Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(data security). Showing records 1 – 30 of 1099 total matches.

[1] [2] [3] [4] [5] … [37]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Virginia Tech

1. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed April 02, 2020. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 02 Apr 2020.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


Open Universiteit Nederland

2. Jacobs, Edson. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .

Degree: 2017, Open Universiteit Nederland

 Het doel van dit onderzoek is om na te gaan in hoeverre het binnen de Arubaanse overheidsdiensten mogelijk is data op smartphones van de medewerkers… (more)

Subjects/Keywords: Mobile Security; Cybercrime Data; Data Security; Enterprise Security Architect; Information Security; Organizational Data

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jacobs, E. (2017). To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . (Masters Thesis). Open Universiteit Nederland. Retrieved from http://hdl.handle.net/1820/9563

Chicago Manual of Style (16th Edition):

Jacobs, Edson. “To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .” 2017. Masters Thesis, Open Universiteit Nederland. Accessed April 02, 2020. http://hdl.handle.net/1820/9563.

MLA Handbook (7th Edition):

Jacobs, Edson. “To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? .” 2017. Web. 02 Apr 2020.

Vancouver:

Jacobs E. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . [Internet] [Masters thesis]. Open Universiteit Nederland; 2017. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/1820/9563.

Council of Science Editors:

Jacobs E. To what extent is it possible to effectively protect corporate data on the smartphone of the employee against cybercrime? . [Masters Thesis]. Open Universiteit Nederland; 2017. Available from: http://hdl.handle.net/1820/9563

3. Rawat, Umashankar. Secure and efficient distributed cryptographic file systems;.

Degree: Computer Science Engineering, 2013, Jaypee University of Engineering and Technology, Guna

The need for data security emerges from the widespread deployment of shared file systems, greater mobility of computers and the rapid miniaturization of storage devices.… (more)

Subjects/Keywords: Cryptography; Data Security; Distributed System; Linux Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rawat, U. (2013). Secure and efficient distributed cryptographic file systems;. (Thesis). Jaypee University of Engineering and Technology, Guna. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Thesis, Jaypee University of Engineering and Technology, Guna. Accessed April 02, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rawat, Umashankar. “Secure and efficient distributed cryptographic file systems;.” 2013. Web. 02 Apr 2020.

Vancouver:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Internet] [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. [cited 2020 Apr 02]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rawat U. Secure and efficient distributed cryptographic file systems;. [Thesis]. Jaypee University of Engineering and Technology, Guna; 2013. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/10894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

4. Von Solms, Rossouw. Information security management : processes and metrics.

Degree: 2014, University of Johannesburg

PhD. (Informatics)

Organizations become daily more dependent on information. Information is captured, processed, stored and distributed by the information resources and services within the organization.… (more)

Subjects/Keywords: Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). Information security management : processes and metrics. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “Information security management : processes and metrics.” 2014. Web. 02 Apr 2020.

Vancouver:

Von Solms R. Information security management : processes and metrics. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/12038.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. Information security management : processes and metrics. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12038

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

5. Bai, Kun. Damage Management in Database Management Systems.

Degree: PhD, Information Sciences and Technology, 2009, Penn State University

 In the past two decades there have been many advances in the field of computer security. However, since vulnerabilities cannot be completely removed from a… (more)

Subjects/Keywords: Security; Data Damage; Database; Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, K. (2009). Damage Management in Database Management Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/10565

Chicago Manual of Style (16th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Doctoral Dissertation, Penn State University. Accessed April 02, 2020. https://etda.libraries.psu.edu/catalog/10565.

MLA Handbook (7th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Web. 02 Apr 2020.

Vancouver:

Bai K. Damage Management in Database Management Systems. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2020 Apr 02]. Available from: https://etda.libraries.psu.edu/catalog/10565.

Council of Science Editors:

Bai K. Damage Management in Database Management Systems. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/10565


Nelson Mandela Metropolitan University

6. [No author]. A framework for information security management in local government.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2017, Nelson Mandela Metropolitan University

 Information has become so pervasive within enterprises and everyday life, that it is almost indispensable. This is clear as information has become core to the… (more)

Subjects/Keywords: Computer security  – Management; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2017). A framework for information security management in local government. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “A framework for information security management in local government.” 2017. Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “A framework for information security management in local government.” 2017. Web. 02 Apr 2020.

