Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(security services). Showing records 1 – 30 of 231 total matches.

[1] [2] [3] [4] [5] [6] [7] [8]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Coventry University

1. Chapsos, I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.

Degree: PhD, 2014, Coventry University

 This thesis examines the expansion of private maritime security provision, its regulation and implications for national and global security. The main research question addressed is:… (more)

Subjects/Keywords: 387.5; maritime security, privatisation of security, private security companies, piracy; Maritime piracy; Private security services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chapsos, I. (2014). The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. (Doctoral Dissertation). Coventry University. Retrieved from http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928

Chicago Manual of Style (16th Edition):

Chapsos, I. “The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.” 2014. Doctoral Dissertation, Coventry University. Accessed September 19, 2019. http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928.

MLA Handbook (7th Edition):

Chapsos, I. “The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study.” 2014. Web. 19 Sep 2019.

Vancouver:

Chapsos I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. [Internet] [Doctoral dissertation]. Coventry University; 2014. [cited 2019 Sep 19]. Available from: http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928.

Council of Science Editors:

Chapsos I. The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study. [Doctoral Dissertation]. Coventry University; 2014. Available from: http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.667928


Delft University of Technology

2. Van Kouteren, H.J.W. Ibidas: to serve and to protect:.

Degree: 2009, Delft University of Technology

 In this thesis we present the database security mechanism and Web services implementation for the Ibidas system. The security mechanism restricts access to data by… (more)

Subjects/Keywords: Ibidas; data integration; web services; database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Kouteren, H. J. W. (2009). Ibidas: to serve and to protect:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb

Chicago Manual of Style (16th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Masters Thesis, Delft University of Technology. Accessed September 19, 2019. http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

MLA Handbook (7th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Web. 19 Sep 2019.

Vancouver:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Sep 19]. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

Council of Science Editors:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb


Tampere University

3. Sharma Kandel, Chetan. Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives .

Degree: 2017, Tampere University

 Cloud-based services are becoming increasingly popular for different purposes such as data storage, application deployment, testing and development, data backup and other such purposes which… (more)

Subjects/Keywords: cloud services; trust; security issues; cloud users

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sharma Kandel, C. (2017). Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives . (Masters Thesis). Tampere University. Retrieved from https://trepo.tuni.fi/handle/10024/102553

Chicago Manual of Style (16th Edition):

Sharma Kandel, Chetan. “Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives .” 2017. Masters Thesis, Tampere University. Accessed September 19, 2019. https://trepo.tuni.fi/handle/10024/102553.

MLA Handbook (7th Edition):

Sharma Kandel, Chetan. “Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives .” 2017. Web. 19 Sep 2019.

Vancouver:

Sharma Kandel C. Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives . [Internet] [Masters thesis]. Tampere University; 2017. [cited 2019 Sep 19]. Available from: https://trepo.tuni.fi/handle/10024/102553.

Council of Science Editors:

Sharma Kandel C. Cloud-based services users and trust issues : a comparative study of gender and national culture perspectives . [Masters Thesis]. Tampere University; 2017. Available from: https://trepo.tuni.fi/handle/10024/102553


Brunel University

4. Razzaqi, Hasan Ali. Factors determining e-government security.

Degree: PhD, 2013, Brunel University

 E-Government security is a major area of concern that has the potential to affect the success of e-Government services across the world. Much of the… (more)

Subjects/Keywords: 352.3; E-government information security; E-services security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Razzaqi, H. A. (2013). Factors determining e-government security. (Doctoral Dissertation). Brunel University. Retrieved from http://bura.brunel.ac.uk/handle/2438/14640 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.715841

Chicago Manual of Style (16th Edition):

Razzaqi, Hasan Ali. “Factors determining e-government security.” 2013. Doctoral Dissertation, Brunel University. Accessed September 19, 2019. http://bura.brunel.ac.uk/handle/2438/14640 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.715841.

MLA Handbook (7th Edition):

Razzaqi, Hasan Ali. “Factors determining e-government security.” 2013. Web. 19 Sep 2019.

Vancouver:

Razzaqi HA. Factors determining e-government security. [Internet] [Doctoral dissertation]. Brunel University; 2013. [cited 2019 Sep 19]. Available from: http://bura.brunel.ac.uk/handle/2438/14640 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.715841.

