Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

Dates: 2005 – 2009

You searched for subject:( security). Showing records 1 – 30 of 2315 total matches.

[1] [2] [3] [4] [5] … [78]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Penn State University

1. Kamath, Radhesh Muralidhara. Applying Netlabel to Network Access Control in a Virtualized Environment.

Degree: MS, Computer Science and Engineering, 2008, Penn State University

 We consider the problem of transmitting authorization data in a distributed environment comprised of applications hosted on paravirtualized Virtual Machines. The current mechanism, called Labeled… (more)

Subjects/Keywords: network security; virtualization; security; system security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamath, R. M. (2008). Applying Netlabel to Network Access Control in a Virtualized Environment. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8454

Chicago Manual of Style (16th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Masters Thesis, Penn State University. Accessed October 17, 2019. https://etda.libraries.psu.edu/catalog/8454.

MLA Handbook (7th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Web. 17 Oct 2019.

Vancouver:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Internet] [Masters thesis]. Penn State University; 2008. [cited 2019 Oct 17]. Available from: https://etda.libraries.psu.edu/catalog/8454.

Council of Science Editors:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Masters Thesis]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8454


University of KwaZulu-Natal

2. Lokosang, Laila Barnaba. Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan.

Degree: MS, Food security, 2009, University of KwaZulu-Natal

 Hunger and food insecurity has remained an endemic problem in Southern Sudan for the last three decades. Lack of a “gold standard” measure for determining… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lokosang, L. B. (2009). Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/11600

Chicago Manual of Style (16th Edition):

Lokosang, Laila Barnaba. “Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan.” 2009. Masters Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/11600.

MLA Handbook (7th Edition):

Lokosang, Laila Barnaba. “Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan.” 2009. Web. 17 Oct 2019.

Vancouver:

Lokosang LB. Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/11600.

Council of Science Editors:

Lokosang LB. Statistical analysis of determinants of household food insecurity in post-conflict Southern Sudan. [Masters Thesis]. University of KwaZulu-Natal; 2009. Available from: http://hdl.handle.net/10413/11600


University of KwaZulu-Natal

3. Mans, Susanna Elizabeth. Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project.

Degree: Food security, 2007, University of KwaZulu-Natal

 Poverty is caused by inadequate income. Effective assistance to small-scale enterprises may benefit the urban and rural poor. Small enterprises have the potential to create… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mans, S. E. (2007). Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project. (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/5026

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mans, Susanna Elizabeth. “Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project.” 2007. Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/5026.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mans, Susanna Elizabeth. “Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project.” 2007. Web. 17 Oct 2019.

Vancouver:

Mans SE. Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project. [Internet] [Thesis]. University of KwaZulu-Natal; 2007. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/5026.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mans SE. Investigation into the feasibility of a dairy processing enterprise through action research with a group of women from an LRAD project. [Thesis]. University of KwaZulu-Natal; 2007. Available from: http://hdl.handle.net/10413/5026

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

4. Chingondole, Samuel Mpeleka. Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal.

Degree: PhD, Food security, 2007, University of KwaZulu-Natal

 The impact of morbidity and mortality on women’s coping strategies has not been explored or documented in South Africa. Therefore, the main objective of this… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chingondole, S. M. (2007). Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal. (Doctoral Dissertation). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/734

Chicago Manual of Style (16th Edition):

Chingondole, Samuel Mpeleka. “Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal.” 2007. Doctoral Dissertation, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/734.

MLA Handbook (7th Edition):

Chingondole, Samuel Mpeleka. “Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal.” 2007. Web. 17 Oct 2019.

Vancouver:

Chingondole SM. Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal. [Internet] [Doctoral dissertation]. University of KwaZulu-Natal; 2007. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/734.

