Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Information Security). Showing records 1 – 30 of 2050 total matches.

[1] [2] [3] [4] [5] … [69]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Nairobi

1. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed February 26, 2021. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 26 Feb 2021.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2021 Feb 26]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Aljuhani, Ahamed. Mitigation of Application Layer DDoS Flood Attack Against Web Servers.

Degree: 2020, The Catholic University of America

The application-layer distributed denial of service (App-DDoS) attack is one of the most menacing types of cyberattacks that circumvent web servers. As attackers have developed… (more)

Subjects/Keywords: Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aljuhani, A. (2020). Mitigation of Application Layer DDoS Flood Attack Against Web Servers. (Thesis). The Catholic University of America. Retrieved from http://hdl.handle.net/1961/cuislandora:213981

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aljuhani, Ahamed. “Mitigation of Application Layer DDoS Flood Attack Against Web Servers.” 2020. Thesis, The Catholic University of America. Accessed February 26, 2021. http://hdl.handle.net/1961/cuislandora:213981.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aljuhani, Ahamed. “Mitigation of Application Layer DDoS Flood Attack Against Web Servers.” 2020. Web. 26 Feb 2021.

Vancouver:

Aljuhani A. Mitigation of Application Layer DDoS Flood Attack Against Web Servers. [Internet] [Thesis]. The Catholic University of America; 2020. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/1961/cuislandora:213981.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aljuhani A. Mitigation of Application Layer DDoS Flood Attack Against Web Servers. [Thesis]. The Catholic University of America; 2020. Available from: http://hdl.handle.net/1961/cuislandora:213981

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Florida

3. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed February 26, 2021. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 26 Feb 2021.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2021 Feb 26]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Peng, Jinghui. Secure covert communications over streaming media using dynamic steganography.

Degree: PhD, 2020, University of West London

 Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems… (more)

Subjects/Keywords: Cyber security; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, J. (2020). Secure covert communications over streaming media using dynamic steganography. (Doctoral Dissertation). University of West London. Retrieved from http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261

Chicago Manual of Style (16th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Doctoral Dissertation, University of West London. Accessed February 26, 2021. http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

MLA Handbook (7th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Web. 26 Feb 2021.

Vancouver:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Internet] [Doctoral dissertation]. University of West London; 2020. [cited 2021 Feb 26]. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

Council of Science Editors:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Doctoral Dissertation]. University of West London; 2020. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261


University of Wollongong

5. Saad Alarifi, Abdulaziz. Assessing and mitigating information security risk in Saudi Arabia.

Degree: Doctor of Philosophy, 2013, University of Wollongong

  While the Web, cell phone ‘apps’ and cloud computing put a world of information at our fingertips, that information is under constant threat from… (more)

Subjects/Keywords: information security; information security awareness; information systems; information security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saad Alarifi, A. (2013). Assessing and mitigating information security risk in Saudi Arabia. (Doctoral Dissertation). University of Wollongong. Retrieved from 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317

Chicago Manual of Style (16th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Doctoral Dissertation, University of Wollongong. Accessed February 26, 2021. 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

MLA Handbook (7th Edition):

Saad Alarifi, Abdulaziz. “Assessing and mitigating information security risk in Saudi Arabia.” 2013. Web. 26 Feb 2021.

Vancouver:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Internet] [Doctoral dissertation]. University of Wollongong; 2013. [cited 2021 Feb 26]. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317.

Council of Science Editors:

Saad Alarifi A. Assessing and mitigating information security risk in Saudi Arabia. [Doctoral Dissertation]. University of Wollongong; 2013. Available from: 0806 INFORMATION SYSTEMS, 080609 Information Systems Management ; https://ro.uow.edu.au/theses/4317


University of Colorado

6. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed February 26, 2021. https://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 26 Feb 2021.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2021 Feb 26]. Available from: https://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69


University of Plymouth

7. Talib, Shuhaili. Personalising information security education.

Degree: PhD, 2014, University of Plymouth

 Whilst technological solutions go a long way in providing protection for users online, it has been long understood that the individual also plays a pivotal… (more)

Subjects/Keywords: 005.8; Information security awareness; Information security education

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Talib, S. (2014). Personalising information security education. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/2896

Chicago Manual of Style (16th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Doctoral Dissertation, University of Plymouth. Accessed February 26, 2021. http://hdl.handle.net/10026.1/2896.