Council of Science Editors:

Razzaqi HA. Factors determining e-government security. [Doctoral Dissertation]. Brunel University; 2013. Available from: http://bura.brunel.ac.uk/handle/2438/14640 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.715841


Universidade do Rio Grande do Sul

5. Rohr, Estêvão Miguel Zanette. Segurança em gerenciamento de redes baseado em web services.

Degree: 2009, Universidade do Rio Grande do Sul

A área de gerência de redes encontra uma série de desafios desde seu príncipio. O protocolo que surgiu como padrão para gerência de redes, o… (more)

Subjects/Keywords: Network management; Redes : Computadores; SNMP; Gerencia : Redes : Computadores; Serviços Web; Web services; Security; Network security; Web services security; Access control; WS-security; XACML; WS-management; VACM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rohr, E. M. Z. (2009). Segurança em gerenciamento de redes baseado em web services. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/18630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rohr, Estêvão Miguel Zanette. “Segurança em gerenciamento de redes baseado em web services.” 2009. Thesis, Universidade do Rio Grande do Sul. Accessed September 19, 2019. http://hdl.handle.net/10183/18630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rohr, Estêvão Miguel Zanette. “Segurança em gerenciamento de redes baseado em web services.” 2009. Web. 19 Sep 2019.

Vancouver:

Rohr EMZ. Segurança em gerenciamento de redes baseado em web services. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2009. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10183/18630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rohr EMZ. Segurança em gerenciamento de redes baseado em web services. [Thesis]. Universidade do Rio Grande do Sul; 2009. Available from: http://hdl.handle.net/10183/18630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

6. Willett, Melanie. A framework for assuring conformance of cloud-based email at higher education institutions.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2013, Nelson Mandela Metropolitan University

 Cloud computing is a relatively immature computing paradigm that could significantly benefit users. Cloud computing solutions are often associated with potential benefits such as cost… (more)

Subjects/Keywords: Cloud computing  – Security measures; Computer networks  – Security measures; Web services; Education, Higher  – Technological innovations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Willett, M. (2013). A framework for assuring conformance of cloud-based email at higher education institutions. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/d1018664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Willett, Melanie. “A framework for assuring conformance of cloud-based email at higher education institutions.” 2013. Thesis, Nelson Mandela Metropolitan University. Accessed September 19, 2019. http://hdl.handle.net/10948/d1018664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Willett, Melanie. “A framework for assuring conformance of cloud-based email at higher education institutions.” 2013. Web. 19 Sep 2019.

Vancouver:

Willett M. A framework for assuring conformance of cloud-based email at higher education institutions. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2013. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10948/d1018664.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Willett M. A framework for assuring conformance of cloud-based email at higher education institutions. [Thesis]. Nelson Mandela Metropolitan University; 2013. Available from: http://hdl.handle.net/10948/d1018664

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of California – Berkeley

7. Mohan, Prashanth. Protecting User Privacy in Remotely Managed Applications.

Degree: Computer Science, 2013, University of California – Berkeley

 This thesis presents an end-to-end system architecture for online services to provide it's users with a ”privacy guarantee”. The privacy guarantee as described in this… (more)

Subjects/Keywords: Computer science; Computer Security; Data Privacy; Data Security; Differential Privacy; Information Flow Control; Online Services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohan, P. (2013). Protecting User Privacy in Remotely Managed Applications. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/29d9g8m5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mohan, Prashanth. “Protecting User Privacy in Remotely Managed Applications.” 2013. Thesis, University of California – Berkeley. Accessed September 19, 2019. http://www.escholarship.org/uc/item/29d9g8m5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mohan, Prashanth. “Protecting User Privacy in Remotely Managed Applications.” 2013. Web. 19 Sep 2019.

Vancouver:

Mohan P. Protecting User Privacy in Remotely Managed Applications. [Internet] [Thesis]. University of California – Berkeley; 2013. [cited 2019 Sep 19]. Available from: http://www.escholarship.org/uc/item/29d9g8m5.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mohan P. Protecting User Privacy in Remotely Managed Applications. [Thesis]. University of California – Berkeley; 2013. Available from: http://www.escholarship.org/uc/item/29d9g8m5

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Tampere University

8. Nguyen, Toan. Web Security: Security Methodology for Integrated Website using RESTful Web Services .

Degree: 2016, Tampere University

Security is not only one of the most important feature in software development but also a key point to gain user s trust. The higher… (more)

Subjects/Keywords: security methodologies; RESTful web services; REST API security; Oauth 2.0 3-legg authorization.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, T. (2016). Web Security: Security Methodology for Integrated Website using RESTful Web Services . (Masters Thesis). Tampere University. Retrieved from https://trepo.tuni.fi/handle/10024/99425

Chicago Manual of Style (16th Edition):

Nguyen, Toan. “Web Security: Security Methodology for Integrated Website using RESTful Web Services .” 2016. Masters Thesis, Tampere University. Accessed September 19, 2019. https://trepo.tuni.fi/handle/10024/99425.

MLA Handbook (7th Edition):

Nguyen, Toan. “Web Security: Security Methodology for Integrated Website using RESTful Web Services .” 2016. Web. 19 Sep 2019.

Vancouver:

Nguyen T. Web Security: Security Methodology for Integrated Website using RESTful Web Services . [Internet] [Masters thesis]. Tampere University; 2016. [cited 2019 Sep 19]. Available from: https://trepo.tuni.fi/handle/10024/99425.

