Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(security). Showing records 1 – 30 of 14285 total matches.

[1] [2] [3] [4] [5] … [477]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

Country

▼ Search Limiters

1. Küpçü, Alptekin. Efficient Cryptography for the Next Generation Secure Cloud.

Degree: PhD, Computer Science, 2010, Brown University

 Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since… (more)

Subjects/Keywords: security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Küpçü, A. (2010). Efficient Cryptography for the Next Generation Secure Cloud. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:11123/

Chicago Manual of Style (16th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Doctoral Dissertation, Brown University. Accessed August 08, 2020. https://repository.library.brown.edu/studio/item/bdr:11123/.

MLA Handbook (7th Edition):

Küpçü, Alptekin. “Efficient Cryptography for the Next Generation Secure Cloud.” 2010. Web. 08 Aug 2020.

Vancouver:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Internet] [Doctoral dissertation]. Brown University; 2010. [cited 2020 Aug 08]. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/.

Council of Science Editors:

Küpçü A. Efficient Cryptography for the Next Generation Secure Cloud. [Doctoral Dissertation]. Brown University; 2010. Available from: https://repository.library.brown.edu/studio/item/bdr:11123/


Penn State University

2. Kamath, Radhesh Muralidhara. Applying Netlabel to Network Access Control in a Virtualized Environment.

Degree: MS, Computer Science and Engineering, 2008, Penn State University

 We consider the problem of transmitting authorization data in a distributed environment comprised of applications hosted on paravirtualized Virtual Machines. The current mechanism, called Labeled… (more)

Subjects/Keywords: network security; virtualization; security; system security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kamath, R. M. (2008). Applying Netlabel to Network Access Control in a Virtualized Environment. (Masters Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/8454

Chicago Manual of Style (16th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Masters Thesis, Penn State University. Accessed August 08, 2020. https://etda.libraries.psu.edu/catalog/8454.

MLA Handbook (7th Edition):

Kamath, Radhesh Muralidhara. “Applying Netlabel to Network Access Control in a Virtualized Environment.” 2008. Web. 08 Aug 2020.

Vancouver:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Internet] [Masters thesis]. Penn State University; 2008. [cited 2020 Aug 08]. Available from: https://etda.libraries.psu.edu/catalog/8454.

Council of Science Editors:

Kamath RM. Applying Netlabel to Network Access Control in a Virtualized Environment. [Masters Thesis]. Penn State University; 2008. Available from: https://etda.libraries.psu.edu/catalog/8454


Virginia Tech

3. Deng, Yipan. DeviceGuard: External Device-Assisted System And Data Security.

Degree: MS, Computer Science, 2011, Virginia Tech

 This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such… (more)

Subjects/Keywords: Host Security; System Security; Data Security; Smartphone

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deng, Y. (2011). DeviceGuard: External Device-Assisted System And Data Security. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/76767

Chicago Manual of Style (16th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Masters Thesis, Virginia Tech. Accessed August 08, 2020. http://hdl.handle.net/10919/76767.

MLA Handbook (7th Edition):

Deng, Yipan. “DeviceGuard: External Device-Assisted System And Data Security.” 2011. Web. 08 Aug 2020.

Vancouver:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10919/76767.

Council of Science Editors:

Deng Y. DeviceGuard: External Device-Assisted System And Data Security. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/76767


University of Colorado

4. Dixon, Bryan Charles. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.

Degree: PhD, Computer Science, 2013, University of Colorado

  In recent years there has been a growing number of viruses, rootkits, and malware designed to gain access to system resources and information stored… (more)

Subjects/Keywords: Mobile Security; Security; Computer Sciences; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dixon, B. C. (2013). Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. (Doctoral Dissertation). University of Colorado. Retrieved from https://scholar.colorado.edu/csci_gradetds/69

Chicago Manual of Style (16th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Doctoral Dissertation, University of Colorado. Accessed August 08, 2020. https://scholar.colorado.edu/csci_gradetds/69.

MLA Handbook (7th Edition):

Dixon, Bryan Charles. “Exploring Low Profile Techniques for Malicious Code Detection on Smartphones.” 2013. Web. 08 Aug 2020.

Vancouver:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Internet] [Doctoral dissertation]. University of Colorado; 2013. [cited 2020 Aug 08]. Available from: https://scholar.colorado.edu/csci_gradetds/69.

