouver:

Tawalbeh LA. A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography. [Internet] [Doctoral dissertation]. Oregon State University; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/1957/10460.

Council of Science Editors:

Tawalbeh LA. A novel unified algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2[superscript]n) suitable for public-key cryptography. [Doctoral Dissertation]. Oregon State University; 2004. Available from: http://hdl.handle.net/1957/10460


Georgia Tech

27. Clark, Christopher R. Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems.

Degree: MS, Electrical and Computer Engineering, 2004, Georgia Tech

 The objective of this research is to design and develop a reconfigurable string matching co-processor using field-programmable gate array (FPGA) technology that is capable of… (more)

Subjects/Keywords: Network security; Intrusion detection; IDS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clark, C. R. (2004). Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems. (Masters Thesis). Georgia Tech. Retrieved from http://hdl.handle.net/1853/5137

Chicago Manual of Style (16th Edition):

Clark, Christopher R. “Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems.” 2004. Masters Thesis, Georgia Tech. Accessed November 17, 2019. http://hdl.handle.net/1853/5137.

MLA Handbook (7th Edition):

Clark, Christopher R. “Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems.” 2004. Web. 17 Nov 2019.

Vancouver:

Clark CR. Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems. [Internet] [Masters thesis]. Georgia Tech; 2004. [cited 2019 Nov 17]. Available from: http://hdl.handle.net/1853/5137.

Council of Science Editors:

Clark CR. Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems. [Masters Thesis]. Georgia Tech; 2004. Available from: http://hdl.handle.net/1853/5137


Hong Kong University of Science and Technology

28. Liu, Alan. Security issues on server-side credit-based electronic payment systems.

Degree: 2001, Hong Kong University of Science and Technology

 With the rapid growth of the Internet, more and more computer users are demanding more information from the Web. This includes daily news, journal papers,… (more)

Subjects/Keywords: Electronic funds transfers  – Security measures; Data encryption (Computer science); Electronic commerce  – Security measures; Internet  – Security measures; Computer networks  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, A. (2001). Security issues on server-side credit-based electronic payment systems. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b712121 ; http://repository.ust.hk/ir/bitstream/1783.1-5727/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Alan. “Security issues on server-side credit-based electronic payment systems.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b712121 ; http://repository.ust.hk/ir/bitstream/1783.1-5727/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Alan. “Security issues on server-side credit-based electronic payment systems.” 2001. Web. 17 Nov 2019.

Vancouver:

Liu A. Security issues on server-side credit-based electronic payment systems. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b712121 ; http://repository.ust.hk/ir/bitstream/1783.1-5727/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu A. Security issues on server-side credit-based electronic payment systems. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: https://doi.org/10.14711/thesis-b712121 ; http://repository.ust.hk/ir/bitstream/1783.1-5727/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

29. Metaparti, Satya Prakash. Maritime security after 9/11: the shipping industry's response to the terrorist threat.

Degree: M. Phil., 2004, University of Hong Kong

published_or_final_version

toc

abstract

Asian Studies

Master

Master of Philosophy

Advisors/Committee Members: Wong, SL.

Subjects/Keywords: Terrorism - Prevention.; Shipping - Security measures.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Metaparti, S. P. (2004). Maritime security after 9/11: the shipping industry's response to the terrorist threat. (Masters Thesis). University of Hong Kong. Retrieved from Metaparti, S. P.. (2004). Maritime security after 9/11 : the shipping industry's response to the terrorist threat. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2995069 ; http://dx.doi.org/10.5353/th_b2995069 ; http://hdl.handle.net/10722/32087

Chicago Manual of Style (16th Edition):

Metaparti, Satya Prakash. “Maritime security after 9/11: the shipping industry's response to the terrorist threat.” 2004. Masters Thesis, University of Hong Kong. Accessed November 17, 2019. Metaparti, S. P.. (2004). Maritime security after 9/11 : the shipping industry's response to the terrorist threat. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2995069 ; http://dx.doi.org/10.5353/th_b2995069 ; http://hdl.handle.net/10722/32087.

MLA Handbook (7th Edition):

Metaparti, Satya Prakash. “Maritime security after 9/11: the shipping industry's response to the terrorist threat.” 2004. Web. 17 Nov 2019.

Vancouver:

Metaparti SP. Maritime security after 9/11: the shipping industry's response to the terrorist threat. [Internet] [Masters thesis]. University of Hong Kong; 2004. [cited 2019 Nov 17]. Available from: Metaparti, S. P.. (2004). Maritime security after 9/11 : the shipping industry's response to the terrorist threat. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2995069 ; http://dx.doi.org/10.5353/th_b2995069 ; http://hdl.handle.net/10722/32087.

Council of Science Editors:

Metaparti SP. Maritime security after 9/11: the shipping industry's response to the terrorist threat. [Masters Thesis]. University of Hong Kong; 2004. Available from: Metaparti, S. P.. (2004). Maritime security after 9/11 : the shipping industry's response to the terrorist threat. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2995069 ; http://dx.doi.org/10.5353/th_b2995069 ; http://hdl.handle.net/10722/32087


Hong Kong University of Science and Technology

30. Chow, Calvin. A nonparametric density estimation approach to network intrusion detection.

Degree: 2001, Hong Kong University of Science and Technology

 Network intrusion detection has emerged as one of the ways to enforce computer security in recent years. It is the problem of detecting intrusive activities… (more)

Subjects/Keywords: Computer networks  – Security measures; Computer security; Computer networks  – Security measures  – Statistical methods; Computer security  – Statistical methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chow, C. (2001). A nonparametric density estimation approach to network intrusion detection. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b712118 ; http://repository.ust.hk/ir/bitstream/1783.1-5724/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chow, Calvin. “A nonparametric density estimation approach to network intrusion detection.” 2001. Thesis, Hong Kong University of Science and Technology. Accessed November 17, 2019. https://doi.org/10.14711/thesis-b712118 ; http://repository.ust.hk/ir/bitstream/1783.1-5724/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chow, Calvin. “A nonparametric density estimation approach to network intrusion detection.” 2001. Web. 17 Nov 2019.

Vancouver:

Chow C. A nonparametric density estimation approach to network intrusion detection. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2001. [cited 2019 Nov 17]. Available from: https://doi.org/10.14711/thesis-b712118 ; http://repository.ust.hk/ir/bitstream/1783.1-5724/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chow C. A nonparametric density estimation approach to network intrusion detection. [Thesis]. Hong Kong University of Science and Technology; 2001. Available from: https://doi.org/10.14711/thesis-b712118 ; http://repository.ust.hk/ir/bitstream/1783.1-5724/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

.