Dissertations / Theses on the topic 'Defence of information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Defence of information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Taylor, Jayne Louise. "Information processing & defence in psychosis." Thesis, Teesside University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518735.
Full textDeakin, Robert Luke. "Economic information warfare : analysis of the relationship between the protection of financial information infrastructure and Australia's national security." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15900/1/Robert_Deakin_Thesis.pdf.
Full textDeakin, Robert Luke. "Economic Information Warfare : Analysis of the relationship between the protection of Financial Information Infrastructure and Australia's National Security." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15900/.
Full textStiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.
Full textBester, Christoffel. "The management of information inside the general support base concept of the South African National Defence Force." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/16475.
Full textPullinger, Stephen Bernard. "Parliament and the defence debate : the generation, provision and use of specialist information." Thesis, University of Bradford, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.235642.
Full textWeiss, Alexander Peter William. "The use of commercial off-the-shelf information technology in operational defence equipment." Thesis, University College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393106.
Full textKarlsson, Terése. "Contingency planning for Bofors Defence AB, an application of existing methods." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1639.
Full textBjörklund, Kristoffer. "What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104886.
Full textLekhawatthanapong, Thattaporn. "Establishing statutory ground for the public interest defence under international copyright law." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/50736/.
Full textCalbert, Gregory. "Information, game theory and patch defence in the parasitic wasp Trissolcus basalis Wollaston (Hymenoptera : Scelionidae) /." Title page, contents and summary only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phc143.pdf.
Full textEccleston, Anthony L., and n/a. "Coordinating information provision in government agencies using an integrated information management strategy." University of Canberra. Information, Language & Culture Studies, 1996. http://erl.canberra.edu.au./public/adt-AUC20060404.123006.
Full textCompton, Shane M., and n/a. "Information technology implementation and acceptance: a case study of change management." University of Canberra. Applied Science, 2002. http://erl.canberra.edu.au./public/adt-AUC20050331.145848.
Full textGavėnavičius, Vytautas. "Krašto apsaugos sistemos personalo duomenų analizės ir kontrolės posistemė." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060115_225641-21825.
Full textRudman, Lauren Lynne. "NetwIOC: a framework for the automated generation of network-based IOCS for malware information sharing and defence." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60639.
Full textHållsten, Henrik. "Explanation and deduction : a defence of deductive chauvinism." Doctoral thesis, Stockholms universitet, Filosofiska institutionen, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-72182.
Full textBroos, Elizabeth. "Information, communication and technological competencies in a digital working environment a case study in the Netherlands Defence Organization /." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-06182008-115804/.
Full textOpasinov, Aleksandar, and Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances." Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.
Full textIoannou, Georgios. "The Markov multi-phase transferable belief model : a data fusion theory for enhancing cyber situational awareness." Thesis, Brunel University, 2015. http://bura.brunel.ac.uk/handle/2438/13742.
Full textJenvald, Mattias, and Mikael Hovmöller. "Reducing Delays for Unplanned Maintenance of Service Parts in MRO Workshops : A case study at an aerospace and defence company." Thesis, Linköpings universitet, Produktionsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-167203.
Full textГорбатенко, Д. С. "Комплексний підхід у сфері захисту інформації". Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/34068.
Full textMaddison, A. "The impact of critical success factors on government IT projects : a case study of the Defence Information Infrastructure Programme." Thesis, Cranfield University, 2014. http://dspace.lib.cranfield.ac.uk/handle/1826/8766.
Full textEhlin, Max. "An overview of Product Service System through Integrated Vehicle Health Management in an information sensitive industry." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75861.
Full textTsirigotis, Anthimos Alexandros. "Discourse on war in the Information Age : Corpus Assisted Discourse Analysis of the British Defence and Security policies from 1957 to 2011." Thesis, University of Reading, 2015. http://centaur.reading.ac.uk/76519/.
Full textУкраинец, Ирина Васильевна, Руслан Николаевич Литнарович, Iryna Vasylivna Ukrainets, Ruslan Mykolaiovych Litnarovich та Руслан Миколайович Літнарович. "Аналіз і дослідження криптографічних засобів захисту інформації на базі «Укргазбанк»". Thesis, Міжнародний економіко-гуманітарний універсиитет імені академіка Степана Дем'янчука, 2012. http://elartu.tntu.edu.ua/handle/123456789/1569.
Full textKirsten, Frederik Fouche. "A critical analysis of the relationship between the South African Defence Force and the South African media from 1975-83." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/d1020841.
Full textDu, Toit Mattheus Johannes. "The establishment, through action research, of an appropriate strategic ICT planning process for the South African Department of Defence as a diversified organisation." Thesis, Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-08082008-125042.
Full textCraveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.
Full textUddman, Lindh Carl, and Johan Norberg. "Augmented reality with holograms for combat management systems : Performance limitations for sonar tracks in a 3D map, presented with Microsoft HoloLens." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209412.
Full textMcGrath, Thomas M. Vargas Maurice R. "Improving information dissemination for the Defense Business Management University /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA293700.
Full textTrulock, Troy E. "Analysis of consolidating defense acquisition information on the Internet." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/7894.
Full textMcGrath, Thomas M., and Maurice R. Vargas. "Improving information dissemination for the Defense Business Management University." Thesis, Monterey, California. Naval Postgraduate School, 1995. http://hdl.handle.net/10945/7543.
Full textOtt, Michael F. "Reengineering the Department of Defense : the Corporate Information Management initiative /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA289636.
Full textNeise, Patrick. "Graph-based Event Correlation for Network Security Defense." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10785425.
Full textFrance, Paul. "Preventing terrorism using information sharing networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FFrance.pdf.
Full textWebb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.
Full textBellavista, Daniele. "Ict security: Defence strategies against targeted attacks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Full textHudson, Jerome. "Software agents and the Defense Information Infrastructure : reengineering the acquisition process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA352554.
Full textZeng, Kui. "Exploring cybersecurity requirements in the defense acquisition process." Thesis, Capitol Technology University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10165487.
Full textDybman, Jennifer. "L'influence dans la doctrine militaire britannique : émergence et institutionnalisation d'un concept (2009-2015)." Thesis, Sorbonne Paris Cité, 2015. http://www.theses.fr/2015USPCA135.
Full textBrintzinghoffer, Daniel M. "Naval Theater Ballistic Missile Defense (TBMD) : development of the information exchange requirements /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA314531.
Full textAlexander, Richard David. "Insider information trading analysis of Defense companies prior to major contract awards." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277238.
Full textLogan, Paul Robert. "A structured approach to information technology management in the Department of Defense." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA289740.
Full textHarkleroad, Joseph E. "A case study of information resource management in the Department of Defense." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23562.
Full textRamorathudi, Moemedi Bini. "An enterprise information portal for cross-unit collaboration in Botswana Defense Force." Thesis, Monterey, Calif. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/6022.
Full textDelibasis, D. "The right of states to individual self-defense in information warfare operations." Thesis, University of Westminster, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.434366.
Full textDehlinger, Sean P. "Comparison of Department of Defense Information Technology Acquisition Processes : a case study." Thesis, Monterey, California. Naval Postgraduate School, 2001. http://hdl.handle.net/10945/1728.
Full textScarrott, Connie Elizabeth. "Explorations of knowledge management in a defence engineering environment." Thesis, Bournemouth University, 2003. http://eprints.bournemouth.ac.uk/300/.
Full textNilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.
Full textPerry, Donnie. "Protecting small communities through domestic policing adopting an information analysis system to recognize potential terrorist activity." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FPerry.pdf.
Full text