Council of Science Editors:

Chingondole SM. Investigation of the socio-economic impacts of morbidity and mortality on coping strategies among community garden clubs in Maphephetheni, KwaZulu-Natal. [Doctoral Dissertation]. University of KwaZulu-Natal; 2007. Available from: http://hdl.handle.net/10413/734


Texas A&M University

5. Okorafor, Unoma Ndili. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.

Degree: 2009, Texas A&M University

 Wireless ad hoc and sensor networks are envisioned to be self-organizing and autonomous networks, that may be randomly deployed where no fixed infrastructure is either… (more)

Subjects/Keywords: security; connectivity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okorafor, U. N. (2009). Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2950

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Okorafor, Unoma Ndili. “Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.” 2009. Thesis, Texas A&M University. Accessed October 17, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2950.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Okorafor, Unoma Ndili. “Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.” 2009. Web. 17 Oct 2019.

Vancouver:

Okorafor UN. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2950.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Okorafor UN. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2950

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Antonopoulos, Alexandros. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.

Degree: 2009, University of Patras; Πανεπιστήμιο Πατρών

This dissertation addresses the problem of designing secure subsystems that can exist in non-trusted infrastructures ensuring their own safety to the greatest extent possible. The… (more)

Subjects/Keywords: Ασφάλεια; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Antonopoulos, A. (2009). Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. (Thesis). University of Patras; Πανεπιστήμιο Πατρών. Retrieved from http://hdl.handle.net/10442/hedi/31567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Antonopoulos, Alexandros. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Thesis, University of Patras; Πανεπιστήμιο Πατρών. Accessed October 17, 2019. http://hdl.handle.net/10442/hedi/31567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Antonopoulos, Alexandros. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Web. 17 Oct 2019.

Vancouver:

Antonopoulos A. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Internet] [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10442/hedi/31567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Antonopoulos A. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2009. Available from: http://hdl.handle.net/10442/hedi/31567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

7. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

 Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed October 17, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 17 Oct 2019.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2019 Oct 17]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Dublin City University

8. Dunne, Cameron R. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.

Degree: School of Computing, 2009, Dublin City University

 A new type of service, known as a Location Based Service (LBS), is emerging that incorporates users' location information, and many of these LBSs operate… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dunne, C. R. (2009). An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. (Thesis). Dublin City University. Retrieved from http://doras.dcu.ie/2236/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dunne, Cameron R. “An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.” 2009. Thesis, Dublin City University. Accessed October 17, 2019. http://doras.dcu.ie/2236/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dunne, Cameron R. “An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet.” 2009. Web. 17 Oct 2019.

Vancouver:

Dunne CR. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. [Internet] [Thesis]. Dublin City University; 2009. [cited 2019 Oct 17]. Available from: http://doras.dcu.ie/2236/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dunne CR. An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. [Thesis]. Dublin City University; 2009. Available from: http://doras.dcu.ie/2236/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

9. Irwin, Keith. A System for Managing User Obligations.

Degree: PhD, Computer Science, 2009, North Carolina State University

 As computer systems become a more pervasive part of our societies, actions within those computer systems are becoming increasingly governed by complex policies such as… (more)

Subjects/Keywords: security; obligations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irwin, K. (2009). A System for Managing User Obligations. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5170

Chicago Manual of Style (16th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Doctoral Dissertation, North Carolina State University. Accessed October 17, 2019. http://www.lib.ncsu.edu/resolver/1840.16/5170.

MLA Handbook (7th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Web. 17 Oct 2019.

Vancouver:

Irwin K. A System for Managing User Obligations. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2019 Oct 17]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170.

Council of Science Editors:

Irwin K. A System for Managing User Obligations. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170


University of Bridgeport

10. Lingam, Karthik. Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks .

Degree: 2006, University of Bridgeport

 Advanced and Authenticated Packet Marking (AAPM) scheme is one of the proposed packet marking schemes for the traceback of Denial of Service (DoS) attacks. AAPM… (more)

Subjects/Keywords: Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lingam, K. (2006). Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lingam, Karthik. “Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks .” 2006. Thesis, University of Bridgeport. Accessed October 17, 2019. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lingam, Karthik. “Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks .” 2006. Web. 17 Oct 2019.