Vancouver:

author] [. A framework for information security management in local government. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2017. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/7588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. A framework for information security management in local government. [Thesis]. Nelson Mandela Metropolitan University; 2017. Available from: http://hdl.handle.net/10948/7588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

7. Nan, Lihao. Privacy Preserving Representation Learning For Complex Data .

Degree: 2019, University of Sydney

 Here we consider a common data encryption problem encountered by users who want to disclose some data to gain utility but preserve their private information.… (more)

Subjects/Keywords: Privacy; Data security; Representation; Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nan, L. (2019). Privacy Preserving Representation Learning For Complex Data . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/20662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nan, Lihao. “Privacy Preserving Representation Learning For Complex Data .” 2019. Thesis, University of Sydney. Accessed April 02, 2020. http://hdl.handle.net/2123/20662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nan, Lihao. “Privacy Preserving Representation Learning For Complex Data .” 2019. Web. 02 Apr 2020.

Vancouver:

Nan L. Privacy Preserving Representation Learning For Complex Data . [Internet] [Thesis]. University of Sydney; 2019. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/2123/20662.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nan L. Privacy Preserving Representation Learning For Complex Data . [Thesis]. University of Sydney; 2019. Available from: http://hdl.handle.net/2123/20662

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

8. Bohlscheid, H. Social security data mining : an Australian case study.

Degree: 2013, University of Technology, Sydney

Data mining in business applications has become an increasingly recognized and accepted area of enterprise data mining in recent years. In general, while the general… (more)

Subjects/Keywords: Social security.; Data mining.; Australia.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bohlscheid, H. (2013). Social security data mining : an Australian case study. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/24089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bohlscheid, H. “Social security data mining : an Australian case study.” 2013. Thesis, University of Technology, Sydney. Accessed April 02, 2020. http://hdl.handle.net/10453/24089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bohlscheid, H. “Social security data mining : an Australian case study.” 2013. Web. 02 Apr 2020.

Vancouver:

Bohlscheid H. Social security data mining : an Australian case study. [Internet] [Thesis]. University of Technology, Sydney; 2013. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10453/24089.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bohlscheid H. Social security data mining : an Australian case study. [Thesis]. University of Technology, Sydney; 2013. Available from: http://hdl.handle.net/10453/24089

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Technology, Sydney

9. Chen, L. Achieving trust-oriented data protection in the cloud environment.

Degree: 2014, University of Technology, Sydney

 Cloud computing has gained increasing acceptance in recent years. In privacy-conscious domains such as healthcare and banking, however, data security and privacy are the greatest… (more)

Subjects/Keywords: Data protection.; Cloud computing.; Security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2014). Achieving trust-oriented data protection in the cloud environment. (Thesis). University of Technology, Sydney. Retrieved from http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Thesis, University of Technology, Sydney. Accessed April 02, 2020. http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, L. “Achieving trust-oriented data protection in the cloud environment.” 2014. Web. 02 Apr 2020.

Vancouver:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Internet] [Thesis]. University of Technology, Sydney; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10453/29219.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. Achieving trust-oriented data protection in the cloud environment. [Thesis]. University of Technology, Sydney; 2014. Available from: http://hdl.handle.net/10453/29219

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

10. Scharnick, Nicholas. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.

Degree: 2018, Nelson Mandela Metropolitan University

 Technology has become important in the business environment as it ensures that a business is competitive and it also drives the business processes. However, in… (more)

Subjects/Keywords: Computer security; Information technology  – Security measures; Data protection; Business  – Data processing  – Security measures; Small business  – Data processing  – Security measures  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scharnick, N. (2018). Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/34799

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scharnick, Nicholas. “Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.” 2018. Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/34799.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scharnick, Nicholas. “Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises.” 2018. Web. 02 Apr 2020.

Vancouver:

Scharnick N. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2018. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/34799.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scharnick N. Guidelines for the protection of stored sensitive information assets within small, medium and micro enterprises. [Thesis]. Nelson Mandela Metropolitan University; 2018. Available from: http://hdl.handle.net/10948/34799

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Spyra, Grzegorz Karol. Embedded document security using sticky policies and identity based encryption.