Council of Science Editors:

Dixon BC. Exploring Low Profile Techniques for Malicious Code Detection on Smartphones. [Doctoral Dissertation]. University of Colorado; 2013. Available from: https://scholar.colorado.edu/csci_gradetds/69


George Mason University

5. Vella, Andre`. From National Security to Environmental Security: A Historical Overview .

Degree: 2012, George Mason University

 The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow… (more)

Subjects/Keywords: Environmental Security; National Security; Security; Environment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vella, A. (2012). From National Security to Environmental Security: A Historical Overview . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/7528

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vella, Andre`. “From National Security to Environmental Security: A Historical Overview .” 2012. Thesis, George Mason University. Accessed August 08, 2020. http://hdl.handle.net/1920/7528.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vella, Andre`. “From National Security to Environmental Security: A Historical Overview .” 2012. Web. 08 Aug 2020.

Vancouver:

Vella A. From National Security to Environmental Security: A Historical Overview . [Internet] [Thesis]. George Mason University; 2012. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/1920/7528.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vella A. From National Security to Environmental Security: A Historical Overview . [Thesis]. George Mason University; 2012. Available from: http://hdl.handle.net/1920/7528

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Cincinnati

6. Hausrath, Nathaniel L. Methods for Hospital Network and Computer Security.

Degree: MS, Engineering and Applied Science: Computer Science, 2011, University of Cincinnati

 Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in… (more)

Subjects/Keywords: Information Technology; hospital it Security; information security; network security; computer security; hospital information security; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hausrath, N. L. (2011). Methods for Hospital Network and Computer Security. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234

Chicago Manual of Style (16th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Masters Thesis, University of Cincinnati. Accessed August 08, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

MLA Handbook (7th Edition):

Hausrath, Nathaniel L. “Methods for Hospital Network and Computer Security.” 2011. Web. 08 Aug 2020.

Vancouver:

Hausrath NL. Methods for Hospital Network and Computer Security. [Internet] [Masters thesis]. University of Cincinnati; 2011. [cited 2020 Aug 08]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234.

Council of Science Editors:

Hausrath NL. Methods for Hospital Network and Computer Security. [Masters Thesis]. University of Cincinnati; 2011. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1303845234


Penn State University

7. Ren, Chuangang. A Study of Selected Issues in Android Security.

Degree: PhD, Computer Science and Engineering, 2016, Penn State University

 Mobile devices such as smartphones have become an integral part of society today, shaping people’s daily life, changing the landscape of how business operate and… (more)

Subjects/Keywords: Android; Computer Security; Android Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ren, C. (2016). A Study of Selected Issues in Android Security. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/b5644r534

Chicago Manual of Style (16th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Doctoral Dissertation, Penn State University. Accessed August 08, 2020. https://etda.libraries.psu.edu/catalog/b5644r534.

MLA Handbook (7th Edition):

Ren, Chuangang. “A Study of Selected Issues in Android Security.” 2016. Web. 08 Aug 2020.

Vancouver:

Ren C. A Study of Selected Issues in Android Security. [Internet] [Doctoral dissertation]. Penn State University; 2016. [cited 2020 Aug 08]. Available from: https://etda.libraries.psu.edu/catalog/b5644r534.

Council of Science Editors:

Ren C. A Study of Selected Issues in Android Security. [Doctoral Dissertation]. Penn State University; 2016. Available from: https://etda.libraries.psu.edu/catalog/b5644r534


University of Johannesburg

8. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed August 08, 2020. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 08 Aug 2020.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

9. Tolnai, Annette. ISAP - an information security awareness portal.

Degree: 2010, University of Johannesburg

M.Sc.

The exponential growth of the Internet contributes to risks and threats which materialize without our knowledge. The more computer and Internet use becomes a… (more)

Subjects/Keywords: Computer security; Internet security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tolnai, A. (2010). ISAP - an information security awareness portal. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Thesis, University of Johannesburg. Accessed August 08, 2020. http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tolnai, Annette. “ISAP - an information security awareness portal.” 2010. Web. 08 Aug 2020.

