Spelling suggestions: "subject:"anda security."" "subject:"ando security.""
331 |
Changing the story the role of the narrative in the success or failure of terrorist groups /Case, Dean J. Mellen, Brian C. January 2009 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Arquilla, John. Second Reader: Rothstein, Hy. "December 2009." Description based on title screen as viewed on January 29, 2010. Author(s) subject terms: National security, narratives, terrorism. Includes bibliographical references (p. 57-60). Also available in print.
|
332 |
Time-variant normal profiling for anomaly detection systemsKim, Jung Yeop. January 2008 (has links)
Thesis (Ph.D.)--University of Wyoming, 2008. / Title from PDF title page (viewed on August 3, 2009). Includes bibliographical references (p. 73-84).
|
333 |
Research in computer forensics /Wai, Hor Cheong. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Daniel F. Warren, Dan C. Boger. Includes bibliographical references (p. 191). Also available online.
|
334 |
A computational model and multi-agent simulation for information assurance /VanPutte, Michael A. January 2002 (has links) (PDF)
Thesis (Ph. D.)--Naval Postgraduate School, 2002. / Dissertation supervisor: Cynthia Irvine. Includes bibliographical references (p. 155-164). Also available online.
|
335 |
Prospects for improving the resource allocation process for National Security in Jamaica : a comparitive study /Sewell, Andrew Fitzgerald. January 2004 (has links) (PDF)
Thesis (M.B.A.)--Naval Postgraduate School, June 2004. / Thesis advisor(s): Robert McNab, Peter Frederiksen. Includes bibliographical references (p. 107-112). Also available online.
|
336 |
A learning-based approach to false alarm reduction for signature-based intrusion detection systems /Cheung, Chun-Hom. January 2004 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004. / Includes bibliographical references (leaves 100-106). Also available in electronic version. Access restricted to campus users.
|
337 |
An application of the Bass diffusion model to border security and illegal immigration /Ohene-Asah, Ayeh. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 157-164).
|
338 |
The impact of population mixing rules on epidemic communication /Lin, Meng-jang, January 1999 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 1999. / Vita. Includes bibliographical references (leaves 127-132). Available also in a digital version from Dissertation Abstracts.
|
339 |
Anti terrorism and force protection application in facilities this report is presented to the Department of Civil and Coastal Engineering graduate committee /Lim, R. Augustus. January 2003 (has links) (PDF)
Thesis (master's)--University of Florida, 2003. / Title from title screen. Also available online.
|
340 |
The extent to which sensitive information is secured by institutions that donate computers to educational settingsMurandu, Ngoni. January 2003 (has links)
Thesis (M.A.)--West Virginia University, 2003. / Title from document title page. Document formatted into pages; contains ix, 67 p. Vita. Includes abstract. Includes bibliographical references (p. 53-57).
|
Page generated in 0.0509 seconds