MLA Handbook (7th Edition):

Talib, Shuhaili. “Personalising information security education.” 2014. Web. 26 Feb 2021.

Vancouver:

Talib S. Personalising information security education. [Internet] [Doctoral dissertation]. University of Plymouth; 2014. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/10026.1/2896.

Council of Science Editors:

Talib S. Personalising information security education. [Doctoral Dissertation]. University of Plymouth; 2014. Available from: http://hdl.handle.net/10026.1/2896

8. Kirkham, Andrew Nicholas. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.

Degree: 2016, Marquette University

 This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our… (more)

Subjects/Keywords: cybersecurity; information security; penetration testing; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kirkham, A. N. (2016). Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. (Thesis). Marquette University. Retrieved from https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Thesis, Marquette University. Accessed February 26, 2021. https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kirkham, Andrew Nicholas. “Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework.” 2016. Web. 26 Feb 2021.

Vancouver:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Internet] [Thesis]. Marquette University; 2016. [cited 2021 Feb 26]. Available from: https://epublications.marquette.edu/theses_open/342.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kirkham AN. Evaluating the Gasday Security Policy Through Penetration Testing and Application of the Nist Cybersecurity Framework. [Thesis]. Marquette University; 2016. Available from: https://epublications.marquette.edu/theses_open/342

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


McMaster University

9. Tu, Zhiling. Information Security Management: A Critical Success Factors Analysis.

Degree: PhD, 2015, McMaster University

Information security has been a crucial strategic issue in organizational management. Information security management (ISM) is a systematic process of effectively coping with information security(more)

Subjects/Keywords: Information Security Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tu, Z. (2015). Information Security Management: A Critical Success Factors Analysis. (Doctoral Dissertation). McMaster University. Retrieved from http://hdl.handle.net/11375/18168

Chicago Manual of Style (16th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Doctoral Dissertation, McMaster University. Accessed February 26, 2021. http://hdl.handle.net/11375/18168.

MLA Handbook (7th Edition):

Tu, Zhiling. “Information Security Management: A Critical Success Factors Analysis.” 2015. Web. 26 Feb 2021.

Vancouver:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Internet] [Doctoral dissertation]. McMaster University; 2015. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/11375/18168.

Council of Science Editors:

Tu Z. Information Security Management: A Critical Success Factors Analysis. [Doctoral Dissertation]. McMaster University; 2015. Available from: http://hdl.handle.net/11375/18168


University of Nairobi

10. Abass, Jabir S. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .

Degree: 2009, University of Nairobi

 The need for ICT in financial institutions is increasingly inevitable given that the number of transactions is high, customers are many and spread. In such… (more)

Subjects/Keywords: Information Security Awareness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abass, J. S. (2009). A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Thesis, University of Nairobi. Accessed February 26, 2021. http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abass, Jabir S. “A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya .” 2009. Web. 26 Feb 2021.

Vancouver:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/11295/96497.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abass JS. A Survey Of Implementation Of Information Security Awareness Programs By Financial Institutions In Kenya . [Thesis]. University of Nairobi; 2009. Available from: http://hdl.handle.net/11295/96497

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Melbourne

11. Onibere, Mazino. Information security manager as a strategist.

Degree: 2015, University of Melbourne

 The modern organisation operates within a highly complex and sophisticated security threat landscape that exposes its information infrastructure to a range of security risks. This… (more)

Subjects/Keywords: information security strategy; information security management; information security strategic challenges; information security strategist

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Onibere, M. (2015). Information security manager as a strategist. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/56595

Chicago Manual of Style (16th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Masters Thesis, University of Melbourne. Accessed February 26, 2021. http://hdl.handle.net/11343/56595.

MLA Handbook (7th Edition):

Onibere, Mazino. “Information security manager as a strategist.” 2015. Web. 26 Feb 2021.

Vancouver:

Onibere M. Information security manager as a strategist. [Internet] [Masters thesis]. University of Melbourne; 2015. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/11343/56595.