Vancouver:

Lingam K. Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks . [Internet] [Thesis]. University of Bridgeport; 2006. [cited 2019 Oct 17]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lingam K. Effectiveness of Advanced and Authenticated Packet Marking Scheme for Trace back of Denial of Service Attacks . [Thesis]. University of Bridgeport; 2006. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bridgeport

11. Gopani, Tushar. Issues Related to Network Security .

Degree: 2005, University of Bridgeport

 As wireless technologies are becoming increasingly easier and cheaper to use, the frequency with which they are implemented in networks is also rising. There are… (more)

Subjects/Keywords: Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gopani, T. (2005). Issues Related to Network Security . (Thesis). University of Bridgeport. Retrieved from https://scholarworks.bridgeport.edu/xmlui/handle/123456789/828

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gopani, Tushar. “Issues Related to Network Security .” 2005. Thesis, University of Bridgeport. Accessed October 17, 2019. https://scholarworks.bridgeport.edu/xmlui/handle/123456789/828.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gopani, Tushar. “Issues Related to Network Security .” 2005. Web. 17 Oct 2019.

Vancouver:

Gopani T. Issues Related to Network Security . [Internet] [Thesis]. University of Bridgeport; 2005. [cited 2019 Oct 17]. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/828.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gopani T. Issues Related to Network Security . [Thesis]. University of Bridgeport; 2005. Available from: https://scholarworks.bridgeport.edu/xmlui/handle/123456789/828

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Victoria University of Wellington

12. Stirling, David. Enhancing Client Honeypots with Grid Services and Workflows.

Degree: 2009, Victoria University of Wellington

 Client honeypots are devices for detecting malicious servers on a network. They interact with potentially malicious servers and analyse the Web pages returned to assess… (more)

Subjects/Keywords: Honeypot (computing); Network security; Security; Distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stirling, D. (2009). Enhancing Client Honeypots with Grid Services and Workflows. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1177

Chicago Manual of Style (16th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Masters Thesis, Victoria University of Wellington. Accessed October 17, 2019. http://hdl.handle.net/10063/1177.

MLA Handbook (7th Edition):

Stirling, David. “Enhancing Client Honeypots with Grid Services and Workflows.” 2009. Web. 17 Oct 2019.

Vancouver:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Internet] [Masters thesis]. Victoria University of Wellington; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10063/1177.

Council of Science Editors:

Stirling D. Enhancing Client Honeypots with Grid Services and Workflows. [Masters Thesis]. Victoria University of Wellington; 2009. Available from: http://hdl.handle.net/10063/1177


Nelson Mandela Metropolitan University

13. Naudé, Kevin Alexander. Assessing program code through static structural similarity.

Degree: MSc, Faculty of Science, 2007, Nelson Mandela Metropolitan University

 Learning to write software requires much practice and frequent assessment. Consequently, the use of computers to assist in the assessment of computer programs has been… (more)

Subjects/Keywords: Computer networks  – Security measures; Internet  – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naudé, K. A. (2007). Assessing program code through static structural similarity. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/578

Chicago Manual of Style (16th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 17, 2019. http://hdl.handle.net/10948/578.

MLA Handbook (7th Edition):

Naudé, Kevin Alexander. “Assessing program code through static structural similarity.” 2007. Web. 17 Oct 2019.

Vancouver:

Naudé KA. Assessing program code through static structural similarity. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10948/578.

Council of Science Editors:

Naudé KA. Assessing program code through static structural similarity. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/578


Texas A&M University

14. Lee, Man Hee. Architectural support for enhancing security in clusters.

Degree: 2009, Texas A&M University

 Cluster computing has emerged as a common approach for providing more comput- ing and data resources in industry as well as in academia. However, since… (more)

Subjects/Keywords: security; cluster; SMP

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lee, M. H. (2009). Architectural support for enhancing security in clusters. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lee, Man Hee. “Architectural support for enhancing security in clusters.” 2009. Thesis, Texas A&M University. Accessed October 17, 2019. http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lee, Man Hee. “Architectural support for enhancing security in clusters.” 2009. Web. 17 Oct 2019.