Council of Science Editors:

Nguyen T. Web Security: Security Methodology for Integrated Website using RESTful Web Services . [Masters Thesis]. Tampere University; 2016. Available from: https://trepo.tuni.fi/handle/10024/99425


Rutgers University

9. Chen, Shu, 1978-. Providing trustworthiness to the operation of location based services in mobile networks.

Degree: PhD, Computer Science, 2010, Rutgers University

The development of low-cost, ubiquitous, wireless systems is leading to a future where location will define the next generation of computing applications. Location Based services(more)

Subjects/Keywords: Location-based services; Mobile communication systems – Security measures; Wireless communication systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Shu, 1. (2010). Providing trustworthiness to the operation of location based services in mobile networks. (Doctoral Dissertation). Rutgers University. Retrieved from http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277

Chicago Manual of Style (16th Edition):

Chen, Shu, 1978-. “Providing trustworthiness to the operation of location based services in mobile networks.” 2010. Doctoral Dissertation, Rutgers University. Accessed September 19, 2019. http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277.

MLA Handbook (7th Edition):

Chen, Shu, 1978-. “Providing trustworthiness to the operation of location based services in mobile networks.” 2010. Web. 19 Sep 2019.

Vancouver:

Chen, Shu 1. Providing trustworthiness to the operation of location based services in mobile networks. [Internet] [Doctoral dissertation]. Rutgers University; 2010. [cited 2019 Sep 19]. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277.

Council of Science Editors:

Chen, Shu 1. Providing trustworthiness to the operation of location based services in mobile networks. [Doctoral Dissertation]. Rutgers University; 2010. Available from: http://hdl.rutgers.edu/1782.1/rucore10001600001.ETD.000056277


Université de Grenoble

10. Hossen, Karim. Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection.

Degree: Docteur es, Informatique, 2014, Université de Grenoble

Les approches de tests basées sur les modèles (MBT) ont su montrer leur efficacité pour le test logiciel, mais elles nécessitent de disposer au préalable… (more)

Subjects/Keywords: Modèle; Inférence; Sécurité; Vulnérabilité; Web; Services; Model; Inference; Security; Vulnerability; Web; Services; 004

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hossen, K. (2014). Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection. (Doctoral Dissertation). Université de Grenoble. Retrieved from http://www.theses.fr/2014GRENM077

Chicago Manual of Style (16th Edition):

Hossen, Karim. “Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection.” 2014. Doctoral Dissertation, Université de Grenoble. Accessed September 19, 2019. http://www.theses.fr/2014GRENM077.

MLA Handbook (7th Edition):

Hossen, Karim. “Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection.” 2014. Web. 19 Sep 2019.

Vancouver:

Hossen K. Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection. [Internet] [Doctoral dissertation]. Université de Grenoble; 2014. [cited 2019 Sep 19]. Available from: http://www.theses.fr/2014GRENM077.

Council of Science Editors:

Hossen K. Inférence automatique de modèles d'applications Web et protocoles pour la détection de vulnérabilités : Automatic model inference of Web applications and protocols for vulnerability detection. [Doctoral Dissertation]. Université de Grenoble; 2014. Available from: http://www.theses.fr/2014GRENM077


Univerzitet u Beogradu

11. Lazić, Radojica S., 1962-. Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години.

Degree: Fakultet političkih nauka, 2015, Univerzitet u Beogradu

Политичке науке - Међународнe студије - студије безбедности / Political sciences - International studies - security studies

За већину друштава која су крајем прошлог и… (more)

Subjects/Keywords: security services; authority; reform; democracy; civil control; Republic of Serbia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazić, Radojica S., 1. (2015). Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:8178/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lazić, Radojica S., 1962-. “Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години.” 2015. Thesis, Univerzitet u Beogradu. Accessed September 19, 2019. https://fedorabg.bg.ac.rs/fedora/get/o:8178/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lazić, Radojica S., 1962-. “Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години.” 2015. Web. 19 Sep 2019.

Vancouver:

Lazić, Radojica S. 1. Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години. [Internet] [Thesis]. Univerzitet u Beogradu; 2015. [cited 2019 Sep 19]. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:8178/bdef:Content/get.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lazić, Radojica S. 1. Демократска и цивилна контрола рада служби безбедности у Републици Србији од 2000. до 2010. години. [Thesis]. Univerzitet u Beogradu; 2015. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:8178/bdef:Content/get

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Zambia

12. Kalyabantu, Momba. Law reform in the financial services sector: A case study on Pension Schemes in Zambia .

Degree: 2013, University of Zambia

 Successive governments in many countries have enacted legislation to encourage both individuals and employers to plan for the provision of an adequate level of income… (more)

Subjects/Keywords: Zambia. Financial Services Reform; Pensions-Zambia; Social Security-Zambia

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kalyabantu, M. (2013). Law reform in the financial services sector: A case study on Pension Schemes in Zambia . (Thesis). University of Zambia. Retrieved from http://hdl.handle.net/123456789/2899

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kalyabantu, Momba. “Law reform in the financial services sector: A case study on Pension Schemes in Zambia .” 2013. Thesis, University of Zambia. Accessed September 19, 2019. http://hdl.handle.net/123456789/2899.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kalyabantu, Momba. “Law reform in the financial services sector: A case study on Pension Schemes in Zambia .” 2013. Web. 19 Sep 2019.