Degree: PhD, 2019, Edinburgh Napier University

Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network… (more)

Subjects/Keywords: 005.8; data security; encryption; document security; data sharing; authentication; 005.8 Data security; QA75 Electronic computers. Computer science; Cyber-security; Information Society

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spyra, G. K. (2019). Embedded document security using sticky policies and identity based encryption. (Doctoral Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.787472

Chicago Manual of Style (16th Edition):

Spyra, Grzegorz Karol. “Embedded document security using sticky policies and identity based encryption.” 2019. Doctoral Dissertation, Edinburgh Napier University. Accessed April 02, 2020. http://researchrepository.napier.ac.uk/Output/2090564 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.787472.

MLA Handbook (7th Edition):

Spyra, Grzegorz Karol. “Embedded document security using sticky policies and identity based encryption.” 2019. Web. 02 Apr 2020.

Vancouver:

Spyra GK. Embedded document security using sticky policies and identity based encryption. [Internet] [Doctoral dissertation]. Edinburgh Napier University; 2019. [cited 2020 Apr 02]. Available from: http://researchrepository.napier.ac.uk/Output/2090564 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.787472.

Council of Science Editors:

Spyra GK. Embedded document security using sticky policies and identity based encryption. [Doctoral Dissertation]. Edinburgh Napier University; 2019. Available from: http://researchrepository.napier.ac.uk/Output/2090564 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.787472


Temple University

12. Huang, Xueli. Achieving Data Privacy and Security in Cloud.

Degree: PhD, 2016, Temple University

Computer and Information Science

The growing concerns in term of the privacy of data stored in public cloud have restrained the widespread adoption of cloud… (more)

Subjects/Keywords: Computer science;

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, X. (2016). Achieving Data Privacy and Security in Cloud. (Doctoral Dissertation). Temple University. Retrieved from http://digital.library.temple.edu/u?/p245801coll10,372805

Chicago Manual of Style (16th Edition):

Huang, Xueli. “Achieving Data Privacy and Security in Cloud.” 2016. Doctoral Dissertation, Temple University. Accessed April 02, 2020. http://digital.library.temple.edu/u?/p245801coll10,372805.

MLA Handbook (7th Edition):

Huang, Xueli. “Achieving Data Privacy and Security in Cloud.” 2016. Web. 02 Apr 2020.

Vancouver:

Huang X. Achieving Data Privacy and Security in Cloud. [Internet] [Doctoral dissertation]. Temple University; 2016. [cited 2020 Apr 02]. Available from: http://digital.library.temple.edu/u?/p245801coll10,372805.

Council of Science Editors:

Huang X. Achieving Data Privacy and Security in Cloud. [Doctoral Dissertation]. Temple University; 2016. Available from: http://digital.library.temple.edu/u?/p245801coll10,372805


Nelson Mandela Metropolitan University

13. Okere, Irene Onyekachi. A control framework for the assessment of information security culture.

Degree: MTech, Faculty of Business and Economic Sciences, 2013, Nelson Mandela Metropolitan University

 The modern organisation relies heavily on information to function effectively. With such reliance on information, it is vital that information be protected from both internal… (more)

Subjects/Keywords: Data encryption (Computer science); Business  – Data processing  – Security measures; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okere, I. O. (2013). A control framework for the assessment of information security culture. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019861

Chicago Manual of Style (16th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/d1019861.

MLA Handbook (7th Edition):

Okere, Irene Onyekachi. “A control framework for the assessment of information security culture.” 2013. Web. 02 Apr 2020.

Vancouver:

Okere IO. A control framework for the assessment of information security culture. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/d1019861.

Council of Science Editors:

Okere IO. A control framework for the assessment of information security culture. [Masters Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1019861


University of Johannesburg

14. Von Solms, Rossouw. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.

Degree: 2014, University of Johannesburg

M.Sc. (Informatics)

Information is power. Any organization must secure and protect its entire information assets. Management is responsible for the well-being of the organization and… (more)

Subjects/Keywords: Electronic data processing departments - Security measures; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Von Solms, R. (2014). 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Von Solms, Rossouw. “'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad.” 2014. Web. 02 Apr 2020.

Vancouver:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/10599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Von Solms R. 'n Bestuurshulpmiddel vir die evaluering van 'n maatskappy se rekenaarsekerheidsgraad. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/10599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

15. Anwar, Adnan. Data-Driven Stealthy Injection Attacks on Smart Grid.

Degree: Engineering & Information Technology, 2017, University of New South Wales

 Smart grid cyber-security has come to the forefront of national security priorities due to emergence of new cyber threats such as the False Data Injection… (more)

Subjects/Keywords: false data injection; smart grid; cyber security; scada security; data-driven

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anwar, A. (2017). Data-Driven Stealthy Injection Attacks on Smart Grid. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Anwar, Adnan. “Data-Driven Stealthy Injection Attacks on Smart Grid.” 2017. Doctoral Dissertation, University of New South Wales. Accessed April 02, 2020. http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true.

