Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(DATA SECURITY DATA PROTECTION OPERATING SYSTEMS ). Showing records 1 – 30 of 109858 total matches.

[1] [2] [3] [4] [5] … [3662]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters


Northeastern University

1. Onarlioglu, Kaan. Retrofitting privacy into operating systems.

Degree: PhD, Information Assurance Program, 2016, Northeastern University

 The changing technology and adversarial models often render existing privacy defenses obsolete, or lead to the emergence of new privacy-sensitive computer resources. This necessitates the… (more)

Subjects/Keywords: operating systems; privacy; security; Computer security; Operating systems (Computers); Security measures; Computers; Access control; Data protection; Data encryption (Computer science); Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Onarlioglu, K. (2016). Retrofitting privacy into operating systems. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20234593

Chicago Manual of Style (16th Edition):

Onarlioglu, Kaan. “Retrofitting privacy into operating systems.” 2016. Doctoral Dissertation, Northeastern University. Accessed December 12, 2019. http://hdl.handle.net/2047/D20234593.

MLA Handbook (7th Edition):

Onarlioglu, Kaan. “Retrofitting privacy into operating systems.” 2016. Web. 12 Dec 2019.

Vancouver:

Onarlioglu K. Retrofitting privacy into operating systems. [Internet] [Doctoral dissertation]. Northeastern University; 2016. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/2047/D20234593.

Council of Science Editors:

Onarlioglu K. Retrofitting privacy into operating systems. [Doctoral Dissertation]. Northeastern University; 2016. Available from: http://hdl.handle.net/2047/D20234593


ETH Zürich

2. Staub, Cedric. Adding support for user-defined sorts and sorted function symbols to Tamarin.

Degree: 2013, ETH Zürich

 A security protocol is an exchange of messages between multiple parties with the intent of achieving certain security properties, such as confidentiality of message contents… (more)

Subjects/Keywords: CODIERUNG (INFORMATIONSTHEORIE); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); CODING (INFORMATION THEORY); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Staub, C. (2013). Adding support for user-defined sorts and sorted function symbols to Tamarin. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/73721

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Staub, Cedric. “Adding support for user-defined sorts and sorted function symbols to Tamarin.” 2013. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/73721.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Staub, Cedric. “Adding support for user-defined sorts and sorted function symbols to Tamarin.” 2013. Web. 12 Dec 2019.

Vancouver:

Staub C. Adding support for user-defined sorts and sorted function symbols to Tamarin. [Internet] [Thesis]. ETH Zürich; 2013. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/73721.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Staub C. Adding support for user-defined sorts and sorted function symbols to Tamarin. [Thesis]. ETH Zürich; 2013. Available from: http://hdl.handle.net/20.500.11850/73721

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

3. Chen, L. Achieving trust-oriented data protection in the cloud environment.

Degree: 2014, University of Technology, Sydney

 Cloud computing has gained increasing acceptance in recent years. In privacy-conscious domains such as healthcare and banking, however, data security and privacy are the greatest… (more)

Subjects/Keywords: Data protection.; Cloud computing.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2014). Achieving trust-oriented data protection in the cloud environment. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Thesis, University of Technology, Sydney. Accessed December 12, 2019. http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Web. 12 Dec 2019.

Vancouver:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Internet] [Thesis]. University of Technology, Sydney; 2014. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Thesis]. University of Technology, Sydney; 2014. Available from: http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

4. Oost, DJ. Information security management : an empirical analysis of its constitution.

Degree: 2009, University of Technology, Sydney

 This thesis addresses the following research questions: How does analysis of the everyday discursive work of information security managers inform us about the phenomena that… (more)

Subjects/Keywords: Computer security.; Data protection.; Management.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Oost, D. (2009). Information security management : an empirical analysis of its constitution. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Thesis, University of Technology, Sydney. Accessed December 12, 2019. http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Oost, DJ. “Information security management : an empirical analysis of its constitution.” 2009. Web. 12 Dec 2019.

