• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 690
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1068
  • 1068
  • 304
  • 273
  • 219
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 100
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

An extensive analysis of the software security vunerabilities that exist within the Java software execution environment /

Marouf, Said M. January 2008 (has links)
Thesis (M.S.E.)--University of Wisconsin -- La Crosse, 2008. / Includes bibliographical references (p. 42-45).
222

Security for PDAs

Huang, Jianyong. January 2004 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2004. / Typescript. Includes bibliographical references: p. 68-73.
223

Generic reverse engineering architecture with compiler and compression classification components

Torri, Stephen A. Hamilton, John A., January 2009 (has links)
Thesis (Ph. D.)--Auburn University. / Abstract. Vita. Includes bibliographical references (p. 177-182).
224

A new model for computer network security risk analysis /

Martel, Sophie, January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2002. / Includes bibliographical references (p. 167-172). Also available in electronic format on the Internet.
225

An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments

Winner-Leoni, Melissa D. January 2008 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2008. / Title from PDF title page (viewed on Feb. 09, 2009). Includes bibliographical references.
226

A smart card based authentication system for peer and group model

Chan, Tak-fai, Dan. January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2009. / Includes bibliographical references (p. 63-70) Also available in print.
227

Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007.

Sirisukha, Sid. January 2007 (has links)
Thesis (PhD) -- AUT University, 2007. / Includes bibliographical references. Also held in print (xvii, 268 leaves ; 30 cm.) in City Campus Theses Collection (T 005.8 SIR )
228

Three essays on managing information systems security : patch management, learning dynamics, and security software market /

Zhang, Guo Ying, January 2007 (has links)
Thesis (Ph. D.)--University of Washington, 2007. / Vita. Includes bibliographical references (leaves 91-98).
229

Service assurance in insecure networks with Byzantine adversaries

Rabinovich, Paul. January 2008 (has links)
Thesis (Ph.D.)--George Mason University, 2008. / Title from PDF t.p. (viewed July 22, 2008). Thesis director: Robert Simon. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science. Vita: p. 188. Includes bibliographical references (p. 176-187). Also available in print.
230

Security engineering with patterns : origins, theoretical models, and new applications /

Schumacher, Markus. January 2003 (has links)
Techn. Univ., Diss.--Darmstadt, 2003.

Page generated in 0.0775 seconds