Vancouver:

Lee MH. Architectural support for enhancing security in clusters. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lee MH. Architectural support for enhancing security in clusters. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

15. Abass, Jabir S. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .

Degree: 2009, University of Nairobi

 The need for ICT in financial institutions is increasingly inevitable given that the number of transactions is high, customers are many and spread. In such… (more)

Subjects/Keywords: Information Security Awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abass, J. S. (2009). A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Thesis, University of Nairobi. Accessed October 17, 2019. http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Web. 17 Oct 2019.

Vancouver:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Thesis]. University of Nairobi; 2009. Available from: http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Chen, Chih-wei. Energy Security and Fossil Fuel Transportation in China.

Degree: Master, Mainland China Studies, 2008, NSYSU

 It is no doubt that 21th century is a high oil price period. It does not cause every country emphasize on itself is energy security(more)

Subjects/Keywords: oil; trainportation; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, C. (2008). Energy Security and Fossil Fuel Transportation in China. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716108-122247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Chih-wei. “Energy Security and Fossil Fuel Transportation in China.” 2008. Thesis, NSYSU. Accessed October 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716108-122247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Chih-wei. “Energy Security and Fossil Fuel Transportation in China.” 2008. Web. 17 Oct 2019.

Vancouver:

Chen C. Energy Security and Fossil Fuel Transportation in China. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Oct 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716108-122247.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen C. Energy Security and Fossil Fuel Transportation in China. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0716108-122247

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

17. Chaitanya, Shiva. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.

Degree: PhD, Computer Science and Engineering, 2009, Penn State University

 Storage security has emerged as a significant area of research in the last decade. Given the rise of sensitive digital data such as online medical… (more)

Subjects/Keywords: Storage Security; Performance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chaitanya, S. (2009). ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9939

Chicago Manual of Style (16th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Doctoral Dissertation, Penn State University. Accessed October 17, 2019. https://etda.libraries.psu.edu/catalog/9939.

MLA Handbook (7th Edition):

Chaitanya, Shiva. “ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS.” 2009. Web. 17 Oct 2019.

Vancouver:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2019 Oct 17]. Available from: https://etda.libraries.psu.edu/catalog/9939.

Council of Science Editors:

Chaitanya S. ADDRESSING PERFORMANCE CHALLENGES IN SECURE STORAGE SYSTEMS. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/9939


Penn State University

18. MURTHY, JANANI. SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION.

Degree: MS, Computer Science and Engineering, 2009, Penn State University

 Automatic Identification (AutoID) technology has introduced innovative ways to collect,manage information and monitor everything from hospital patients and livestock to library books.Radio frequency Identification (RFID)… (more)

Subjects/Keywords: RFID; security; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MURTHY, J. (2009). SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/9554

Chicago Manual of Style (16th Edition):

MURTHY, JANANI. “SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION.” 2009. Masters Thesis, Penn State University. Accessed October 17, 2019. https://etda.libraries.psu.edu/catalog/9554.

MLA Handbook (7th Edition):

MURTHY, JANANI. “SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION.” 2009. Web. 17 Oct 2019.

Vancouver:

MURTHY J. SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION. [Internet] [Masters thesis]. Penn State University; 2009. [cited 2019 Oct 17]. Available from: https://etda.libraries.psu.edu/catalog/9554.

Council of Science Editors:

MURTHY J. SECURITY AND PRIVACY IN LOW COST RADIO FREQUENCY IDENTIFICATION. [Masters Thesis]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/9554

19. Lindell, Joakim. Dominerande affärsmodeller inom området informationssäkerhet.

Degree: 2009, , School of Management

  Computers together with Internet have been growing enormously, during the last decade and the area of information technology has been growing in the same… (more)

Subjects/Keywords: Business models; Information Security; IT-Security; Administrative Security; Computer Sciences; Datavetenskap (datalogi); Business Administration; Företagsekonomi

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lindell, J. (2009). Dominerande affärsmodeller inom området informationssäkerhet. (Thesis). , School of Management. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lindell, Joakim. “Dominerande affärsmodeller inom området informationssäkerhet.” 2009. Thesis, , School of Management. Accessed October 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lindell, Joakim. “Dominerande affärsmodeller inom området informationssäkerhet.” 2009. Web. 17 Oct 2019.