Council of Science Editors:

Onibere M. Information security manager as a strategist. [Masters Thesis]. University of Melbourne; 2015. Available from: http://hdl.handle.net/11343/56595


University of Hawaii – Manoa

12. Aurigemma, Salvatore. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.

Degree: 2016, University of Hawaii – Manoa

Ph.D. University of Hawaii at Manoa 2013.

Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the… (more)

Subjects/Keywords: information security policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aurigemma, S. (2016). From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. (Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Thesis, University of Hawaii – Manoa. Accessed February 26, 2021. http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Aurigemma, Salvatore. “From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies.” 2016. Web. 26 Feb 2021.

Vancouver:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Internet] [Thesis]. University of Hawaii – Manoa; 2016. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/10125/101889.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Aurigemma S. From the weakest link to the best defense : exploring the factors that affect employee intention to comply with information security policies. [Thesis]. University of Hawaii – Manoa; 2016. Available from: http://hdl.handle.net/10125/101889

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

13. Rueda, Daniel F. Healthcare is the most breached industry : how do we change that?.

Degree: MSin Identity Management and Security, Identity Management and Security, 2017, University of Texas – Austin

 Healthcare is the most breached industry in the United States. Health records are now fetching more money on the black market than credit card numbers.… (more)

Subjects/Keywords: Healthcare; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rueda, D. F. (2017). Healthcare is the most breached industry : how do we change that?. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63766

Chicago Manual of Style (16th Edition):

Rueda, Daniel F. “Healthcare is the most breached industry : how do we change that?.” 2017. Masters Thesis, University of Texas – Austin. Accessed February 26, 2021. http://hdl.handle.net/2152/63766.

MLA Handbook (7th Edition):

Rueda, Daniel F. “Healthcare is the most breached industry : how do we change that?.” 2017. Web. 26 Feb 2021.

Vancouver:

Rueda DF. Healthcare is the most breached industry : how do we change that?. [Internet] [Masters thesis]. University of Texas – Austin; 2017. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/2152/63766.

Council of Science Editors:

Rueda DF. Healthcare is the most breached industry : how do we change that?. [Masters Thesis]. University of Texas – Austin; 2017. Available from: http://hdl.handle.net/2152/63766


University of Cincinnati

14. Marck, Austin J. Abusing Android TV Box for Fun and Profit.

Degree: MS, Education, Criminal Justice, and Human Services: Information Technology-Distance Learning, 2017, University of Cincinnati

 Android devices can execute powerful attacks and leverage vulnerabilities within the Internet of Things (IoT) in ways similar to personal computers. Attacks on the Android… (more)

Subjects/Keywords: Information Technology; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marck, A. J. (2017). Abusing Android TV Box for Fun and Profit. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504786962271509

Chicago Manual of Style (16th Edition):

Marck, Austin J. “Abusing Android TV Box for Fun and Profit.” 2017. Masters Thesis, University of Cincinnati. Accessed February 26, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504786962271509.

MLA Handbook (7th Edition):

Marck, Austin J. “Abusing Android TV Box for Fun and Profit.” 2017. Web. 26 Feb 2021.

Vancouver:

Marck AJ. Abusing Android TV Box for Fun and Profit. [Internet] [Masters thesis]. University of Cincinnati; 2017. [cited 2021 Feb 26]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504786962271509.

Council of Science Editors:

Marck AJ. Abusing Android TV Box for Fun and Profit. [Masters Thesis]. University of Cincinnati; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504786962271509


University of Oxford

15. Ankele, Robin. Addressing syntactic privacy for privacy-preserving data analysis and data release.

Degree: PhD, 2020, University of Oxford

 Existing approaches to tackle the challenges of privacy-preserving data analysis and data release are subject to vulnerabilities from certain attacks (which is the case for… (more)

Subjects/Keywords: Information Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ankele, R. (2020). Addressing syntactic privacy for privacy-preserving data analysis and data release. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:fdbfe37f-4860-4d8c-8f5f-e18ce68136cd ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.820802

Chicago Manual of Style (16th Edition):

Ankele, Robin. “Addressing syntactic privacy for privacy-preserving data analysis and data release.” 2020. Doctoral Dissertation, University of Oxford. Accessed February 26, 2021. http://ora.ox.ac.uk/objects/uuid:fdbfe37f-4860-4d8c-8f5f-e18ce68136cd ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.820802.