Vancouver:

Oost D. Information security management : an empirical analysis of its constitution. [Internet] [Thesis]. University of Technology, Sydney; 2009. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10453/29869.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Oost D. Information security management : an empirical analysis of its constitution. [Thesis]. University of Technology, Sydney; 2009. Available from: http://hdl.handle.net/10453/29869

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

5. [No author]. A framework for information security management in local government.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the… (more)

Subjects/Keywords: Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2017). A framework for information security management in local government. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “A framework for information security management in local government.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “A framework for information security management in local government.” 2017. Web. 12 Dec 2019.

Vancouver:

author] [. A framework for information security management in local government. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. A framework for information security management in local government. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

6. Von Solms, Rossouw. Information security management : processes and metrics.

Degree: 2014, University of Johannesburg

PhD. (Informatics)

Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization.… (more)

Subjects/Keywords: Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). Information security management : processes and metrics. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Thesis, University of Johannesburg. Accessed December 12, 2019. http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Web. 12 Dec 2019.

Vancouver:

Von Solms R. Information security management : processes and metrics. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. Information security management : processes and metrics. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rutgers University

7. Salles-Loustau, Gabriel, 1986-. Data protection via virtual micro security perimeters.

Degree: PhD, Electrical and Computer Engineering, 2018, Rutgers University

Mobile devices have become the platform of reference for data consumption. Between personal and work related usages, users entrust their mobile devices to handle data(more)

Subjects/Keywords: Computer security; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salles-Loustau, Gabriel, 1. (2018). Data protection via virtual micro security perimeters. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/57699/

Chicago Manual of Style (16th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Doctoral Dissertation, Rutgers University. Accessed December 12, 2019. https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

MLA Handbook (7th Edition):

Salles-Loustau, Gabriel, 1986-. “Data protection via virtual micro security perimeters.” 2018. Web. 12 Dec 2019.

Vancouver:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Internet] [Doctoral dissertation]. Rutgers University; 2018. [cited 2019 Dec 12]. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/.

Council of Science Editors:

Salles-Loustau, Gabriel 1. Data protection via virtual micro security perimeters. [Doctoral Dissertation]. Rutgers University; 2018. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/57699/


Univerzitet u Beogradu

8. Damjanović, Boris S., 1965-. Adaptibilna primjena AES algoritma kod savremenih operativnih sistema.

Degree: Fakultet organizacionih nauka, 2016, Univerzitet u Beogradu

Tehničke nauke - Informacione tehnologije / Technical sciences - Information technologies

Današnji kriptografski algoritmi su dizajnirani tako da kombinuju složene matematičke postupke sa teorijom i… (more)

Subjects/Keywords: cryptography; algorithms; data structures and algorithms; AES, computer systems security; adaptable operating systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Damjanović, Boris S., 1. (2016). Adaptibilna primjena AES algoritma kod savremenih operativnih sistema. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:13116/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Damjanović, Boris S., 1965-. “Adaptibilna primjena AES algoritma kod savremenih operativnih sistema.” 2016. Thesis, Univerzitet u Beogradu. Accessed December 12, 2019. https://fedorabg.bg.ac.rs/fedora/get/o:13116/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Damjanović, Boris S., 1965-. “Adaptibilna primjena AES algoritma kod savremenih operativnih sistema.” 2016. Web. 12 Dec 2019.

Vancouver:

Damjanović, Boris S. 1. Adaptibilna primjena AES algoritma kod savremenih operativnih sistema. [Internet] [Thesis]. Univerzitet u Beogradu; 2016. [cited 2019 Dec 12]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13116/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Damjanović, Boris S. 1. Adaptibilna primjena AES algoritma kod savremenih operativnih sistema. [Thesis]. Univerzitet u Beogradu; 2016. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:13116/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

9. Holenstein, Thomas. Strengthening key agreement using hard-core sets.

Degree: 2006, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Holenstein, T. (2006). Strengthening key agreement using hard-core sets. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/2607

Chicago Manual of Style (16th Edition):

Holenstein, Thomas. “Strengthening key agreement using hard-core sets.” 2006. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/2607.

MLA Handbook (7th Edition):

Holenstein, Thomas. “Strengthening key agreement using hard-core sets.” 2006. Web. 12 Dec 2019.