Vancouver:

Kalyabantu M. Law reform in the financial services sector: A case study on Pension Schemes in Zambia . [Internet] [Thesis]. University of Zambia; 2013. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/123456789/2899.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kalyabantu M. Law reform in the financial services sector: A case study on Pension Schemes in Zambia . [Thesis]. University of Zambia; 2013. Available from: http://hdl.handle.net/123456789/2899

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Aberdeen

13. Janaby, Mohamad. The legal regime applicable to private military and security company personnel in armed conflicts.

Degree: PhD, 2015, University of Aberdeen

 Private military and security companies (PMSCs) have been extensively used to provide military and security services in various armed conflicts. Aspects of their use have… (more)

Subjects/Keywords: 340; Private military companies (International law); Private security services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janaby, M. (2015). The legal regime applicable to private military and security company personnel in armed conflicts. (Doctoral Dissertation). University of Aberdeen. Retrieved from http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.680994

Chicago Manual of Style (16th Edition):

Janaby, Mohamad. “The legal regime applicable to private military and security company personnel in armed conflicts.” 2015. Doctoral Dissertation, University of Aberdeen. Accessed September 19, 2019. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.680994.

MLA Handbook (7th Edition):

Janaby, Mohamad. “The legal regime applicable to private military and security company personnel in armed conflicts.” 2015. Web. 19 Sep 2019.

Vancouver:

Janaby M. The legal regime applicable to private military and security company personnel in armed conflicts. [Internet] [Doctoral dissertation]. University of Aberdeen; 2015. [cited 2019 Sep 19]. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.680994.

Council of Science Editors:

Janaby M. The legal regime applicable to private military and security company personnel in armed conflicts. [Doctoral Dissertation]. University of Aberdeen; 2015. Available from: http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.680994


University of Sydney

14. Hirawan, Fajar Bambang. The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis .

Degree: 2017, University of Sydney

 The significant increase in food prices during 2007/2008 has become an alert for all societies in the world, especially Indonesia, to stand together to fight… (more)

Subjects/Keywords: Indonesia; Food Security; Investment; Transport Services; Trade; Structuration-Institutional Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirawan, F. B. (2017). The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/17624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirawan, Fajar Bambang. “The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis .” 2017. Thesis, University of Sydney. Accessed September 19, 2019. http://hdl.handle.net/2123/17624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirawan, Fajar Bambang. “The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis .” 2017. Web. 19 Sep 2019.

Vancouver:

Hirawan FB. The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis . [Internet] [Thesis]. University of Sydney; 2017. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/2123/17624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirawan FB. The Role of Investment, Transport Services and Trade in Achieving Food Security in Indonesia: A Structuration and Institutional Analysis . [Thesis]. University of Sydney; 2017. Available from: http://hdl.handle.net/2123/17624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Hong Kong University of Science and Technology

15. Ke, Ping Fan ISOM. Essays on economics of cybersecurity and cryptocurrency.

Degree: 2018, Hong Kong University of Science and Technology

 Cybersecurity has become a priority for organizations and governments due to the expeditious growth of information systems and networks in daily businesses. In this thesis,… (more)

Subjects/Keywords: Computer security; Services for; Contracting out; Economic aspects; Information technology; Cryptocurrencies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ke, P. F. I. (2018). Essays on economics of cybersecurity and cryptocurrency. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-991012657168803412 ; http://repository.ust.hk/ir/bitstream/1783.1-96294/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ke, Ping Fan ISOM. “Essays on economics of cybersecurity and cryptocurrency.” 2018. Thesis, Hong Kong University of Science and Technology. Accessed September 19, 2019. https://doi.org/10.14711/thesis-991012657168803412 ; http://repository.ust.hk/ir/bitstream/1783.1-96294/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ke, Ping Fan ISOM. “Essays on economics of cybersecurity and cryptocurrency.” 2018. Web. 19 Sep 2019.