Vancouver:

Tolnai A. ISAP - an information security awareness portal. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10210/3283.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tolnai A. ISAP - an information security awareness portal. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3283

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Liberty University

10. Bass, Chelsea. Flying Thru Security.

Degree: 2017, Liberty University

 Due to the Transportation Security Act (TSA), which passed in November 2011, airport security has drastically changed. The new security checkpoint practices have caused security(more)

Subjects/Keywords: Airport Security; Airport Security Solutions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bass, C. (2017). Flying Thru Security. (Masters Thesis). Liberty University. Retrieved from http://digitalcommons.liberty.edu/masters/461

Chicago Manual of Style (16th Edition):

Bass, Chelsea. “Flying Thru Security.” 2017. Masters Thesis, Liberty University. Accessed August 08, 2020. http://digitalcommons.liberty.edu/masters/461.

MLA Handbook (7th Edition):

Bass, Chelsea. “Flying Thru Security.” 2017. Web. 08 Aug 2020.

Vancouver:

Bass C. Flying Thru Security. [Internet] [Masters thesis]. Liberty University; 2017. [cited 2020 Aug 08]. Available from: http://digitalcommons.liberty.edu/masters/461.

Council of Science Editors:

Bass C. Flying Thru Security. [Masters Thesis]. Liberty University; 2017. Available from: http://digitalcommons.liberty.edu/masters/461


University of Ghana

11. Otoo, C.K. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.

Degree: 2016, University of Ghana

 In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex… (more)

Subjects/Keywords: Cybersecurity; National Security; Human Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. (Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439

Chicago Manual of Style (16th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Masters Thesis, University of Ghana. Accessed August 08, 2020. http://ugspace.ug.edu.gh/handle/123456789/27439.

MLA Handbook (7th Edition):

Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. ” 2016. Web. 08 Aug 2020.

Vancouver:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Internet] [Masters thesis]. University of Ghana; 2016. [cited 2020 Aug 08]. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.

Council of Science Editors:

Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace. [Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439


Halmstad University

12. Rojas, Jose Enrique Charpentier. Web application Security.

Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University

  Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and… (more)

Subjects/Keywords: Web Application Security; Network Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rojas, J. E. C. (2013). Web application Security. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Thesis, Halmstad University. Accessed August 08, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rojas, Jose Enrique Charpentier. “Web application Security.” 2013. Web. 08 Aug 2020.

Vancouver:

Rojas JEC. Web application Security. [Internet] [Thesis]. Halmstad University; 2013. [cited 2020 Aug 08]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rojas JEC. Web application Security. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Garrett, Keith. Vulnerabililty Analysis of Multi-Factor Authentication Protocols.

Degree: 2016, University of North Florida

 In this thesis, the author hypothesizes that the use of computationally intensive mathematical operations in password authentication protocols can lead to security vulnerabilities in those… (more)

Subjects/Keywords: clogging attack security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garrett, K. (2016). Vulnerabililty Analysis of Multi-Factor Authentication Protocols. (Thesis). University of North Florida. Retrieved from https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Thesis, University of North Florida. Accessed August 08, 2020. https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garrett, Keith. “Vulnerabililty Analysis of Multi-Factor Authentication Protocols.” 2016. Web. 08 Aug 2020.

Vancouver:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Internet] [Thesis]. University of North Florida; 2016. [cited 2020 Aug 08]. Available from: https://digitalcommons.unf.edu/etd/715.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garrett K. Vulnerabililty Analysis of Multi-Factor Authentication Protocols. [Thesis]. University of North Florida; 2016. Available from: https://digitalcommons.unf.edu/etd/715

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Peng, Jinghui. Secure covert communications over streaming media using dynamic steganography.

Degree: PhD, 2020, University of West London

 Streaming technologies such as VoIP are widely embedded into commercial and industrial applications, so it is imperative to address data security issues before the problems… (more)

Subjects/Keywords: Cyber security; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Peng, J. (2020). Secure covert communications over streaming media using dynamic steganography. (Doctoral Dissertation). University of West London. Retrieved from http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261

Chicago Manual of Style (16th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Doctoral Dissertation, University of West London. Accessed August 08, 2020. http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

MLA Handbook (7th Edition):

Peng, Jinghui. “Secure covert communications over streaming media using dynamic steganography.” 2020. Web. 08 Aug 2020.

Vancouver:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Internet] [Doctoral dissertation]. University of West London; 2020. [cited 2020 Aug 08]. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261.