Vancouver:

Holenstein T. Strengthening key agreement using hard-core sets. [Internet] [Doctoral dissertation]. ETH Zürich; 2006. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/2607.

Council of Science Editors:

Holenstein T. Strengthening key agreement using hard-core sets. [Doctoral Dissertation]. ETH Zürich; 2006. Available from: http://hdl.handle.net/20.500.11850/2607


ETH Zürich

10. Sevinç, Paul Ersin. Securing information by controlling access to data in documents.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); ACCESS (OPERATING SYSTEMS); ELECTRONIC PUBLISHING + DESKTOP PUBLISHING; ZUGRIFF (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sevinç, P. E. (2007). Securing information by controlling access to data in documents. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72764

Chicago Manual of Style (16th Edition):

Sevinç, Paul Ersin. “Securing information by controlling access to data in documents.” 2007. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/72764.

MLA Handbook (7th Edition):

Sevinç, Paul Ersin. “Securing information by controlling access to data in documents.” 2007. Web. 12 Dec 2019.

Vancouver:

Sevinç PE. Securing information by controlling access to data in documents. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/72764.

Council of Science Editors:

Sevinç PE. Securing information by controlling access to data in documents. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/72764


ETH Zürich

11. Lüssi, Cécile. Signature-based extrusion detection.

Degree: 2008, ETH Zürich

Subjects/Keywords: ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lüssi, C. (2008). Signature-based extrusion detection. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lüssi, Cécile. “Signature-based extrusion detection.” 2008. Web. 12 Dec 2019.

Vancouver:

Lüssi C. Signature-based extrusion detection. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/150670.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lüssi C. Signature-based extrusion detection. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150670

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

12. Yu, Der-Yeuan. USB Communication Security: Threats and Countermeasures.

Degree: 2012, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA BUSES + FIELD BUSES (DATA TRANSMISSION); DATENBUSSE + FELDBUSSE (DATENÜBERTRAGUNG); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, D. (2012). USB Communication Security: Threats and Countermeasures. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/115272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Der-Yeuan. “USB Communication Security: Threats and Countermeasures.” 2012. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/115272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Der-Yeuan. “USB Communication Security: Threats and Countermeasures.” 2012. Web. 12 Dec 2019.

Vancouver:

Yu D. USB Communication Security: Threats and Countermeasures. [Internet] [Thesis]. ETH Zürich; 2012. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/115272.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu D. USB Communication Security: Threats and Countermeasures. [Thesis]. ETH Zürich; 2012. Available from: http://hdl.handle.net/20.500.11850/115272

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

13. Grüter, Martin. Security and multi user support for BioOpera.

Degree: 2002, ETH Zürich

Subjects/Keywords: DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); DATENKOMMUNIKATION (COMPUTERSYSTEME); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grüter, M. (2002). Security and multi user support for BioOpera. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/146774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grüter, Martin. “Security and multi user support for BioOpera.” 2002. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/146774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grüter, Martin. “Security and multi user support for BioOpera.” 2002. Web. 12 Dec 2019.

Vancouver:

Grüter M. Security and multi user support for BioOpera. [Internet] [Thesis]. ETH Zürich; 2002. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/146774.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grüter M. Security and multi user support for BioOpera. [Thesis]. ETH Zürich; 2002. Available from: http://hdl.handle.net/20.500.11850/146774

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

14. Beaudry, Normand J. Assumptions in quantum cryptography.

Degree: 2014, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); QUANTUM CRYPTOGRAPHY (INFORMATION THEORY); QUANTENKRYPTOGRAPHIE (INFORMATIONSTHEORIE); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/530; Physics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beaudry, N. J. (2014). Assumptions in quantum cryptography. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/100541

Chicago Manual of Style (16th Edition):

Beaudry, Normand J. “Assumptions in quantum cryptography.” 2014. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/100541.

MLA Handbook (7th Edition):

Beaudry, Normand J. “Assumptions in quantum cryptography.” 2014. Web. 12 Dec 2019.

Vancouver:

Beaudry NJ. Assumptions in quantum cryptography. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/100541.