MLA Handbook (7th Edition):

Ankele, Robin. “Addressing syntactic privacy for privacy-preserving data analysis and data release.” 2020. Web. 26 Feb 2021.

Vancouver:

Ankele R. Addressing syntactic privacy for privacy-preserving data analysis and data release. [Internet] [Doctoral dissertation]. University of Oxford; 2020. [cited 2021 Feb 26]. Available from: http://ora.ox.ac.uk/objects/uuid:fdbfe37f-4860-4d8c-8f5f-e18ce68136cd ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.820802.

Council of Science Editors:

Ankele R. Addressing syntactic privacy for privacy-preserving data analysis and data release. [Doctoral Dissertation]. University of Oxford; 2020. Available from: http://ora.ox.ac.uk/objects/uuid:fdbfe37f-4860-4d8c-8f5f-e18ce68136cd ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.820802


Loughborough University

16. Al-Hamar, Aisha. Enhancing information security in organisations in Qatar.

Degree: PhD, 2018, Loughborough University

 Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore,… (more)

Subjects/Keywords: 658.4; Information security; Information security policy; Information security awareness; Information security management system; Information security culture; Qatar National Information Assurance policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Hamar, A. (2018). Enhancing information security in organisations in Qatar. (Doctoral Dissertation). Loughborough University. Retrieved from http://hdl.handle.net/2134/33541

Chicago Manual of Style (16th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Doctoral Dissertation, Loughborough University. Accessed February 26, 2021. http://hdl.handle.net/2134/33541.

MLA Handbook (7th Edition):

Al-Hamar, Aisha. “Enhancing information security in organisations in Qatar.” 2018. Web. 26 Feb 2021.

Vancouver:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Internet] [Doctoral dissertation]. Loughborough University; 2018. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/2134/33541.

Council of Science Editors:

Al-Hamar A. Enhancing information security in organisations in Qatar. [Doctoral Dissertation]. Loughborough University; 2018. Available from: http://hdl.handle.net/2134/33541


University of Melbourne

17. Lim, Joo Soon. Defining the relationship between information security culture and information security practices.

Degree: 2012, University of Melbourne

 This thesis investigates the relationship between ‘information security culture’ and ‘information security practices’ in organisations. There has been considerable interest in this relationship due to… (more)

Subjects/Keywords: information security; information security culture; information security practices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lim, J. S. (2012). Defining the relationship between information security culture and information security practices. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/37628

Chicago Manual of Style (16th Edition):

Lim, Joo Soon. “Defining the relationship between information security culture and information security practices.” 2012. Doctoral Dissertation, University of Melbourne. Accessed February 26, 2021. http://hdl.handle.net/11343/37628.

MLA Handbook (7th Edition):

Lim, Joo Soon. “Defining the relationship between information security culture and information security practices.” 2012. Web. 26 Feb 2021.

Vancouver:

Lim JS. Defining the relationship between information security culture and information security practices. [Internet] [Doctoral dissertation]. University of Melbourne; 2012. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/11343/37628.

Council of Science Editors:

Lim JS. Defining the relationship between information security culture and information security practices. [Doctoral Dissertation]. University of Melbourne; 2012. Available from: http://hdl.handle.net/11343/37628

18. Korovessis, Peter. Establishing an information security awareness and culture.

Degree: PhD, 2015, University of Plymouth

 In today’s business environment all business operations are enabled by technology. Its always on and connected nature has brought new business possibilities but at the… (more)

Subjects/Keywords: 005.8; information security awareness; information security culture; information security surveys; information security practices; information security toolkit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Korovessis, P. (2015). Establishing an information security awareness and culture. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/3836

Chicago Manual of Style (16th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Doctoral Dissertation, University of Plymouth. Accessed February 26, 2021. http://hdl.handle.net/10026.1/3836.

MLA Handbook (7th Edition):

Korovessis, Peter. “Establishing an information security awareness and culture.” 2015. Web. 26 Feb 2021.