Vancouver:

Lindell J. Dominerande affärsmodeller inom området informationssäkerhet. [Internet] [Thesis]. , School of Management; 2009. [cited 2019 Oct 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lindell J. Dominerande affärsmodeller inom området informationssäkerhet. [Thesis]. , School of Management; 2009. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

20. Maphakela, Madidimalo Rabbie. A model for legal compliance in the South African banking sector : an information security perspective.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the… (more)

Subjects/Keywords: Database security  – South Africa; Computer security  – South Africa; Computer networks  – Security measures  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maphakela, M. R. (2008). A model for legal compliance in the South African banking sector : an information security perspective. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed October 17, 2019. http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Web. 17 Oct 2019.

Vancouver:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Rehman, Aftab Ur. Investigation of Interworked IMS Architecture In Terms Of Traffic Security.

Degree: 2009, , School of Engineering

IMS is the buzz word in today’s telecom industry and believed to be the strongest candidate for the next generation all IP networks. Since… (more)

Subjects/Keywords: IMS; Network Domain Security; Security Gateways; Traffic Security; Authentication and Encryption Algorithms.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rehman, A. U. (2009). Investigation of Interworked IMS Architecture In Terms Of Traffic Security. (Thesis). , School of Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rehman, Aftab Ur. “Investigation of Interworked IMS Architecture In Terms Of Traffic Security.” 2009. Thesis, , School of Engineering. Accessed October 17, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rehman, Aftab Ur. “Investigation of Interworked IMS Architecture In Terms Of Traffic Security.” 2009. Web. 17 Oct 2019.

Vancouver:

Rehman AU. Investigation of Interworked IMS Architecture In Terms Of Traffic Security. [Internet] [Thesis]. , School of Engineering; 2009. [cited 2019 Oct 17]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rehman AU. Investigation of Interworked IMS Architecture In Terms Of Traffic Security. [Thesis]. , School of Engineering; 2009. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

22. Caister, Karen. The impact of policy on perceived livelihood vulnerability : the case of Cato Manor.

Degree: M.Agric., Food security, 2005, University of KwaZulu-Natal

 This dissertation describes the outcome of a sustainable livelihoods approach to assess the livelihood vulnerability of community structures in Cato Manor (an urban renewal project… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Caister, K. (2005). The impact of policy on perceived livelihood vulnerability : the case of Cato Manor. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/4068

Chicago Manual of Style (16th Edition):

Caister, Karen. “The impact of policy on perceived livelihood vulnerability : the case of Cato Manor.” 2005. Masters Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/4068.

MLA Handbook (7th Edition):

Caister, Karen. “The impact of policy on perceived livelihood vulnerability : the case of Cato Manor.” 2005. Web. 17 Oct 2019.

Vancouver:

Caister K. The impact of policy on perceived livelihood vulnerability : the case of Cato Manor. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2005. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/4068.

Council of Science Editors:

Caister K. The impact of policy on perceived livelihood vulnerability : the case of Cato Manor. [Masters Thesis]. University of KwaZulu-Natal; 2005. Available from: http://hdl.handle.net/10413/4068


University of KwaZulu-Natal

23. Majake, Mosela Paulina. Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index.

Degree: M.Agric., Food security, 2005, University of KwaZulu-Natal

 The Free State Department of Agriculture distributed food security packages to Qwaqwa households in 2003. The purpose of distributing food security packages was to improve… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Majake, M. P. (2005). Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/4097

Chicago Manual of Style (16th Edition):

Majake, Mosela Paulina. “Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index.” 2005. Masters Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/4097.

MLA Handbook (7th Edition):

Majake, Mosela Paulina. “Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index.” 2005. Web. 17 Oct 2019.

Vancouver:

Majake MP. Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2005. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/4097.