Council of Science Editors:

Beaudry NJ. Assumptions in quantum cryptography. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/100541


ETH Zürich

15. Frau, Simone. Analysis of reachability properties in communicating authorization policies.

Degree: 2012, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); DATENKOMMUNIKATION (COMPUTERSYSTEME); CRYPTOGRAPHY (INFORMATION THEORY); AUTHENTIFICATION (OPERATING SYSTEMS); KRYPTOGRAPHIE (INFORMATIONSTHEORIE); AUTHENTIFIKATION (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frau, S. (2012). Analysis of reachability properties in communicating authorization policies. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/72816

Chicago Manual of Style (16th Edition):

Frau, Simone. “Analysis of reachability properties in communicating authorization policies.” 2012. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/72816.

MLA Handbook (7th Edition):

Frau, Simone. “Analysis of reachability properties in communicating authorization policies.” 2012. Web. 12 Dec 2019.

Vancouver:

Frau S. Analysis of reachability properties in communicating authorization policies. [Internet] [Doctoral dissertation]. ETH Zürich; 2012. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/72816.

Council of Science Editors:

Frau S. Analysis of reachability properties in communicating authorization policies. [Doctoral Dissertation]. ETH Zürich; 2012. Available from: http://hdl.handle.net/20.500.11850/72816


ETH Zürich

16. Mödersheim, Sebastian A. Models and methods for the automated analysis of security protocols.

Degree: 2007, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mödersheim, S. A. (2007). Models and methods for the automated analysis of security protocols. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/4063

Chicago Manual of Style (16th Edition):

Mödersheim, Sebastian A. “Models and methods for the automated analysis of security protocols.” 2007. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/4063.

MLA Handbook (7th Edition):

Mödersheim, Sebastian A. “Models and methods for the automated analysis of security protocols.” 2007. Web. 12 Dec 2019.

Vancouver:

Mödersheim SA. Models and methods for the automated analysis of security protocols. [Internet] [Doctoral dissertation]. ETH Zürich; 2007. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/4063.

Council of Science Editors:

Mödersheim SA. Models and methods for the automated analysis of security protocols. [Doctoral Dissertation]. ETH Zürich; 2007. Available from: http://hdl.handle.net/20.500.11850/4063


University of Johannesburg

17. Von Solms, Rossouw. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.

Degree: 2014, University of Johannesburg

M.Sc. (Informatics)

Information is power. Any organization must secure and protect its entire information assets. Management is responsible for the well-being of the organization and… (more)

Subjects/Keywords: Electronic data processing departments - Security measures; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Thesis, University of Johannesburg. Accessed December 12, 2019. http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Web. 12 Dec 2019.

Vancouver:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


ETH Zürich

18. Pöpper, Christina. A security analyzer for multi-threaded programs.

Degree: 2005, ETH Zürich

Subjects/Keywords: DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); MULTIPROCESSING + MULTIPROGRAMMING + MULTITASKING (OPERATING SYSTEMS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); MEHRPROGRAMMBETRIEB (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; info:eu-repo/classification/ddc/004; Data processing, computer science; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pöpper, C. (2005). A security analyzer for multi-threaded programs. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/148524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pöpper, Christina. “A security analyzer for multi-threaded programs.” 2005. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/148524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pöpper, Christina. “A security analyzer for multi-threaded programs.” 2005. Web. 12 Dec 2019.

Vancouver:

Pöpper C. A security analyzer for multi-threaded programs. [Internet] [Thesis]. ETH Zürich; 2005. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/148524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pöpper C. A security analyzer for multi-threaded programs. [Thesis]. ETH Zürich; 2005. Available from: http://hdl.handle.net/20.500.11850/148524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cambridge

19. Schwarzkopf, Malte. Operating system support for warehouse-scale computing.

Degree: PhD, 2018, University of Cambridge

 Modern applications are increasingly backed by large-scale data centres. Systems software in these data centre environments, however, faces substantial challenges: the lack of uniform resource… (more)

Subjects/Keywords: operating systems; datacenters; big data; cluster scheduling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schwarzkopf, M. (2018). Operating system support for warehouse-scale computing. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/279062 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.753436

Chicago Manual of Style (16th Edition):

Schwarzkopf, Malte. “Operating system support for warehouse-scale computing.” 2018. Doctoral Dissertation, University of Cambridge. Accessed December 12, 2019. https://www.repository.cam.ac.uk/handle/1810/279062 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.753436.