Vancouver:

Korovessis P. Establishing an information security awareness and culture. [Internet] [Doctoral dissertation]. University of Plymouth; 2015. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/10026.1/3836.

Council of Science Editors:

Korovessis P. Establishing an information security awareness and culture. [Doctoral Dissertation]. University of Plymouth; 2015. Available from: http://hdl.handle.net/10026.1/3836


University of Melbourne

19. Kudallur Ramanathan, Ritu lakshmi. An exploratory study of information security auditing.

Degree: 2016, University of Melbourne

 Management of Information security in organizations is a form of risk management where threats to information assets are managed by implementing various controls. An important… (more)

Subjects/Keywords: Information Security; Security Audit; Audit; Information Security Audit

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kudallur Ramanathan, R. l. (2016). An exploratory study of information security auditing. (Masters Thesis). University of Melbourne. Retrieved from http://hdl.handle.net/11343/212371

Chicago Manual of Style (16th Edition):

Kudallur Ramanathan, Ritu lakshmi. “An exploratory study of information security auditing.” 2016. Masters Thesis, University of Melbourne. Accessed February 26, 2021. http://hdl.handle.net/11343/212371.

MLA Handbook (7th Edition):

Kudallur Ramanathan, Ritu lakshmi. “An exploratory study of information security auditing.” 2016. Web. 26 Feb 2021.

Vancouver:

Kudallur Ramanathan Rl. An exploratory study of information security auditing. [Internet] [Masters thesis]. University of Melbourne; 2016. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/11343/212371.

Council of Science Editors:

Kudallur Ramanathan Rl. An exploratory study of information security auditing. [Masters Thesis]. University of Melbourne; 2016. Available from: http://hdl.handle.net/11343/212371


University of Arkansas

20. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed February 26, 2021. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 26 Feb 2021.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2021 Feb 26]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


University of Sydney

21. Soyref, Maxim. The holistic management of information security processes .

Degree: 2014, University of Sydney

 Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management… (more)

Subjects/Keywords: Cybersecurity; Information security; Strategy; Security process; Security governance; Security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soyref, M. (2014). The holistic management of information security processes . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Thesis, University of Sydney. Accessed February 26, 2021. http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Web. 26 Feb 2021.

Vancouver:

Soyref M. The holistic management of information security processes . [Internet] [Thesis]. University of Sydney; 2014. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soyref M. The holistic management of information security processes . [Thesis]. University of Sydney; 2014. Available from: http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Southern Cross University

22. Ong, Lean-Ping. Awareness of information security risks : an investigation of people aspects (a study in Malaysia).

Degree: 2015, Southern Cross University

 The rapid advances in technology in this millennium pose growing information security risks. Information security breaches can result in data or information loss, damaged reputations,… (more)

Subjects/Keywords: information security; information security awareness; information security risk; people aspects; Business; Information Security; Management Information Systems; Social Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ong, L. (2015). Awareness of information security risks : an investigation of people aspects (a study in Malaysia). (Thesis). Southern Cross University. Retrieved from https://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Thesis, Southern Cross University. Accessed February 26, 2021. https://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ong, Lean-Ping. “Awareness of information security risks : an investigation of people aspects (a study in Malaysia).” 2015. Web. 26 Feb 2021.

Vancouver:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Internet] [Thesis]. Southern Cross University; 2015. [cited 2021 Feb 26]. Available from: https://epubs.scu.edu.au/theses/449.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ong L. Awareness of information security risks : an investigation of people aspects (a study in Malaysia). [Thesis]. Southern Cross University; 2015. Available from: https://epubs.scu.edu.au/theses/449

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universiteit Utrecht

23. Roeling, M.H.F. Towards an aligned organization on information security.

Degree: 2012, Universiteit Utrecht

Information Security is mainly a topic that is considered to be Information Technology related. However, for successfully implementing information security, an organization’s information security program… (more)

Subjects/Keywords: Information Security; Security; Maturity Model; Maturity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Roeling, M. H. F. (2012). Towards an aligned organization on information security. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/255403

Chicago Manual of Style (16th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Masters Thesis, Universiteit Utrecht. Accessed February 26, 2021. http://dspace.library.uu.nl:8080/handle/1874/255403.