Council of Science Editors:

Peng J. Secure covert communications over streaming media using dynamic steganography. [Doctoral Dissertation]. University of West London; 2020. Available from: http://repository.uwl.ac.uk/id/eprint/6943/ ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.805261


Queens University

15. Hunny, Umme. Orthogonal Security Defect Classification for Secure Software Development .

Degree: Computing, 2012, Queens University

Security defects or vulnerabilities are inescapable in software development. Thus, it is always better to address security issues during the software development phases, rather than… (more)

Subjects/Keywords: Security defect classification ; Software security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hunny, U. (2012). Orthogonal Security Defect Classification for Secure Software Development . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Thesis, Queens University. Accessed August 08, 2020. http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hunny, Umme. “Orthogonal Security Defect Classification for Secure Software Development .” 2012. Web. 08 Aug 2020.

Vancouver:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Internet] [Thesis]. Queens University; 2012. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/1974/7625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hunny U. Orthogonal Security Defect Classification for Secure Software Development . [Thesis]. Queens University; 2012. Available from: http://hdl.handle.net/1974/7625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

16. Soyref, Maxim. The holistic management of information security processes .

Degree: 2014, University of Sydney

 Title: The holistic management of information security processes Keywords: cybersecurity, information security, strategy, security process, security governance, security management This research examines information security management… (more)

Subjects/Keywords: Cybersecurity; Information security; Strategy; Security process; Security governance; Security management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Soyref, M. (2014). The holistic management of information security processes . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Thesis, University of Sydney. Accessed August 08, 2020. http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Soyref, Maxim. “The holistic management of information security processes .” 2014. Web. 08 Aug 2020.

Vancouver:

Soyref M. The holistic management of information security processes . [Internet] [Thesis]. University of Sydney; 2014. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/2123/13373.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Soyref M. The holistic management of information security processes . [Thesis]. University of Sydney; 2014. Available from: http://hdl.handle.net/2123/13373

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Texas A&M University

17. Okorafor, Unoma Ndili. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.

Degree: 2009, Texas A&M University

 Wireless ad hoc and sensor networks are envisioned to be self-organizing and autonomous networks, that may be randomly deployed where no fixed infrastructure is either… (more)

Subjects/Keywords: security; connectivity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okorafor, U. N. (2009). Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. (Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2950

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Okorafor, Unoma Ndili. “Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.” 2009. Thesis, Texas A&M University. Accessed August 08, 2020. http://hdl.handle.net/1969.1/ETD-TAMU-2950.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Okorafor, Unoma Ndili. “Secure Integrated Routing and Localization in Wireless Optical Sensor Networks.” 2009. Web. 08 Aug 2020.

Vancouver:

Okorafor UN. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. [Internet] [Thesis]. Texas A&M University; 2009. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2950.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Okorafor UN. Secure Integrated Routing and Localization in Wireless Optical Sensor Networks. [Thesis]. Texas A&M University; 2009. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2950

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Ortagus, Megan Leann. The Internet's Impacts on Power Differentials in Security and Conflict.

Degree: 2014, Johns Hopkins University

 Through case studies and empirical statistical research, this thesis tests the theory that information and communications technologies (ICT), specifically the Internet, is a casual factor… (more)

Subjects/Keywords: internet security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ortagus, M. L. (2014). The Internet's Impacts on Power Differentials in Security and Conflict. (Thesis). Johns Hopkins University. Retrieved from http://jhir.library.jhu.edu/handle/1774.2/37255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Thesis, Johns Hopkins University. Accessed August 08, 2020. http://jhir.library.jhu.edu/handle/1774.2/37255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ortagus, Megan Leann. “The Internet's Impacts on Power Differentials in Security and Conflict.” 2014. Web. 08 Aug 2020.

Vancouver:

Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Internet] [Thesis]. Johns Hopkins University; 2014. [cited 2020 Aug 08]. Available from: http://jhir.library.jhu.edu/handle/1774.2/37255.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ortagus ML. The Internet's Impacts on Power Differentials in Security and Conflict. [Thesis]. Johns Hopkins University; 2014. Available from: http://jhir.library.jhu.edu/handle/1774.2/37255

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Ramadurai, Vandhana. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.