MLA Handbook (7th Edition):

Anwar, Adnan. “Data-Driven Stealthy Injection Attacks on Smart Grid.” 2017. Web. 02 Apr 2020.

Vancouver:

Anwar A. Data-Driven Stealthy Injection Attacks on Smart Grid. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Apr 02]. Available from: http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true.

Council of Science Editors:

Anwar A. Data-Driven Stealthy Injection Attacks on Smart Grid. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/59037 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:48341/SOURCE02?view=true


Oklahoma State University

16. Parakh, Abhishek. New Information Dispersal Techniques for Trustworthy Computing.

Degree: Computer Science Department, 2011, Oklahoma State University

 Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for… (more)

Subjects/Keywords: cloud computing; data partitioning; data storage security; distributed secure data storage; distributed security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Parakh, A. (2011). New Information Dispersal Techniques for Trustworthy Computing. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Thesis, Oklahoma State University. Accessed April 02, 2020. http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Parakh, Abhishek. “New Information Dispersal Techniques for Trustworthy Computing.” 2011. Web. 02 Apr 2020.

Vancouver:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/11244/6494.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Parakh A. New Information Dispersal Techniques for Trustworthy Computing. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/6494

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

17. Boshoff, Ryno. A baseline for information security knowledge for end users.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information plays a vast contributing role to all resources within an organisation. Organisations should recognise the importance of information and implement information security controls to… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boshoff, R. (2012). A baseline for information security knowledge for end users. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boshoff, Ryno. “A baseline for information security knowledge for end users.” 2012. Web. 02 Apr 2020.

Vancouver:

Boshoff R. A baseline for information security knowledge for end users. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/d1013260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boshoff R. A baseline for information security knowledge for end users. [Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1013260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

18. Cui, Xingmin. Data privacy of Android applications and name privacy of NDN.

Degree: PhD, 2016, University of Hong Kong

 We get used to the concept that Personal Computers are connected via IP-based Internet to communicate and share content with each other. But nowadays two… (more)

Subjects/Keywords: Computer networks - Security measures; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cui, X. (2016). Data privacy of Android applications and name privacy of NDN. (Doctoral Dissertation). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/236581

Chicago Manual of Style (16th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Doctoral Dissertation, University of Hong Kong. Accessed April 02, 2020. http://hdl.handle.net/10722/236581.

MLA Handbook (7th Edition):

Cui, Xingmin. “Data privacy of Android applications and name privacy of NDN.” 2016. Web. 02 Apr 2020.

Vancouver:

Cui X. Data privacy of Android applications and name privacy of NDN. [Internet] [Doctoral dissertation]. University of Hong Kong; 2016. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10722/236581.

Council of Science Editors:

Cui X. Data privacy of Android applications and name privacy of NDN. [Doctoral Dissertation]. University of Hong Kong; 2016. Available from: http://hdl.handle.net/10722/236581


Nelson Mandela Metropolitan University

19. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 02 Apr 2020.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Nelson Mandela Metropolitan University

20. Reid, Rayne. A brain-compatible approach to the presentation of cyber security educational material.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is… (more)

Subjects/Keywords: Data protection  – Management; Computer security  – Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Reid, R. (2012). A brain-compatible approach to the presentation of cyber security educational material. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1019895

Chicago Manual of Style (16th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/d1019895.

MLA Handbook (7th Edition):

Reid, Rayne. “A brain-compatible approach to the presentation of cyber security educational material.” 2012. Web. 02 Apr 2020.

Vancouver:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/d1019895.

Council of Science Editors:

Reid R. A brain-compatible approach to the presentation of cyber security educational material. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1019895


Nelson Mandela Metropolitan University

21. Maninjwa, Prosecutor Mvikeli. Managing an information security policy architecture : a technical documentation perspective.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2012, Nelson Mandela Metropolitan University

 Information and the related assets form critical business assets for most organizations. Organizations depend on their information assets to survive and to remain competitive. However,… (more)

Subjects/Keywords: Computer security  – Management; Computer architecture; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maninjwa, P. M. (2012). Managing an information security policy architecture : a technical documentation perspective. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1020757

Chicago Manual of Style (16th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Masters Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/d1020757.