MLA Handbook (7th Edition):

Schwarzkopf, Malte. “Operating system support for warehouse-scale computing.” 2018. Web. 12 Dec 2019.

Vancouver:

Schwarzkopf M. Operating system support for warehouse-scale computing. [Internet] [Doctoral dissertation]. University of Cambridge; 2018. [cited 2019 Dec 12]. Available from: https://www.repository.cam.ac.uk/handle/1810/279062 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.753436.

Council of Science Editors:

Schwarzkopf M. Operating system support for warehouse-scale computing. [Doctoral Dissertation]. University of Cambridge; 2018. Available from: https://www.repository.cam.ac.uk/handle/1810/279062 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.753436


North Carolina State University

20. Zhang, Zhe. Adding Coordination to the Management of High-End Storage Systems.

Degree: PhD, Computer Science, 2009, North Carolina State University

 Today’s scientific and commercial applications rely heavily on high-end computing(HEC) facilities, including large scale datacenters, supercomputers, and so forth. In these facilities, the storage subsystems… (more)

Subjects/Keywords: Data Storage; Supply Chain Management; Operating Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Z. (2009). Adding Coordination to the Management of High-End Storage Systems. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/4865

Chicago Manual of Style (16th Edition):

Zhang, Zhe. “Adding Coordination to the Management of High-End Storage Systems.” 2009. Doctoral Dissertation, North Carolina State University. Accessed December 12, 2019. http://www.lib.ncsu.edu/resolver/1840.16/4865.

MLA Handbook (7th Edition):

Zhang, Zhe. “Adding Coordination to the Management of High-End Storage Systems.” 2009. Web. 12 Dec 2019.

Vancouver:

Zhang Z. Adding Coordination to the Management of High-End Storage Systems. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2019 Dec 12]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/4865.

Council of Science Editors:

Zhang Z. Adding Coordination to the Management of High-End Storage Systems. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/4865


ETH Zürich

21. Lai, Xuejia. On the design and security of block ciphers.

Degree: 1992, ETH Zürich

Subjects/Keywords: KRYPTOGRAPHIE + GEHEIMSCHRIFTEN; DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); CRYPTOGRAPHY + CYPHERS + CODES; DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lai, X. (1992). On the design and security of block ciphers. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/140723

Chicago Manual of Style (16th Edition):

Lai, Xuejia. “On the design and security of block ciphers.” 1992. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/140723.

MLA Handbook (7th Edition):

Lai, Xuejia. “On the design and security of block ciphers.” 1992. Web. 12 Dec 2019.

Vancouver:

Lai X. On the design and security of block ciphers. [Internet] [Doctoral dissertation]. ETH Zürich; 1992. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/140723.

Council of Science Editors:

Lai X. On the design and security of block ciphers. [Doctoral Dissertation]. ETH Zürich; 1992. Available from: http://hdl.handle.net/20.500.11850/140723


ETH Zürich

22. Montalto, Bruno C. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.

Degree: 2014, ETH Zürich

Subjects/Keywords: VERIFICATION (SOFTWARE ENGINEERING); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); VERIFIKATION (SOFTWARE ENGINEERING); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Montalto, B. C. (2014). Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. (Doctoral Dissertation). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/96309

Chicago Manual of Style (16th Edition):

Montalto, Bruno C. “Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.” 2014. Doctoral Dissertation, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/96309.

MLA Handbook (7th Edition):

Montalto, Bruno C. “Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis.” 2014. Web. 12 Dec 2019.

Vancouver:

Montalto BC. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. [Internet] [Doctoral dissertation]. ETH Zürich; 2014. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/96309.