MLA Handbook (7th Edition):

Roeling, M H F. “Towards an aligned organization on information security.” 2012. Web. 26 Feb 2021.

Vancouver:

Roeling MHF. Towards an aligned organization on information security. [Internet] [Masters thesis]. Universiteit Utrecht; 2012. [cited 2021 Feb 26]. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403.

Council of Science Editors:

Roeling MHF. Towards an aligned organization on information security. [Masters Thesis]. Universiteit Utrecht; 2012. Available from: http://dspace.library.uu.nl:8080/handle/1874/255403


University of Johannesburg

24. Muchenje, Tonderai. An analysis of the impact of emerging technology on organisations’ internal controls.

Degree: 2013, University of Johannesburg

M.Comm. (Computer Auditing)

This study presents an evaluation of emerging information communication technology (ICT) solutions to the security internal control systems in South African organisations.… (more)

Subjects/Keywords: Computer auditing; Information security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muchenje, T. (2013). An analysis of the impact of emerging technology on organisations’ internal controls. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Thesis, University of Johannesburg. Accessed February 26, 2021. http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muchenje, Tonderai. “An analysis of the impact of emerging technology on organisations’ internal controls.” 2013. Web. 26 Feb 2021.

Vancouver:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Internet] [Thesis]. University of Johannesburg; 2013. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/10210/8597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muchenje T. An analysis of the impact of emerging technology on organisations’ internal controls. [Thesis]. University of Johannesburg; 2013. Available from: http://hdl.handle.net/10210/8597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Wollongong

25. Elashry, Ibrahim. Pairing-free identity-based cryptography.

Degree: PhD, 2015, University of Wollongong

  Identity-based cryptography (IBC) is considered nowadays as the evolution of public key cryptography because it completely eliminates the use of digital certificates by representing… (more)

Subjects/Keywords: Information security-cryptography; key exchange; network security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elashry, I. (2015). Pairing-free identity-based cryptography. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4409

Chicago Manual of Style (16th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Doctoral Dissertation, University of Wollongong. Accessed February 26, 2021. ; https://ro.uow.edu.au/theses/4409.

MLA Handbook (7th Edition):

Elashry, Ibrahim. “Pairing-free identity-based cryptography.” 2015. Web. 26 Feb 2021.

Vancouver:

Elashry I. Pairing-free identity-based cryptography. [Internet] [Doctoral dissertation]. University of Wollongong; 2015. [cited 2021 Feb 26]. Available from: ; https://ro.uow.edu.au/theses/4409.

Council of Science Editors:

Elashry I. Pairing-free identity-based cryptography. [Doctoral Dissertation]. University of Wollongong; 2015. Available from: ; https://ro.uow.edu.au/theses/4409


University of South Africa

26. Nkwana, Mokata Johannes. Protection of security information within government departments in South Africa .

Degree: 2015, University of South Africa

 The protection of security information in government departments requires the active engagement of executive management to assess emerging threats and provide strong security risk control… (more)

Subjects/Keywords: Government departments; Information security; Protective security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nkwana, M. J. (2015). Protection of security information within government departments in South Africa . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/19897

Chicago Manual of Style (16th Edition):

Nkwana, Mokata Johannes. “Protection of security information within government departments in South Africa .” 2015. Masters Thesis, University of South Africa. Accessed February 26, 2021. http://hdl.handle.net/10500/19897.

MLA Handbook (7th Edition):

Nkwana, Mokata Johannes. “Protection of security information within government departments in South Africa .” 2015. Web. 26 Feb 2021.

Vancouver:

Nkwana MJ. Protection of security information within government departments in South Africa . [Internet] [Masters thesis]. University of South Africa; 2015. [cited 2021 Feb 26]. Available from: http://hdl.handle.net/10500/19897.

