• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 280
  • 55
  • 51
  • 25
  • 19
  • 18
  • 17
  • 10
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 583
  • 583
  • 231
  • 227
  • 180
  • 149
  • 104
  • 95
  • 79
  • 77
  • 75
  • 73
  • 71
  • 68
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Identifying the objectives of EU data protection regulation and justifying its costs

Lynskey, Orla January 2013 (has links)
No description available.
112

Information privacy rights of the individual versus the public's right to freedom of information.

Pillay, Pregala. January 1995 (has links)
No abstract available. / Thesis (MPA)-University of Durban-Westville, 1995.
113

A formal protection model of security in distributed systems

Benson, Glenn Stuart 08 1900 (has links)
No description available.
114

Computer security : data control and protection

Neophytou, Andonis January 1992 (has links)
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study. / Department of Computer Science
115

Advanced methods for detection of malicious software

Volynkin, Alexander S. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Electrical and Computer Engineering Department, Watson School, 2007. / Includes bibliographical references.
116

An automated web crawl methodology to analyze the online privacy landscape /

Sarkar, Chandan. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2008. / Printout. Includes bibliographical references (leaves 75-78). Also available on the World Wide Web.
117

Security and privacy model for association databases

Kong, Yibing. January 2003 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2003. / Typescript. Bibliographical references: leaf 93-96.
118

Embedded watermarking for image verification in telemedicine

Osborne, Dominic. January 2005 (has links)
Thesis (Ph. D.)--University of Adelaide, School of Electrical and Electronic Engineering, 2005. / Title from t.p. of source document (viewed Apr. 2, 2007). Includes bibliographical references (p. 187-194). Also available in print version.
119

Robust digital watermarking of multimedia objects

Gupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.
120

Differences in self-reported perceptions of privacy between online social and commercial networking users /

Hughes, Jessie. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 22-25).

Page generated in 0.0956 seconds