Vancouver:

Ke PFI. Essays on economics of cybersecurity and cryptocurrency. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2018. [cited 2019 Sep 19]. Available from: https://doi.org/10.14711/thesis-991012657168803412 ; http://repository.ust.hk/ir/bitstream/1783.1-96294/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ke PFI. Essays on economics of cybersecurity and cryptocurrency. [Thesis]. Hong Kong University of Science and Technology; 2018. Available from: https://doi.org/10.14711/thesis-991012657168803412 ; http://repository.ust.hk/ir/bitstream/1783.1-96294/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kansas State University

16. McDonough, Kelsey Rose. A multiscale perspective of water resources and ecosystem services.

Degree: PhD, Department of Biological & Agricultural Engineering, 2018, Kansas State University

 Water security is one of the greatest challenges of this century. The anthropogenic and environmental demand for water could likely outpace the freshwater availability in… (more)

Subjects/Keywords: water resources; ecosystem services; spatial; temporal; water security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McDonough, K. R. (2018). A multiscale perspective of water resources and ecosystem services. (Doctoral Dissertation). Kansas State University. Retrieved from http://hdl.handle.net/2097/39318

Chicago Manual of Style (16th Edition):

McDonough, Kelsey Rose. “A multiscale perspective of water resources and ecosystem services.” 2018. Doctoral Dissertation, Kansas State University. Accessed September 19, 2019. http://hdl.handle.net/2097/39318.

MLA Handbook (7th Edition):

McDonough, Kelsey Rose. “A multiscale perspective of water resources and ecosystem services.” 2018. Web. 19 Sep 2019.

Vancouver:

McDonough KR. A multiscale perspective of water resources and ecosystem services. [Internet] [Doctoral dissertation]. Kansas State University; 2018. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/2097/39318.

Council of Science Editors:

McDonough KR. A multiscale perspective of water resources and ecosystem services. [Doctoral Dissertation]. Kansas State University; 2018. Available from: http://hdl.handle.net/2097/39318


Mykolas Romeris University

17. Juknelytė, Irma. Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai.

Degree: Master, Law, 2010, Mykolas Romeris University

Būtinybė valstybės lygmeniu neįgaliems asmeniui suteikti tam tikrą socialinę apsaugą įtvirtinta aukščiausią juridinę galią turinčiame Lietuvos teisės sistemos akte – Lietuvos Respublikos Konstitucijoje. Įgyvendinant šią… (more)

Subjects/Keywords: Socialinė apsauga; Neįgalusis; Draudimas; Paslaugos; Social security; Handicapped; Insurance; Services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Juknelytė, Irma. (2010). Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai. (Masters Thesis). Mykolas Romeris University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20100225_140646-98822 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Juknelytė, Irma. “Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai.” 2010. Masters Thesis, Mykolas Romeris University. Accessed September 19, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20100225_140646-98822 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Juknelytė, Irma. “Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai.” 2010. Web. 19 Sep 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Juknelytė, Irma. Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai. [Internet] [Masters thesis]. Mykolas Romeris University; 2010. [cited 2019 Sep 19]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20100225_140646-98822 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Juknelytė, Irma. Socialinės apsaugos priemonių neįgaliesiems teisinis reguliavimas: problemos ir jų sprendimo būdai. [Masters Thesis]. Mykolas Romeris University; 2010. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20100225_140646-98822 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Hong Kong University of Science and Technology

18. Fung, King Hong CSE. Combining differential privacy and PIR for efficient strong location privacy.

Degree: 2015, Hong Kong University of Science and Technology

 Data privacy is a huge concern nowadays. In the context of location based services, a very important issue regards protecting the position of users issuing… (more)

Subjects/Keywords: Location-based services; Security measures; Information storage and retrieval systems; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fung, K. H. C. (2015). Combining differential privacy and PIR for efficient strong location privacy. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Thesis, Hong Kong University of Science and Technology. Accessed September 19, 2019. https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fung, King Hong CSE. “Combining differential privacy and PIR for efficient strong location privacy.” 2015. Web. 19 Sep 2019.

Vancouver:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2015. [cited 2019 Sep 19]. Available from: https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fung KHC. Combining differential privacy and PIR for efficient strong location privacy. [Thesis]. Hong Kong University of Science and Technology; 2015. Available from: https://doi.org/10.14711/thesis-b1487523 ; http://repository.ust.hk/ir/bitstream/1783.1-94420/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Deakin University

19. KHORSHED, TANZIM. Combating cyber attacks in cloud computing using machine learning techniques.

Degree: School of Information Technology, 2016, Deakin University

 An extensive investigative survey on Cloud Computing with the main focus on gaps that is slowing down Cloud adoption as well as reviewing the threat… (more)

Subjects/Keywords: Cloud computing; Computer networks; Computer hacking; Internet hosting services; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

KHORSHED, T. (2016). Combating cyber attacks in cloud computing using machine learning techniques. (Thesis). Deakin University. Retrieved from http://hdl.handle.net/10536/DRO/DU:30089157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Thesis, Deakin University. Accessed September 19, 2019. http://hdl.handle.net/10536/DRO/DU:30089157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

KHORSHED, TANZIM. “Combating cyber attacks in cloud computing using machine learning techniques.” 2016. Web. 19 Sep 2019.

