• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 691
  • 38
  • 37
  • 14
  • 11
  • 7
  • 6
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 1069
  • 1069
  • 305
  • 273
  • 220
  • 216
  • 207
  • 198
  • 156
  • 115
  • 110
  • 104
  • 101
  • 94
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
431

Secure distribution of open source information /

Rogers, Jason Lee. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2004. / Thesis advisor(s): George Dinolt. Includes bibliographical references (p. 57-59). Also available online.
432

Compilation for intrusion detection systems /

Lydon, Andrew. January 2004 (has links)
Thesis (M.S.)--Ohio University, March, 2004. / Includes bibliographical references (p. 115-122).
433

Xor based optical encryption with noise performance modeling and application to image transmission over wireless IP lan /

Zhang, Bo. January 1900 (has links)
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004. / Word processed copy. Summary in English. Includes bibliographical references (leaves 117-120). Also available online.
434

Windows XP Operating System security analysis /

Goktepe, Meftun. January 2002 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Richard Harkins, Cynthia Irvine. Includes bibliographical references (p. 105-107). Also available online.
435

Cube attacks on cryptographic hash functions /

Lathrop, Joel. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 62-65).
436

Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /

Young, Randall Frederick. Windsor, John C., January 2008 (has links)
Thesis (Ph. D.)--University of North Texas, August, 2008. / Title from title page display. Includes bibliographical references.
437

Flexible authorizations in workflow management systems

Lui, W. C. January 2002 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2003. / Includes bibliographical references (leaves 162-168) Also available in print.
438

Data privacy the non-interactive setting /

Narayanan, Arvind, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2009. / Title from PDF title page (University of Texas Digital Repository, viewed on Sept. 17, 2009). Vita. Includes bibliographical references.
439

Methodologies for power analysis attacks on hardware implementations of AES /

Smith, Kenneth James. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 96-97).
440

Robust and efficient intrusion detection systems /

Gupta, Kapil Kumar. January 2009 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Computer Science and Software Engineering, 2009. / Typescript. Includes bibliographical references (p. 131-146)

Page generated in 0.051 seconds