MLA Handbook (7th Edition):

Maninjwa, Prosecutor Mvikeli. “Managing an information security policy architecture : a technical documentation perspective.” 2012. Web. 02 Apr 2020.

Vancouver:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/d1020757.

Council of Science Editors:

Maninjwa PM. Managing an information security policy architecture : a technical documentation perspective. [Masters Thesis]. Nelson Mandela Metropolitan University; 2012. Available from: http://hdl.handle.net/10948/d1020757


Universidad Nacional de La Plata

22. Corvi, Javier Omar. Componente genérico de auditoría para monitorear cambios en el modelo de objetos.

Degree: 2011, Universidad Nacional de La Plata

En las aplicaciones de software que manejan información crítica, la seguridad y la auditoría de la misma es un requerimiento obligatorio a la hora de… (more)

Subjects/Keywords: Ciencias Informáticas; Security and Protection; Data models

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corvi, J. O. (2011). Componente genérico de auditoría para monitorear cambios en el modelo de objetos. (Thesis). Universidad Nacional de La Plata. Retrieved from http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Thesis, Universidad Nacional de La Plata. Accessed April 02, 2020. http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Corvi, Javier Omar. “Componente genérico de auditoría para monitorear cambios en el modelo de objetos.” 2011. Web. 02 Apr 2020.

Vancouver:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Internet] [Thesis]. Universidad Nacional de La Plata; 2011. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10915/46919.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Corvi JO. Componente genérico de auditoría para monitorear cambios en el modelo de objetos. [Thesis]. Universidad Nacional de La Plata; 2011. Available from: http://hdl.handle.net/10915/46919

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

23. Ellefsen, Ian David. A secure steganographic file system with non-duplicating properties.

Degree: 2012, University of Johannesburg

M.Sc.

This dissertation investigates the possibility of a steganographic file system which does not have to duplicate hidden data in order to avoid "collisions" between… (more)

Subjects/Keywords: Cryptography; Computer security; Data encryption (Computer science)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ellefsen, I. D. (2012). A secure steganographic file system with non-duplicating properties. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ellefsen, Ian David. “A secure steganographic file system with non-duplicating properties.” 2012. Web. 02 Apr 2020.

Vancouver:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Internet] [Thesis]. University of Johannesburg; 2012. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/7367.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ellefsen ID. A secure steganographic file system with non-duplicating properties. [Thesis]. University of Johannesburg; 2012. Available from: http://hdl.handle.net/10210/7367

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

24. Pottas, Dalenca. The automatic generation of information security profiles.

Degree: 2014, University of Johannesburg

D.Phil. (Computer Science)

Security needs have changed considerably in the past decade as the economics of computer usage necessitates increased business reliance on computers. As… (more)

Subjects/Keywords: Computers - Access control; Data protection; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pottas, D. (2014). The automatic generation of information security profiles. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pottas, Dalenca. “The automatic generation of information security profiles.” 2014. Web. 02 Apr 2020.

Vancouver:

Pottas D. The automatic generation of information security profiles. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/12333.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pottas D. The automatic generation of information security profiles. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12333

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

25. Van Heerden, Chris. Packaged software : security and controls audit review.

Degree: 2015, University of Johannesburg

M.Com.

In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate… (more)

Subjects/Keywords: Auditing - Data processing; Software protection; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Heerden, C. (2015). Packaged software : security and controls audit review. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Web. 02 Apr 2020.

Vancouver:

Van Heerden C. Packaged software : security and controls audit review. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Heerden C. Packaged software : security and controls audit review. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

26. Pretorius, Maria Rebecca. Application of the access path model with specific reference to the SAP R/3 environment.

Degree: 2014, University of Johannesburg

M.Com. (Computer Auditing)

The management and control of modern day computer systems are becoming more and more trying due to the complexity of systems. This… (more)

Subjects/Keywords: Computer security; Data protection; Computers - Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pretorius, M. R. (2014). Application of the access path model with specific reference to the SAP R/3 environment. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Thesis, University of Johannesburg. Accessed April 02, 2020. http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pretorius, Maria Rebecca. “Application of the access path model with specific reference to the SAP R/3 environment.” 2014. Web. 02 Apr 2020.