Council of Science Editors:

Montalto BC. Equivalence Properties and Probabilistic Reasoning in Symbolic Security Protocol Analysis. [Doctoral Dissertation]. ETH Zürich; 2014. Available from: http://hdl.handle.net/20.500.11850/96309


ETH Zürich

23. Jotterand, Arnaud. Usage control in secure messaging.

Degree: 2008, ETH Zürich

Subjects/Keywords: NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME); ZUGRIFFSKONTROLLE (BETRIEBSSYSTEME); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME); NETWORK MONITORING (COMPUTER SYSTEMS); ACCESS CONTROL (OPERATING SYSTEMS); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); info:eu-repo/classification/ddc/004; Data processing, computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jotterand, A. (2008). Usage control in secure messaging. (Thesis). ETH Zürich. Retrieved from http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Thesis, ETH Zürich. Accessed December 12, 2019. http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jotterand, Arnaud. “Usage control in secure messaging.” 2008. Web. 12 Dec 2019.

Vancouver:

Jotterand A. Usage control in secure messaging. [Internet] [Thesis]. ETH Zürich; 2008. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/20.500.11850/150366.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jotterand A. Usage control in secure messaging. [Thesis]. ETH Zürich; 2008. Available from: http://hdl.handle.net/20.500.11850/150366

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

24. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 12 Dec 2019.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Nelson Mandela Metropolitan University

25. Reid, Rayne. A brain-compatible approach to the presentation of cyber security educational material.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2012). A brain-compatible approach to the presentation of cyber security educational material. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019895

Chicago Manual of Style (16th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/d1019895.

MLA Handbook (7th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Web. 12 Dec 2019.

Vancouver:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/d1019895.

Council of Science Editors:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1019895


Nelson Mandela Metropolitan University

26. Maninjwa, Prosecutor Mvikeli. Managing an information security policy architecture : a technical documentation perspective.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However,… (more)

Subjects/Keywords: Computer security  – Management; Computer architecture; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maninjwa, P. M. (2012). Managing an information security policy architecture : a technical documentation perspective. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1020757

Chicago Manual of Style (16th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/d1020757.

MLA Handbook (7th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Web. 12 Dec 2019.

Vancouver:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/d1020757.

Council of Science Editors:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1020757


Nelson Mandela Metropolitan University

27. Boshoff, Ryno. A baseline for information security knowledge for end users.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boshoff, R. (2012). A baseline for information security knowledge for end users. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Web. 12 Dec 2019.

Vancouver:

Boshoff R. A baseline for information security knowledge for end users. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boshoff R. A baseline for information security knowledge for end users. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

28. Cui, Xingmin. Data privacy of Android applications and name privacy of NDN.

Degree: PhD, 2016, University of Hong Kong

 We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two… (more)

Subjects/Keywords: Computer networks - Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, X. (2016). Data privacy of Android applications and name privacy of NDN. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236581

Chicago Manual of Style (16th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed December 12, 2019. http://hdl.handle.net/10722/236581.

MLA Handbook (7th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Web. 12 Dec 2019.

Vancouver:

Cui X. Data privacy of Android applications and name privacy of NDN. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10722/236581.

Council of Science Editors:

Cui X. Data privacy of Android applications and name privacy of NDN. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236581


Nelson Mandela Metropolitan University

29. Jansson, Kenny. A model for cultivating resistance to social engineering attacks.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in… (more)

Subjects/Keywords: Computer security; Data protection; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed December 12, 2019. http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 12 Dec 2019.

Vancouver:

Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidad Nacional de La Plata

30. Corvi, Javier Omar. Componente genérico de auditoría para monitorear cambios en el modelo de objetos.

Degree: 2011, Universidad Nacional de La Plata

En las aplicaciones de software que manejan información crítica, la seguridad y la auditoría de la misma es un requerimiento obligatorio a la hora de… (more)

Subjects/Keywords: Ciencias Informáticas; Security and Protection; Data models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corvi, J. O. (2011). Componente genérico de auditoría para monitorear cambios en el modelo de objetos. (Thesis). Universidad Nacional de La Plata. Retrieved from http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Thesis, Universidad Nacional de La Plata. Accessed December 12, 2019. http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Web. 12 Dec 2019.

Vancouver:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Internet] [Thesis]. Universidad Nacional de La Plata; 2011. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Thesis]. Universidad Nacional de La Plata; 2011. Available from: http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] … [3662]

.