Vancouver:

KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Internet] [Thesis]. Deakin University; 2016. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10536/DRO/DU:30089157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

KHORSHED T. Combating cyber attacks in cloud computing using machine learning techniques. [Thesis]. Deakin University; 2016. Available from: http://hdl.handle.net/10536/DRO/DU:30089157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Washington

20. Snailer, Brandon. Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program.

Degree: 2019, University of Washington

 Abstract Objective – The effect of a six-month Fruit and Vegetable Prescription (FVRx) program on the HbA1c levels of food insecure diabetes in rural Washington… (more)

Subjects/Keywords: A1c; Diabetes; Diet; Food Security; Fruit; Vegetable; Public health; Health services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Snailer, B. (2019). Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/43699

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Snailer, Brandon. “Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program.” 2019. Thesis, University of Washington. Accessed September 19, 2019. http://hdl.handle.net/1773/43699.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Snailer, Brandon. “Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program.” 2019. Web. 19 Sep 2019.

Vancouver:

Snailer B. Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program. [Internet] [Thesis]. University of Washington; 2019. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/1773/43699.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Snailer B. Lowering HbA1c in Food Insecure Type 2 Diabetics through a Fruit and Vegetable Prescription Program. [Thesis]. University of Washington; 2019. Available from: http://hdl.handle.net/1773/43699

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of New South Wales

21. Wilcock, Scarlet. Governing social security fraud and non-compliance in Australia.

Degree: Law, 2017, University of New South Wales

 This thesis critically and systematically explores the set of strategies deployed by the Australian Department of Human Services (DHS) in the name of fighting social… (more)

Subjects/Keywords: Social security fraud; Australian Department of Human Services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilcock, S. (2017). Governing social security fraud and non-compliance in Australia. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/60097

Chicago Manual of Style (16th Edition):

Wilcock, Scarlet. “Governing social security fraud and non-compliance in Australia.” 2017. Doctoral Dissertation, University of New South Wales. Accessed September 19, 2019. http://handle.unsw.edu.au/1959.4/60097.

MLA Handbook (7th Edition):

Wilcock, Scarlet. “Governing social security fraud and non-compliance in Australia.” 2017. Web. 19 Sep 2019.

Vancouver:

Wilcock S. Governing social security fraud and non-compliance in Australia. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2019 Sep 19]. Available from: http://handle.unsw.edu.au/1959.4/60097.

Council of Science Editors:

Wilcock S. Governing social security fraud and non-compliance in Australia. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/60097


Cape Peninsula University of Technology

22. Desai, Mohammed Reza. An integrated approach for information security compliance in a financial services organisation .

Degree: 2016, Cape Peninsula University of Technology

 The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial… (more)

Subjects/Keywords: Financial services industry  – Computer networks  – Safety measures; Computer networks  – Security measures; Information technology  – Security measures; Computer security; Financial services industry  – Computer networks  – Law and legislation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Desai, M. R. (2016). An integrated approach for information security compliance in a financial services organisation . (Thesis). Cape Peninsula University of Technology. Retrieved from http://etd.cput.ac.za/handle/20.500.11838/2396

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Desai, Mohammed Reza. “An integrated approach for information security compliance in a financial services organisation .” 2016. Thesis, Cape Peninsula University of Technology. Accessed September 19, 2019. http://etd.cput.ac.za/handle/20.500.11838/2396.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Desai, Mohammed Reza. “An integrated approach for information security compliance in a financial services organisation .” 2016. Web. 19 Sep 2019.

Vancouver:

Desai MR. An integrated approach for information security compliance in a financial services organisation . [Internet] [Thesis]. Cape Peninsula University of Technology; 2016. [cited 2019 Sep 19]. Available from: http://etd.cput.ac.za/handle/20.500.11838/2396.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Desai MR. An integrated approach for information security compliance in a financial services organisation . [Thesis]. Cape Peninsula University of Technology; 2016. Available from: http://etd.cput.ac.za/handle/20.500.11838/2396

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linnaeus University

23. Nikolov, Nikolay. Corporate Network : Security Aspects.

Degree: Physics and Mathematics, 2010, Linnaeus University

  Every corporation using IT technologies needs a good and carefully secured network design. The IT security is a key factor of a normal functional… (more)

Subjects/Keywords: design examples; e-mail services; web services; dns services; dhcp services; ldap services; routers; firewalls; hardering; security technologies; RADIUS; OTP; PKI; IDS; ACLs; cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nikolov, N. (2010). Corporate Network : Security Aspects. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nikolov, Nikolay. “Corporate Network : Security Aspects.” 2010. Thesis, Linnaeus University. Accessed September 19, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nikolov, Nikolay. “Corporate Network : Security Aspects.” 2010. Web. 19 Sep 2019.