Degree: 2013, Texas Digital Library

 This dissertation is an ethnographic inquiry into women???s experiences of food insecurity in Rajendranagar, a slum in Bangalore, India. As a critical ethnographer, I undertook… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ramadurai, V. (2013). Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. (Thesis). Texas Digital Library. Retrieved from http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Thesis, Texas Digital Library. Accessed August 08, 2020. http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ramadurai, Vandhana. “Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum.” 2013. Web. 08 Aug 2020.

Vancouver:

Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Internet] [Thesis]. Texas Digital Library; 2013. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ramadurai V. Narratives from Rajendranagar: A Critical Ethnographic Study of Food Insecurity in an Indian Slum. [Thesis]. Texas Digital Library; 2013. Available from: http://hdl.handle.net/1969; http://hdl.handle.net/2249.1/66611

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Ghosh, Esha. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.

Degree: Department of Computer Science, 2018, Brown University

 An integral component of the modern computing era is the ability to outsource data and computation to remote Cloud Service Providers or CSPs. The advent… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ghosh, E. (2018). Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. (Thesis). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Thesis, Brown University. Accessed August 08, 2020. https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ghosh, Esha. “Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data.” 2018. Web. 08 Aug 2020.

Vancouver:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Internet] [Thesis]. Brown University; 2018. [cited 2020 Aug 08]. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ghosh E. Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. [Thesis]. Brown University; 2018. Available from: https://repository.library.brown.edu/studio/item/bdr:792909/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

21. Irwin, Keith. A System for Managing User Obligations.

Degree: PhD, Computer Science, 2009, North Carolina State University

 As computer systems become a more pervasive part of our societies, actions within those computer systems are becoming increasingly governed by complex policies such as… (more)

Subjects/Keywords: security; obligations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irwin, K. (2009). A System for Managing User Obligations. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5170

Chicago Manual of Style (16th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Doctoral Dissertation, North Carolina State University. Accessed August 08, 2020. http://www.lib.ncsu.edu/resolver/1840.16/5170.

MLA Handbook (7th Edition):

Irwin, Keith. “A System for Managing User Obligations.” 2009. Web. 08 Aug 2020.

Vancouver:

Irwin K. A System for Managing User Obligations. [Internet] [Doctoral dissertation]. North Carolina State University; 2009. [cited 2020 Aug 08]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170.

Council of Science Editors:

Irwin K. A System for Managing User Obligations. [Doctoral Dissertation]. North Carolina State University; 2009. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5170

22. Antonopoulos, Alexandros. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.

Degree: 2009, University of Patras; Πανεπιστήμιο Πατρών

This dissertation addresses the problem of designing secure subsystems that can exist in non-trusted infrastructures ensuring their own safety to the greatest extent possible. The… (more)

Subjects/Keywords: Ασφάλεια; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Antonopoulos, A. (2009). Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. (Thesis). University of Patras; Πανεπιστήμιο Πατρών. Retrieved from http://hdl.handle.net/10442/hedi/31567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Antonopoulos, Alexandros. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Thesis, University of Patras; Πανεπιστήμιο Πατρών. Accessed August 08, 2020. http://hdl.handle.net/10442/hedi/31567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Antonopoulos, Alexandros. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Web. 08 Aug 2020.

Vancouver:

Antonopoulos A. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Internet] [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2009. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10442/hedi/31567.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Antonopoulos A. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Thesis]. University of Patras; Πανεπιστήμιο Πατρών; 2009. Available from: http://hdl.handle.net/10442/hedi/31567

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

23. ENDASHAW, SHIBRU. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .

Degree: 2012, Addis Ababa University

 Background: Underlying malnutrition is responsible for half of the deaths occurring among children under five years of age. Studying causes of malnutrition and acting upon,… (more)

Subjects/Keywords: NUTRITION SECURITY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

ENDASHAW, S. (2012). DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/3269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .” 2012. Thesis, Addis Ababa University. Accessed August 08, 2020. http://etd.aau.edu.et/dspace/handle/123456789/3269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

ENDASHAW, SHIBRU. “DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR .” 2012. Web. 08 Aug 2020.

