Spelling suggestions: "subject:"deprotection anda security"" "subject:"deprotection ando security""
1 |
The characteristics of user-generated passwords /Sawyer, Darren A. January 1990 (has links) (PDF)
Thesis (M.S. in Information Systems)--Naval Postgraduate School, March 1990. / Thesis Advisor(s): Zviran, Moshe ; Haga, William J. "March 1990." Description based on signature page as viewed on October 21, 2009. DTIC identifier(s): Access control, passwords, computer security, identification verification. Author(s) subject terms: Passwords, computer security, user-generated passwords, informaiton system security. Includes bibliographical references (p. 98-99). Also available online.
|
2 |
Toward securing links and large-scaleDelgosha, Farshid. January 2007 (has links)
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008. / Committee Chair: Fekri, Faramarz; Committee Member: Boldyreva, Alexandra O.; Committee Member: Ji, Chuanyi; Committee Member: McLaughlin, Steven W.; Committee Member: Sivakumar, Raghupathy. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
3 |
A new model for computer network security risk analysis /Martel, Sophie, January 1900 (has links)
Thesis (M.Eng.) - Carleton University, 2002. / Includes bibliographical references (p. 167-172). Also available in electronic format on the Internet.
|
4 |
Cyberciege scenario illustrating integrity risks to a military like facility /Fielk, Klaus W. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Cynthia E. Irvine, Paul C. Clark. Includes bibliographical references (p. 97-101). Also available online.
|
5 |
Robust decentralized authentication for public keys and geographic locationPathak, Vivek. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Computer Science." Includes bibliographical references (p. 121o-128).
|
6 |
Advances in low-level software protection /Van Dyke, Colin William. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2006. / Printout. Includes bibliographical references (leaves 102-106). Also available on the World Wide Web.
|
7 |
The political economy of social policy and agrarian transformation in EthiopiaLavers, Tom January 2013 (has links)
This thesis is concerned with social policy during structural transformation, focusing on the case of Ethiopia. The thesis takes a realist, case-based approach to the study of social policy, which recognises that political actors construct the domain of 'social' policy within legitimising discourses in specific national-historical contexts. Social policy is a key aspect of state-society relations and an inherently political field of study. Consequently, the study integrates analysis of cleavages in domestic society along class and ethnic lines, the role of state organisations and international influences, and their impact on the social policy pronouncements by senior government officials and implementation of those policies on the ground. In the Ethiopian case, this approach highlights the centrality of land to social policy and state• society relations. In particular, state land ownership is a key part of the government's development strategy that aims to combine egalitarian agricultural growth with security for smallholders. Nevertheless, the failure to expand the use of productivity-enhancing agricultural inputs, which constitute key complements to the use of land for social objectives, has led to differentiation in social policy provision along class, gender, age and ethnic lines. Micro-level case studies link the land question to food security, including the Productive Safety Net Programme (PSNP), and processes of agricultural commercialisation, notably the so-called 'global land grab'. A main argument of the thesis is that the Ethiopian government is attempting to manage social processes in order to minimise the social and political upheaval involved in structural transformation, and that social pol icy is a central means by which it does so. The development strategy requires social policies that enable the government to control the allocation of factors of production, necessitating restrictions on the rights of individuals and groups. As such, this strategy is intricately intertwined with political authority.
|
8 |
Digital rights management for smart containment objectsFares, Tony Yussef. January 2005 (has links)
Thesis (Ph.D.)--University of Wollongong, 2005. / Typescript. Includes appendices. Includes bibliographical references: leaf 201-214.
|
9 |
Exploration of the use of unmanned aerial vehicles along with other assets to enhance border protectionYildiz, Bahri. January 2009 (has links) (PDF)
Thesis (M.S. in Operations Research)--Naval Postgraduate School, June 2009. / Thesis Advisor(s): Horne, Gary E. "June 2009." Description based on title screen as viewed on July 13, 2009. Author(s) subject terms: border security, border protection, border patrol, unmanned aerial system (UAS), UAV, MANA, Nearly-Orthogonal Latin Hypercube, regression tree, linear regression. Includes bibliographical references (p. 89-93). Also available in print.
|
10 |
Securing wireless networks against eavesdropping using smart antennasLakshmanan, Sriram. January 2007 (has links)
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008. / Committee Chair: Raghupathy, Sivakumar; Committee Member: Farmarz Fekri; Committee Member: Mary Ann, Ingram. Part of the SMARTech Electronic Thesis and Dissertation Collection.
|
Page generated in 0.1192 seconds