Vancouver:

Nikolov N. Corporate Network : Security Aspects. [Internet] [Thesis]. Linnaeus University; 2010. [cited 2019 Sep 19]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nikolov N. Corporate Network : Security Aspects. [Thesis]. Linnaeus University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8924

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Northeastern University

24. Cassola, Aldo. Providing privacy from the residential cloud.

Degree: PhD, Department of Computer Science, 2015, Northeastern University

 The growth of mobile devices and computing has continued in recent years to the point where mobile network providers must not only upgrade their networks… (more)

Subjects/Keywords: anonymity; broadband; privacy; residential; security; Wi-Fi; Computer Sciences; Computer networks; Security measures; Web services; Security measures; Cloud computing; Security measures; Mobile computing; Security measures; Wireless LANs; Security measures; Broadband communication systems; Security measures; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cassola, A. (2015). Providing privacy from the residential cloud. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20128811

Chicago Manual of Style (16th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Doctoral Dissertation, Northeastern University. Accessed September 19, 2019. http://hdl.handle.net/2047/d20128811.

MLA Handbook (7th Edition):

Cassola, Aldo. “Providing privacy from the residential cloud.” 2015. Web. 19 Sep 2019.

Vancouver:

Cassola A. Providing privacy from the residential cloud. [Internet] [Doctoral dissertation]. Northeastern University; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/2047/d20128811.

Council of Science Editors:

Cassola A. Providing privacy from the residential cloud. [Doctoral Dissertation]. Northeastern University; 2015. Available from: http://hdl.handle.net/2047/d20128811


University of Colorado

25. Sayler, Andy. Custos: A Flexibly Secure Key-Value Storage Platform.

Degree: MS, 2013, University of Colorado

  The magnitude of the digital data we create, store, and interact with on a daily basis is rapidly increasing. Simultaneously, we are demanding increasingly… (more)

Subjects/Keywords: Cloud Services; Computer Security; Encryption; Key Management; Key Storage as a Service; Secret Storage; Computer Sciences; Data Storage Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sayler, A. (2013). Custos: A Flexibly Secure Key-Value Storage Platform. (Masters Thesis). University of Colorado. Retrieved from http://scholar.colorado.edu/csci_gradetds/80

Chicago Manual of Style (16th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Masters Thesis, University of Colorado. Accessed September 19, 2019. http://scholar.colorado.edu/csci_gradetds/80.

MLA Handbook (7th Edition):

Sayler, Andy. “Custos: A Flexibly Secure Key-Value Storage Platform.” 2013. Web. 19 Sep 2019.

Vancouver:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Internet] [Masters thesis]. University of Colorado; 2013. [cited 2019 Sep 19]. Available from: http://scholar.colorado.edu/csci_gradetds/80.

Council of Science Editors:

Sayler A. Custos: A Flexibly Secure Key-Value Storage Platform. [Masters Thesis]. University of Colorado; 2013. Available from: http://scholar.colorado.edu/csci_gradetds/80


University of KwaZulu-Natal

26. [No author]. Privatised peacekeeping : a necessary evil? .

Degree: Philosophy, 2008, University of KwaZulu-Natal

 The rise of the Private Military Industry has been cemented in modern global political reality, but where next will this multi-billion dollar industry go and… (more)

Subjects/Keywords: Private security companies.; Mercenary troops.; Private security services.; Peace-building.; Peacekeeping forces.; Private military companies.; Philosophy.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

author], [. (2008). Privatised peacekeeping : a necessary evil? . (Thesis). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/206

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

author], [No. “Privatised peacekeeping : a necessary evil? .” 2008. Thesis, University of KwaZulu-Natal. Accessed September 19, 2019. http://hdl.handle.net/10413/206.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

author], [No. “Privatised peacekeeping : a necessary evil? .” 2008. Web. 19 Sep 2019.

Vancouver:

author] [. Privatised peacekeeping : a necessary evil? . [Internet] [Thesis]. University of KwaZulu-Natal; 2008. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10413/206.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

author] [. Privatised peacekeeping : a necessary evil? . [Thesis]. University of KwaZulu-Natal; 2008. Available from: http://hdl.handle.net/10413/206

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North-West University

27. Jabavu, Simlindile Wellington. An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu .

Degree: 2014, North-West University

 The use of Public-Private Partnerships (PPPs) by governments on all continents has been rapidly growing as government departments and their agencies continue to look for… (more)

Subjects/Keywords: Public Private Partnerships; Service Providers; Social Security Payment; Outsourcing; Procurement; Public Services; Social Security Grants; Risks; Service Delivery

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jabavu, S. W. (2014). An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu . (Thesis). North-West University. Retrieved from http://hdl.handle.net/10394/15295

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jabavu, Simlindile Wellington. “An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu .” 2014. Thesis, North-West University. Accessed September 19, 2019. http://hdl.handle.net/10394/15295.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jabavu, Simlindile Wellington. “An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu .” 2014. Web. 19 Sep 2019.