Vancouver:

ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . [Internet] [Thesis]. Addis Ababa University; 2012. [cited 2020 Aug 08]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

ENDASHAW S. DETERMINANT OF NUTRITION SECURITY IN SHONE DISTRICT, HADIYA ZONE, SNNPR . [Thesis]. Addis Ababa University; 2012. Available from: http://etd.aau.edu.et/dspace/handle/123456789/3269

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Addis Ababa University

24. SENAIT, AREFAINE. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .

Degree: 2010, Addis Ababa University

 Ethiopia had been facing the challenges of ensuring food security for decades. The challenge is still with us. As a result, programs aimed at poverty… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

SENAIT, A. (2010). INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/7354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .” 2010. Thesis, Addis Ababa University. Accessed August 08, 2020. http://etd.aau.edu.et/dspace/handle/123456789/7354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

SENAIT, AREFAINE. “INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS .” 2010. Web. 08 Aug 2020.

Vancouver:

SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . [Internet] [Thesis]. Addis Ababa University; 2010. [cited 2020 Aug 08]. Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

SENAIT A. INFLUENCE OF EDITORS ON FOOD SECURITY COVERAGE IN THE ETHIOPIAN PRIVATE NEWSPAPERS: FOCUS ON THE REPORTER, CAPITAL AND FORTUNE NEWSPAPERS . [Thesis]. Addis Ababa University; 2010. Available from: http://etd.aau.edu.et/dspace/handle/123456789/7354

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

25. Mulievi, Amos M. Information security policy framework for a manufacturing firm .

Degree: 2009, University of Nairobi

 Information and the supporting processes, systems, and networks are important business assets. Defining, achieving, maintaining, and improving information security is essential to maintain competitive edge,… (more)

Subjects/Keywords: Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mulievi, A. M. (2009). Information security policy framework for a manufacturing firm . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Thesis, University of Nairobi. Accessed August 08, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mulievi, Amos M. “Information security policy framework for a manufacturing firm .” 2009. Web. 08 Aug 2020.

Vancouver:

Mulievi AM. Information security policy framework for a manufacturing firm . [Internet] [Thesis]. University of Nairobi; 2009. [cited 2020 Aug 08]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mulievi AM. Information security policy framework for a manufacturing firm . [Thesis]. University of Nairobi; 2009. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/21667

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Nairobi

26. Ngumbi, Raphael M. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .

Degree: 2012, University of Nairobi

 This study is concerned with alternative approaches to sustainable food security in Kyuso District-Kitui County. The objectives of the study includes; to establish how capacity… (more)

Subjects/Keywords: Food security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ngumbi, R. M. (2012). The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . (Thesis). University of Nairobi. Retrieved from http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ngumbi, Raphael M. “The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .” 2012. Thesis, University of Nairobi. Accessed August 08, 2020. http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ngumbi, Raphael M. “The influence of alternative approaches to sustainable food security in Kyuso District Kitui County .” 2012. Web. 08 Aug 2020.

Vancouver:

Ngumbi RM. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . [Internet] [Thesis]. University of Nairobi; 2012. [cited 2020 Aug 08]. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ngumbi RM. The influence of alternative approaches to sustainable food security in Kyuso District Kitui County . [Thesis]. University of Nairobi; 2012. Available from: http://erepository.uonbi.ac.ke:8080/xmlui/handle/123456789/15168

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

27. Lezzaik, Khalil Abdallah. An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region.

Degree: PhD, Geology, 2016, University of Georgia

 Water crises have been ranked as the top global risk to economies, environments, and people in the 21st century. Nonetheless, the lack of continuous groundwater… (more)

Subjects/Keywords: FOOD SECURITY

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lezzaik, K. A. (2016). An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region. (Doctoral Dissertation). University of Georgia. Retrieved from http://purl.galileo.usg.edu/uga_etd/lezzaik_khalil_a_201608_phd

Chicago Manual of Style (16th Edition):

Lezzaik, Khalil Abdallah. “An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region.” 2016. Doctoral Dissertation, University of Georgia. Accessed August 08, 2020. http://purl.galileo.usg.edu/uga_etd/lezzaik_khalil_a_201608_phd.

MLA Handbook (7th Edition):

Lezzaik, Khalil Abdallah. “An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region.” 2016. Web. 08 Aug 2020.

Vancouver:

Lezzaik KA. An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region. [Internet] [Doctoral dissertation]. University of Georgia; 2016. [cited 2020 Aug 08]. Available from: http://purl.galileo.usg.edu/uga_etd/lezzaik_khalil_a_201608_phd.

