Dissertationen zum Thema „Security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Der volle Inhalt der QuelleMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Der volle Inhalt der QuelleAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Der volle Inhalt der QuelleForman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Der volle Inhalt der QuelleKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Der volle Inhalt der QuelleEstenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Der volle Inhalt der QuelleKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Der volle Inhalt der QuelleHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Der volle Inhalt der QuelleTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Der volle Inhalt der QuelleKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Der volle Inhalt der QuelleHaley, Charles B. "Arguing security : a framework for analyzing security requirements." Thesis, Open University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439343.
Der volle Inhalt der QuelleCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Der volle Inhalt der QuellePowell, Rhonda L. "Security and the right to security of person." Thesis, University of Oxford, 2008. http://ora.ox.ac.uk/objects/uuid:26e81a46-54d5-44f5-a3cd-c74a5798ea0d.
Der volle Inhalt der QuelleКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.
Der volle Inhalt der QuelleWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Der volle Inhalt der QuelleHaley, Charles B. "Arguing security : a framework for analyzing security requirements." n.p, 2006. http://ethos.bl.uk/.
Der volle Inhalt der QuelleKlasson, Daniel, Kim Klasson, and Anatoly Iourtchenko. "Network Security Report : Penetration Tools for Network Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24545.
Der volle Inhalt der QuelleSINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.
Der volle Inhalt der QuelleEkström, Dan. "Securing a wireless local area network : using standard security techniques." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5662.
Der volle Inhalt der QuelleConsolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.
Der volle Inhalt der QuelleLamprecht, Christiaan Johan. "Adaptive security." Thesis, University of Newcastle Upon Tyne, 2012. http://hdl.handle.net/10443/1435.
Der volle Inhalt der QuelleYousuff, Razu. "Network security." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199380.
Der volle Inhalt der QuelleOvchinnikov, I. I., and E. A. Minin. "Internet security." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33773.
Der volle Inhalt der QuelleHuarcaya, Arroyo Ricardo Miguel, Espinoza Gilbert Daniel Lopez, Visaloth Luis Enrique Mendoza, Cribilleros Agustin Bartolome Romero, and Leon Patricia Alcira Torres. "Security Kids." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/625338.
Der volle Inhalt der QuelleBlanco, Collazos Arturo Enrique, Kuoman María del Carmen Wong, and Huamán Elvis Yaringaño. "Security Clean." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/625349.
Der volle Inhalt der QuelleAndersson, Martin. "Software Security Testing : A Flexible Architecture for Security Testing." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2388.
Der volle Inhalt der QuelleGruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.
Der volle Inhalt der QuelleShipman-Sercu, Chris. "A False Sense of Security: The Social Security Debate." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.
Der volle Inhalt der QuelleBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Der volle Inhalt der QuelleWalden, Ian Newark. "Data communications security : legislating and contracting for legal security." Thesis, Nottingham Trent University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314417.
Der volle Inhalt der QuelleBilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Der volle Inhalt der QuelleBaratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Der volle Inhalt der QuelleAltinpinar, Mustafa. "Adapting to a new security environment : Turkey's border security." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/adapting-to-a-new-security-environment(7ab2f7fb-8e8a-46dc-8f00-a7d08014fece).html.
Der volle Inhalt der QuelleKaur, Kirandeep. "Virtualisation Security Issues : Security Issues Arises In Virtual Environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43345.
Der volle Inhalt der QuelleHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Der volle Inhalt der QuelleSudhodanan, Avinash. "Black-Box Security Testing of Browser-Based Security Protocols." Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/368805.
Der volle Inhalt der QuelleSudhodanan, Avinash. "Black-Box Security Testing of Browser-Based Security Protocols." Doctoral thesis, University of Trento, 2017. http://eprints-phd.biblio.unitn.it/2006/1/Avinash_PhD_thesis.pdf.
Der volle Inhalt der QuelleBugai, Veaceslav D. "European security organizations in the post-Cold-War security environment the new frame of European security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FBugai.pdf.
Der volle Inhalt der QuelleValella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.
Der volle Inhalt der QuelleAsan, Pinar. "Security Through Integration: The Eu As A Pluralistic Security Community." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/2/12609764/index.pdf.
Der volle Inhalt der QuellePersson, Lars. "Implementing a SOAP security proxy and Evaluating SOAP security standards." Thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-58062.
Der volle Inhalt der QuelleWakim, Mike. "Employing Android Security Features for Enhanced Security and Privacy Preservation." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36353.
Der volle Inhalt der QuelleArsenault, Denis. "Environment, security and natural disasters, contesting discourses of environmental security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0018/MQ36809.pdf.
Der volle Inhalt der QuelleRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Der volle Inhalt der QuelleHengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.
Der volle Inhalt der QuelleRouhi, Mahsa. "Security discourse and security decision-making in Iran, 1979-1989." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708104.
Der volle Inhalt der QuelleKumar, Richa. "Constructing security : a relational mapping of the EU security market." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/63935/.
Der volle Inhalt der QuelleBasaran, Tugba. "Geographies of security : security, law and space in liberal states." Thesis, University of Cambridge, 2008. https://www.repository.cam.ac.uk/handle/1810/283846.
Der volle Inhalt der QuelleTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Der volle Inhalt der QuelleElsadig, Abdalla Abdalla Mohamed. "Virtualization Security Issues : Security issues arise in the virtual environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42474.
Der volle Inhalt der Quelle