Council of Science Editors:

Majake MP. Evaluation of the impact of a household food security programme in QwaQwa using a coping strategy index. [Masters Thesis]. University of KwaZulu-Natal; 2005. Available from: http://hdl.handle.net/10413/4097


University of KwaZulu-Natal

24. Miricho, Esther W. Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho.

Degree: M.Agric., Food security, 2005, University of KwaZulu-Natal

 This study investigated the quality and safety of solar dried fruits and vegetables produced by households in three locations in the Butha-Buthe district of Lesotho… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miricho, E. W. (2005). Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/4129

Chicago Manual of Style (16th Edition):

Miricho, Esther W. “Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho.” 2005. Masters Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/4129.

MLA Handbook (7th Edition):

Miricho, Esther W. “Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho.” 2005. Web. 17 Oct 2019.

Vancouver:

Miricho EW. Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2005. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/4129.

Council of Science Editors:

Miricho EW. Food quality and safety of solar dried fruits and vegetables in the Butha-Buthe district, Lesotho. [Masters Thesis]. University of KwaZulu-Natal; 2005. Available from: http://hdl.handle.net/10413/4129


University of KwaZulu-Natal

25. Naidoo, K. D. The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups.

Degree: M.Agric., Food security, 2009, University of KwaZulu-Natal

 Land degradation and soil nutrient depletion have become serious threats to agricultural productivity in sub-Saharan Africa. Soil fertility depletion in smallholder areas has been cited… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naidoo, K. D. (2009). The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups. (Masters Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/501

Chicago Manual of Style (16th Edition):

Naidoo, K D. “The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups.” 2009. Masters Thesis, University of KwaZulu-Natal. Accessed October 17, 2019. http://hdl.handle.net/10413/501.

MLA Handbook (7th Edition):

Naidoo, K D. “The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups.” 2009. Web. 17 Oct 2019.

Vancouver:

Naidoo KD. The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups. [Internet] [Masters thesis]. University of KwaZulu-Natal; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10413/501.

Council of Science Editors:

Naidoo KD. The practice, constraints and perceptions of improving soil quality through manure application : a case study of three smallholder farmer groups. [Masters Thesis]. University of KwaZulu-Natal; 2009. Available from: http://hdl.handle.net/10413/501


University of Auckland

26. Zhu, William Feng. Concepts and techniques in software watermarking and obfuscation.

Degree: 2007, University of Auckland

 With the rapid development of the internet, copying a digital document is so easy and economically affordable that digital piracy is rampant. As a result,… (more)

Subjects/Keywords: computer science; software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhu, W. F. (2007). Concepts and techniques in software watermarking and obfuscation. (Doctoral Dissertation). University of Auckland. Retrieved from http://hdl.handle.net/2292/1511

Chicago Manual of Style (16th Edition):

Zhu, William Feng. “Concepts and techniques in software watermarking and obfuscation.” 2007. Doctoral Dissertation, University of Auckland. Accessed October 17, 2019. http://hdl.handle.net/2292/1511.

MLA Handbook (7th Edition):

Zhu, William Feng. “Concepts and techniques in software watermarking and obfuscation.” 2007. Web. 17 Oct 2019.

Vancouver:

Zhu WF. Concepts and techniques in software watermarking and obfuscation. [Internet] [Doctoral dissertation]. University of Auckland; 2007. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2292/1511.

Council of Science Editors:

Zhu WF. Concepts and techniques in software watermarking and obfuscation. [Doctoral Dissertation]. University of Auckland; 2007. Available from: http://hdl.handle.net/2292/1511


University of Exeter

27. Vieira, Telmo J. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.

Degree: PhD, 2009, University of Exeter

 The emergence of the European Union (EU) as an international actor is an important development for Europeans, but also for the international community. The EU… (more)

Subjects/Keywords: 355; Mediterranean Regional Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vieira, T. J. (2009). Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. (Doctoral Dissertation). University of Exeter. Retrieved from http://hdl.handle.net/10036/67300

Chicago Manual of Style (16th Edition):

Vieira, Telmo J. “Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.” 2009. Doctoral Dissertation, University of Exeter. Accessed October 17, 2019. http://hdl.handle.net/10036/67300.