Council of Science Editors:

Lezzaik KA. An integrated assessment of groundwater scarcity and risk conditions in the Arab Middle East and North Africa region. [Doctoral Dissertation]. University of Georgia; 2016. Available from: http://purl.galileo.usg.edu/uga_etd/lezzaik_khalil_a_201608_phd

28. Williams, Brian. A Comparison of Static to Biologically Modeled Intrusion Detection Systems.

Degree: 2010, Wake Forest University

 Traditional computer security is provided through the implementation of many unique patterns, known as signatures, each used to identify a specific threat. In a world… (more)

Subjects/Keywords: security

…Abstract Traditional computer security is provided through the implementation of many… …security measures. Each ant in the virtual colony has the ability to detect one specific metric… …same period of time hovered under 20% [7]. As a result, computer security in the… …security has also evolved. It is no longer sufficient to merely secure physical access to a PC in… …computerized ticket sales purchased at a moment’s notice have raised a myriad of privacy and security… 

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Williams, B. (2010). A Comparison of Static to Biologically Modeled Intrusion Detection Systems. (Thesis). Wake Forest University. Retrieved from http://hdl.handle.net/10339/14740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Williams, Brian. “A Comparison of Static to Biologically Modeled Intrusion Detection Systems.” 2010. Thesis, Wake Forest University. Accessed August 08, 2020. http://hdl.handle.net/10339/14740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Williams, Brian. “A Comparison of Static to Biologically Modeled Intrusion Detection Systems.” 2010. Web. 08 Aug 2020.

Vancouver:

Williams B. A Comparison of Static to Biologically Modeled Intrusion Detection Systems. [Internet] [Thesis]. Wake Forest University; 2010. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10339/14740.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Williams B. A Comparison of Static to Biologically Modeled Intrusion Detection Systems. [Thesis]. Wake Forest University; 2010. Available from: http://hdl.handle.net/10339/14740

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Smith, Robert Walter. Evolutionary Strategies for Secure Moving Target Configuration Discovery.

Degree: 2014, Wake Forest University

 Defense against many cyber security threats can be implemented with existing software on the machine, without requiring patches for current programs or the installation of… (more)

Subjects/Keywords: Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, R. W. (2014). Evolutionary Strategies for Secure Moving Target Configuration Discovery. (Thesis). Wake Forest University. Retrieved from http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Thesis, Wake Forest University. Accessed August 08, 2020. http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Robert Walter. “Evolutionary Strategies for Secure Moving Target Configuration Discovery.” 2014. Web. 08 Aug 2020.

Vancouver:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Internet] [Thesis]. Wake Forest University; 2014. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10339/39267.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith RW. Evolutionary Strategies for Secure Moving Target Configuration Discovery. [Thesis]. Wake Forest University; 2014. Available from: http://hdl.handle.net/10339/39267

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of KwaZulu-Natal

30. Mutunga, Nancy Muthoni. Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?.

Degree: PhD, Food security, 2012, University of KwaZulu-Natal

 Food insecurity has remained pervasive for most Kenyan livelihoods despite the implementation of substantive interventions by the government and its development partners, since it gained… (more)

Subjects/Keywords: Food security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mutunga, N. M. (2012). Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?. (Doctoral Dissertation). University of KwaZulu-Natal. Retrieved from http://hdl.handle.net/10413/8735

Chicago Manual of Style (16th Edition):

Mutunga, Nancy Muthoni. “Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?.” 2012. Doctoral Dissertation, University of KwaZulu-Natal. Accessed August 08, 2020. http://hdl.handle.net/10413/8735.

MLA Handbook (7th Edition):

Mutunga, Nancy Muthoni. “Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?.” 2012. Web. 08 Aug 2020.

Vancouver:

Mutunga NM. Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?. [Internet] [Doctoral dissertation]. University of KwaZulu-Natal; 2012. [cited 2020 Aug 08]. Available from: http://hdl.handle.net/10413/8735.

Council of Science Editors:

Mutunga NM. Can livelihood approaches adequately evaluate the determinants of food insecurity to inform interventions in Kenya?. [Doctoral Dissertation]. University of KwaZulu-Natal; 2012. Available from: http://hdl.handle.net/10413/8735

[1] [2] [3] [4] [5] … [477]

.