Vancouver:

Jabavu SW. An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu . [Internet] [Thesis]. North-West University; 2014. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10394/15295.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jabavu SW. An assessment of Public Private Partnerships as an alternative procurement method : the case of the South African Social Security Agency / Simlindile Wellington Jabavu . [Thesis]. North-West University; 2014. Available from: http://hdl.handle.net/10394/15295

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

28. Mbaya, Ibrahim Rajab. Towards a security framework for the semantic web .

Degree: 2009, University of South Africa

 With the increasing use of the Web and the need to automate, interoperate, and reason about resources and services on the Web, the Semantic Web… (more)

Subjects/Keywords: Semantic Web; Security; Agents; Web services; Security framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mbaya, I. R. (2009). Towards a security framework for the semantic web . (Masters Thesis). University of South Africa. Retrieved from http://hdl.handle.net/10500/2122

Chicago Manual of Style (16th Edition):

Mbaya, Ibrahim Rajab. “Towards a security framework for the semantic web .” 2009. Masters Thesis, University of South Africa. Accessed September 19, 2019. http://hdl.handle.net/10500/2122.

MLA Handbook (7th Edition):

Mbaya, Ibrahim Rajab. “Towards a security framework for the semantic web .” 2009. Web. 19 Sep 2019.

Vancouver:

Mbaya IR. Towards a security framework for the semantic web . [Internet] [Masters thesis]. University of South Africa; 2009. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/10500/2122.

Council of Science Editors:

Mbaya IR. Towards a security framework for the semantic web . [Masters Thesis]. University of South Africa; 2009. Available from: http://hdl.handle.net/10500/2122


Georgia Southern University

29. Henderson, Brent Michael. Custom Windows Patching Methodology - Comparative Analysis.

Degree: MSin Applied Engineering (M.S.A.E.), Department of Information Technology, 2018, Georgia Southern University

  Windows Server Update Services has been a common mainstay among organizations with a heavy footprint of Windows operating systems since it was originally released… (more)

Subjects/Keywords: Windows; Patch; Patching; System Updates; Cybersecurity; Security; Windows Server Update Services; WSUS; PowerShell; Microsoft Baseline Security Analyzer; Technology and Innovation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Henderson, B. M. (2018). Custom Windows Patching Methodology - Comparative Analysis. (Masters Thesis). Georgia Southern University. Retrieved from https://digitalcommons.georgiasouthern.edu/etd/1849

Chicago Manual of Style (16th Edition):

Henderson, Brent Michael. “Custom Windows Patching Methodology - Comparative Analysis.” 2018. Masters Thesis, Georgia Southern University. Accessed September 19, 2019. https://digitalcommons.georgiasouthern.edu/etd/1849.

MLA Handbook (7th Edition):

Henderson, Brent Michael. “Custom Windows Patching Methodology - Comparative Analysis.” 2018. Web. 19 Sep 2019.

Vancouver:

Henderson BM. Custom Windows Patching Methodology - Comparative Analysis. [Internet] [Masters thesis]. Georgia Southern University; 2018. [cited 2019 Sep 19]. Available from: https://digitalcommons.georgiasouthern.edu/etd/1849.

Council of Science Editors:

Henderson BM. Custom Windows Patching Methodology - Comparative Analysis. [Masters Thesis]. Georgia Southern University; 2018. Available from: https://digitalcommons.georgiasouthern.edu/etd/1849


Brno University of Technology

30. Rybáková, Alena. Posouzení a návrh informační bezpečnosti v organizaci .

Degree: 2015, Brno University of Technology

 Tato diplomová práce pojednává o problematice informační bezpečnosti v organizaci. Snahou autorky je získat široký přehled souvislostí, které potom budou zhodnoceny v závěrečné části, při… (more)

Subjects/Keywords: ISMS; ITSM; bezpečnost informací; kybernetická bezpečnost; IT služby; ISMS; ITSM; information security; cyber security; IT services

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rybáková, A. (2015). Posouzení a návrh informační bezpečnosti v organizaci . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/39325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rybáková, Alena. “Posouzení a návrh informační bezpečnosti v organizaci .” 2015. Thesis, Brno University of Technology. Accessed September 19, 2019. http://hdl.handle.net/11012/39325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rybáková, Alena. “Posouzení a návrh informační bezpečnosti v organizaci .” 2015. Web. 19 Sep 2019.

Vancouver:

Rybáková A. Posouzení a návrh informační bezpečnosti v organizaci . [Internet] [Thesis]. Brno University of Technology; 2015. [cited 2019 Sep 19]. Available from: http://hdl.handle.net/11012/39325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rybáková A. Posouzení a návrh informační bezpečnosti v organizaci . [Thesis]. Brno University of Technology; 2015. Available from: http://hdl.handle.net/11012/39325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8]

.