MLA Handbook (7th Edition):

Vieira, Telmo J. “Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security.” 2009. Web. 17 Oct 2019.

Vancouver:

Vieira TJ. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. [Internet] [Doctoral dissertation]. University of Exeter; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10036/67300.

Council of Science Editors:

Vieira TJ. Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security. [Doctoral Dissertation]. University of Exeter; 2009. Available from: http://hdl.handle.net/10036/67300


University of Utah

28. Clinger, Matthew J. Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system.

Degree: M.Arch;, Architecture & Planning (College of);, 2007, University of Utah

 According to the United States Customs and Border Patrol, 1.2 million people were arrested trying to enter the country illegally in 2005. Of the 70… (more)

Subjects/Keywords: Immigration; Deportation; Homeland Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clinger, M. J. (2007). Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system. (Masters Thesis). University of Utah. Retrieved from http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1120/rec/1269

Chicago Manual of Style (16th Edition):

Clinger, Matthew J. “Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system.” 2007. Masters Thesis, University of Utah. Accessed October 17, 2019. http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1120/rec/1269.

MLA Handbook (7th Edition):

Clinger, Matthew J. “Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system.” 2007. Web. 17 Oct 2019.

Vancouver:

Clinger MJ. Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system. [Internet] [Masters thesis]. University of Utah; 2007. [cited 2019 Oct 17]. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1120/rec/1269.

Council of Science Editors:

Clinger MJ. Undocumented immigrant detainee's rights: removing non-criminal immigrants from the criminal correctional system. [Masters Thesis]. University of Utah; 2007. Available from: http://content.lib.utah.edu/cdm/singleitem/collection/etd2/id/1120/rec/1269


University of Pretoria

29. Da Veiga, Adele. Cultivating and assessing information security culture.

Degree: Computer Science, 2009, University of Pretoria

 The manner in which employees perceive and interact (behave) with controls implemented to protect information assets is one of the main threats to the protection… (more)

Subjects/Keywords: Information security culture; UCTD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Da Veiga, A. (2009). Cultivating and assessing information security culture. (Doctoral Dissertation). University of Pretoria. Retrieved from http://hdl.handle.net/2263/24117

Chicago Manual of Style (16th Edition):

Da Veiga, Adele. “Cultivating and assessing information security culture.” 2009. Doctoral Dissertation, University of Pretoria. Accessed October 17, 2019. http://hdl.handle.net/2263/24117.

MLA Handbook (7th Edition):

Da Veiga, Adele. “Cultivating and assessing information security culture.” 2009. Web. 17 Oct 2019.

Vancouver:

Da Veiga A. Cultivating and assessing information security culture. [Internet] [Doctoral dissertation]. University of Pretoria; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/2263/24117.

Council of Science Editors:

Da Veiga A. Cultivating and assessing information security culture. [Doctoral Dissertation]. University of Pretoria; 2009. Available from: http://hdl.handle.net/2263/24117


University of Nairobi

30. Kiemo, Peter M. Evaluation of security of information systems in the Kenyan banking industry .

Degree: 2009, University of Nairobi

 This project evaluates the security of information systems in the Kenyan banking industry by examining the systems utilized by the Kenyan banks, challenges encountered in… (more)

Subjects/Keywords: INFORMATION SYSTEMS; BANKS; SECURITY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kiemo, P. M. (2009). Evaluation of security of information systems in the Kenyan banking industry . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kiemo, Peter M. “Evaluation of security of information systems in the Kenyan banking industry .” 2009. Thesis, University of Nairobi. Accessed October 17, 2019. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kiemo, Peter M. “Evaluation of security of information systems in the Kenyan banking industry .” 2009. Web. 17 Oct 2019.

Vancouver:

Kiemo PM. Evaluation of security of information systems in the Kenyan banking industry . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2019 Oct 17]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kiemo PM. Evaluation of security of information systems in the Kenyan banking industry . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/7942

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [78]

.