Council of Science Editors:

Nkwana MJ. Protection of security information within government departments in South Africa . [Masters Thesis]. University of South Africa; 2015. Available from: http://hdl.handle.net/10500/19897

27. Leonard, David. Technetium: Productivity Tracking for Version Control Systems.

Degree: MS(M.S.), Computer Science, 2016, City University of New York

  In recent years, the City College of New York has seen its Computer Science program grow immensely, to the point of overcrowding. This has… (more)

Subjects/Keywords: security; visualization; collaboration; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Leonard, D. (2016). Technetium: Productivity Tracking for Version Control Systems. (Thesis). City University of New York. Retrieved from https://academicworks.cuny.edu/cc_etds_theses/632

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Leonard, David. “Technetium: Productivity Tracking for Version Control Systems.” 2016. Thesis, City University of New York. Accessed February 26, 2021. https://academicworks.cuny.edu/cc_etds_theses/632.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Leonard, David. “Technetium: Productivity Tracking for Version Control Systems.” 2016. Web. 26 Feb 2021.

Vancouver:

Leonard D. Technetium: Productivity Tracking for Version Control Systems. [Internet] [Thesis]. City University of New York; 2016. [cited 2021 Feb 26]. Available from: https://academicworks.cuny.edu/cc_etds_theses/632.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Leonard D. Technetium: Productivity Tracking for Version Control Systems. [Thesis]. City University of New York; 2016. Available from: https://academicworks.cuny.edu/cc_etds_theses/632

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

28. Moccaro, Matthew Francis. Mobile Banking Security Using GPS and LDPC Codes.

Degree: MSCmpE, 2014, University of Arkansas

  Mobile Banking is becoming a major part of our world's financial system. Being able to manage one's finances on a mobile device can provide… (more)

Subjects/Keywords: Banking; Location; Mobile; Privacy; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moccaro, M. F. (2014). Mobile Banking Security Using GPS and LDPC Codes. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2314

Chicago Manual of Style (16th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Masters Thesis, University of Arkansas. Accessed February 26, 2021. https://scholarworks.uark.edu/etd/2314.

MLA Handbook (7th Edition):

Moccaro, Matthew Francis. “Mobile Banking Security Using GPS and LDPC Codes.” 2014. Web. 26 Feb 2021.

Vancouver:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Internet] [Masters thesis]. University of Arkansas; 2014. [cited 2021 Feb 26]. Available from: https://scholarworks.uark.edu/etd/2314.

Council of Science Editors:

Moccaro MF. Mobile Banking Security Using GPS and LDPC Codes. [Masters Thesis]. University of Arkansas; 2014. Available from: https://scholarworks.uark.edu/etd/2314


University of Arkansas

29. Fuentes Tello, Victor. Enforcing database security on cloud using a trusted third party based model.

Degree: MS, 2017, University of Arkansas

  Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or… (more)

Subjects/Keywords: Cloud computing; Database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fuentes Tello, V. (2017). Enforcing database security on cloud using a trusted third party based model. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2438

Chicago Manual of Style (16th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Masters Thesis, University of Arkansas. Accessed February 26, 2021. https://scholarworks.uark.edu/etd/2438.

MLA Handbook (7th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Web. 26 Feb 2021.

Vancouver:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2021 Feb 26]. Available from: https://scholarworks.uark.edu/etd/2438.

Council of Science Editors:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2438


University of Central Florida

30. Trapnell, Tyrone. Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities.

Degree: 2019, University of Central Florida

 The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network… (more)

Subjects/Keywords: Defense and Security Studies; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Trapnell, T. (2019). Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities. (Masters Thesis). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/6342

Chicago Manual of Style (16th Edition):

Trapnell, Tyrone. “Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities.” 2019. Masters Thesis, University of Central Florida. Accessed February 26, 2021. https://stars.library.ucf.edu/etd/6342.

MLA Handbook (7th Edition):

Trapnell, Tyrone. “Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities.” 2019. Web. 26 Feb 2021.

Vancouver:

Trapnell T. Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities. [Internet] [Masters thesis]. University of Central Florida; 2019. [cited 2021 Feb 26]. Available from: https://stars.library.ucf.edu/etd/6342.

Council of Science Editors:

Trapnell T. Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber Vulnerabilities. [Masters Thesis]. University of Central Florida; 2019. Available from: https://stars.library.ucf.edu/etd/6342

[1] [2] [3] [4] [5] … [69]

.