Spelling suggestions: "subject:"eomputer security"" "subject:"aomputer security""
241 |
Remote application support in a multi level environment /Cooper, Robert C. January 2005 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2005. / Thesis Advisor(s): Thuy D. Nguyen, Cynthia E. Irvine. Includes bibliographical references (p. 53). Also available online.
|
242 |
Framework for managing metadata security tags as the basis for making security decisions /Aposporis, Panagiotis. January 2002 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2002. / Thesis advisor(s): Ted G. Lewis, Timothy E. Levin. Includes bibliographical references (p. 269-272). Also available online.
|
243 |
Establishing trust in encrypted programsXia, Ying Han. January 2008 (has links)
Thesis (Ph.D.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Owen, Henry; Committee Co-Chair: Abler, Randal; Committee Member: Copeland, John; Committee Member: Giffin, Jon; Committee Member: Hamblen, Jim.
|
244 |
Advances in decentralized and stateful access controlSerban, Constantin, January 2008 (has links)
Thesis (Ph. D.)--Rutgers University, 2008. / "Graduate Program in Computer Science." Includes bibliographical references (p. 111-115).
|
245 |
Investigating the utility of software semantics for host-based intrusion detection systems a thesis /Moffie, Micha. January 1900 (has links)
Thesis (Ph. D.)--Northeastern University, 2008. / Title from title page (viewed June 4, 2009). Graduate School of Engineering, Dept. of Electrical and Computer Engineering. Includes bibliographical references (p. 117-124).
|
246 |
General deterrence theory assessing information systems security effectiveness in large versus small businesses /Schuessler, Joseph H. Windsor, John C., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, May, 2009. / Title from title page display. Includes bibliographical references.
|
247 |
A socio-technical perspective on information security knowledge and attitudes /Long, Cheri Lanette, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 210-223). Available also in a digital version from Dissertation Abstracts.
|
248 |
Quantitative metrics for network security evaluation /El-Hassan, Fadi. January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 112-122). Also available in electronic format on the Internet.
|
249 |
Securing communications in an anonymous overlay network /Wilkinson, Simon January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2007. / Includes bibliographical references (p. 160-167). Also available in electronic format on the Internet.
|
250 |
Evaluating the effectiveness of an intrusion prevention system-honeypot hybrid /Tamagna-Darr, Lucas. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaf 30).
|
Page generated in 0.0978 seconds