Vancouver:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10210/12328.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pretorius MR. Application of the access path model with specific reference to the SAP R/3 environment. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12328

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Tasmania

27. Scanlan, JD. DynamicWEB : a conceptual clustering algorithm for a changing world.

Degree: 2011, University of Tasmania

 This research was motivated by problems in network security, where an attacker often deliberately changes their identifying information and behaviour in order to camouflage their… (more)

Subjects/Keywords: machine learning; data mining; computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Scanlan, J. (2011). DynamicWEB : a conceptual clustering algorithm for a changing world. (Thesis). University of Tasmania. Retrieved from https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Scanlan, JD. “DynamicWEB : a conceptual clustering algorithm for a changing world.” 2011. Thesis, University of Tasmania. Accessed April 02, 2020. https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania..

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Scanlan, JD. “DynamicWEB : a conceptual clustering algorithm for a changing world.” 2011. Web. 02 Apr 2020.

Vancouver:

Scanlan J. DynamicWEB : a conceptual clustering algorithm for a changing world. [Internet] [Thesis]. University of Tasmania; 2011. [cited 2020 Apr 02]. Available from: https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania..

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Scanlan J. DynamicWEB : a conceptual clustering algorithm for a changing world. [Thesis]. University of Tasmania; 2011. Available from: https://eprints.utas.edu.au/11723/1/Joel_Thesis_Final.pdf ; Scanlan, JD ORCID: 0000-0003-2285-8932 <https://orcid.org/0000-0003-2285-8932> 2011 , 'DynamicWEB : a conceptual clustering algorithm for a changing world', PhD thesis, University of Tasmania.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

28. Jansson, Kenny. A model for cultivating resistance to social engineering attacks.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University

 The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in… (more)

Subjects/Keywords: Computer security; Data protection; Human-computer interaction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed April 02, 2020. http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 02 Apr 2020.

Vancouver:

Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2020 Apr 02]. Available from: http://hdl.handle.net/10948/1588.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Mississippi State University

29. Mohanty, Somya Darsan. Ordered Merkle Tree - a versatile data-structure for security kernels.

Degree: PhD, Computer Science and Engineering, 2013, Mississippi State University

  Hidden undesired functionality is an unavoidable reality in any complex hardware or software component. Undesired functionality deliberately introduced Trojan horses or accidentally introduced bugsin… (more)

Subjects/Keywords: Authenticated Data-Structures; Trustworthy Computing; Security Kernels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohanty, S. D. (2013). Ordered Merkle Tree - a versatile data-structure for security kernels. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;

Chicago Manual of Style (16th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Doctoral Dissertation, Mississippi State University. Accessed April 02, 2020. http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

MLA Handbook (7th Edition):

Mohanty, Somya Darsan. “Ordered Merkle Tree - a versatile data-structure for security kernels.” 2013. Web. 02 Apr 2020.

Vancouver:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2020 Apr 02]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;.

Council of Science Editors:

Mohanty SD. Ordered Merkle Tree - a versatile data-structure for security kernels. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-06242013-124105/ ;


University of North Carolina – Greensboro

30. Whitworth, Jeffrey N. Applying hybrid cloud systems to solve challenges posed by the big data problem.

Degree: 2013, University of North Carolina – Greensboro

 The problem of Big Data poses challenges to traditional compute systems used for Machine Learning (ML) techniques that extract, analyze and visualize important information. New… (more)

Subjects/Keywords: Big data; Cloud computing – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Whitworth, J. N. (2013). Applying hybrid cloud systems to solve challenges posed by the big data problem. (Masters Thesis). University of North Carolina – Greensboro. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

Chicago Manual of Style (16th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Masters Thesis, University of North Carolina – Greensboro. Accessed April 02, 2020. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

MLA Handbook (7th Edition):

Whitworth, Jeffrey N. “Applying hybrid cloud systems to solve challenges posed by the big data problem.” 2013. Web. 02 Apr 2020.

Vancouver:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Internet] [Masters thesis]. University of North Carolina – Greensboro; 2013. [cited 2020 Apr 02]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603.

Council of Science Editors:

Whitworth JN. Applying hybrid cloud systems to solve challenges posed by the big data problem. [Masters Thesis]. University of North Carolina – Greensboro; 2013. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=15603

[1] [2] [3] [4] [5] … [37]

.