161 |
Quantitative risk assessment model for software security in the design phase of software developmentMkpong-Ruffin, Idongesit Okon. Umphress, David A. Hamilton, John A. January 2009 (has links)
Dissertation (Ph.D.)--Auburn University, 2009. / Abstract. Includes bibliographic references (p.78-83).
|
162 |
Security in transition : police reform in El Salvador and South Africa /Desilets-Bixler, Nicole L. January 2002 (has links) (PDF)
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2002. / Thesis advisor(s): Jeanne Giraldo, Maria Rasmussen. Includes bibliographical references. Also available online.
|
163 |
Engaging Prometheus assessing the security/technology nexus in China and Taiwan /Boutin, J. D. Kenneth. January 2000 (has links)
Thesis (Ph. D.)--York University, 2000. Graduate Programme in Political Science. / Typescript. Title on certificate page: Engaging Prometheus : assessing the security/technology nexus in emerging industrial states. Includes bibliographical references (leaves 399-439). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pNQ67910.
|
164 |
Security architects in practiceLakshminarayanan, Vidya L. 01 September 2015 (has links)
While security has long been a significant issue in military systems, the spread of the internet has stimulated a growing interest in, and increasing demand for, secure systems. Understanding how architects manage security requirements in practice is a necessary first step in providing repeatable processes using effective techniques, methods, and architectural structures. In this thesis, I present the results of multiple cases of practicing security architects: key aspects in security requirements, critical issues in managing security requirements, essential characteristics of security architects, how architects define security architecture, and how requirements are transformed into architectures and implemented.
|
165 |
The Effectiveness of Remote Wipe as a Valid Defense for Enterprises Implementing a BYOD PolicyUz, Ali 08 January 2014 (has links)
In today’s work place where corporations allow employees to use their own smart phones to access their company’s network and sensitive data, it is essential to ensure the security of said data. When an employee smart phone is compromised, companies will rely on the remote wipe command that attempts to remove sensitive data.
In this thesis, we analyze the effectiveness of remote wipe commands on the Apple iPhone and Android model devices and demonstrate how data can be recovered following a remote wipe procedure. We conduct two experiments on each device to verify whether remote wipe is a viable defense mechanism or not. Furthermore, we touch on the subject of mobile forensics used by law enforcement and review methods and techniques used to recover data for use as evidence in criminal cases.
|
166 |
HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIAQuinn, Peter Thomas, peter.quinn@anu.edu.au January 2008 (has links)
Human security was promoted in 1994 by the UNDP as a concept embracing not only freedom from war and violence (or personal security), but also embracing individual�s basic needs for (and rights to) economic security, food security, health security, environmental security, community security and political security. Following this formulation, the concept has been subject to considerable scrutiny particularly in the context of state centric security studies. Extending the concept of security beyond the state to the individual appeared problematic, especially as the mechanisms designed to maintain and restore world peace are state based. However, the post-cold war environment has required a renewed interest in conflict resolution and in this context, human security as personal security has achieved political and analytical acceptance, particularly in the UN sponsored Human Security Report. What then of the second dimension of human security as freedom from want expressed by the UNDP in terms of basic needs and rights?
Debate on this aspect of the UNDP definition foundered on several fronts. As well as being outside the traditional security framework, many argued that it was too broad to be analytically useful; others that it added nothing to human rights and human development which appeared to address precisely the same issues. Thus, while the concept of human security has found acceptance by those advocating with humanitarian approaches to conflict resolution and prevention, few have addressed the actual relationship, if any, between human security and development at the local level where people are most vulnerable to insecurity and where human security or its absence is most felt.
This thesis addresses this gap through a study of human security in Cambodia, where people have experienced, at different times, the full range of human insecurities detailed by the UNDP. It shows that the human insecurity of Cambodians has been in large part a consequence of the security policies and military engagements of external powers. Human security and international relations are inextricably linked. Cambodia�s post-conflict reconstruction, rehabilitation and development strategies have also been strongly influenced by international forces through development assistance programmes. Despite this aid, Cambodia�s performance in health, education, justice, employment and poverty alleviation has been poor and leaves many rural people with uncertain futures and their human security threatened.
Various authors have suggested that human security might be guaranteed by the state, the rule of law, democratisation, governance, human rights or human development. Based on qualitative fieldwork, the thesis argues that governance � especially the way in which state institutions deliver services to the people at the local or �grass roots� level � is key to assuring human security. It further argues that through development assistance policies and practices, global governance institutions have a significant influence on national and local governance processes.
The thesis concludes that, if accepted by the UN Security Council, global governance and international development assistance agencies, human security can be a bridge uniting them all in the common pursuit of individual security and wellbeing with benefit for state, regional and global security.
|
167 |
Fortress of fear and borders of control how the U.S. media constructs Mexican immigrants as a national security threat /Crews, Chris G. January 2007 (has links)
Thesis (M.A.)--Ohio University, November, 2007. / Title from PDF t.p. Includes bibliographical references.
|
168 |
The "changing dimensions" of the Australia-Indonesia bilateral relationship from 1996 to October 2002 in the defence and security context /Hunter, Sri Mulyati. January 2002 (has links) (PDF)
Thesis (B.A.(Hons.))--University of Adelaide, Centre for Asian Studies, 2002? / Bibliography: leaves 52-56.
|
169 |
United States national security policy under presidents Truman and Eisenhower : the evolving role of the National Security Council /Snead, David L. January 1991 (has links)
Thesis (M.A.)--Virginia Polytechnic Institute and State University, 1991. / Abstract. Includes bibliographical references (leaves 105-113). Also available via the Internet.
|
170 |
Leveraging global maritime partnerships to increase global security in the maritime domainHaen, Jason R. January 1900 (has links) (PDF)
Thesis (M.S. in Joint Campaign Planning and Strategy)--Joint Forces Staff College, Joint Advanced Warfighting School, 2008. / Title from PDF title page; viewed on Oct. 28, 2008. "04 April 2008." Electronic version of original print document. Includes bibliographical references (p. 86-91).
|
Page generated in 0.1844 seconds