To see the other types of publications on this topic, follow the link: Protecting.

Dissertations / Theses on the topic 'Protecting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Protecting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hinderer, Sebastian, Dominique Burger, and Bruno Marmol. "Protecting DAISY content." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-69852.

Full text
Abstract:
DAISY has published a Specification for DAISY Protected Digital Talking Book. This paper discusses why such a specification is useful, not only for rightsholders but also for readers with print disabilities. An implementation of PDTB2 is proposed, called dtbprotect. It makes possible to simply produce an encrypted book from a book in DAISY format. It is currently experimented on the Helene Digital Library for the blind. It will be made available open source as to facilitate its implementation by other digital libraries.
APA, Harvard, Vancouver, ISO, and other styles
3

Winkler, Stephanie D. "Protecting Online Privacy." UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.

Full text
Abstract:
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is pro
APA, Harvard, Vancouver, ISO, and other styles
4

Hinderer, Sebastian, Dominique Burger, and Bruno Marmol. "Protecting DAISY content." Deutsche Zentralbibliothek für Blinde Leipzig (DZB), 2010. https://slub.qucosa.de/id/qucosa%3A1213.

Full text
Abstract:
DAISY has published a Specification for DAISY Protected Digital Talking Book. This paper discusses why such a specification is useful, not only for rightsholders but also for readers with print disabilities. An implementation of PDTB2 is proposed, called dtbprotect. It makes possible to simply produce an encrypted book from a book in DAISY format. It is currently experimented on the Helene Digital Library for the blind. It will be made available open source as to facilitate its implementation by other digital libraries.
APA, Harvard, Vancouver, ISO, and other styles
5

Henry, Lorna. "Protecting children and protecting family privacy : a study of child neglect." Thesis, University of Bristol, 2008. http://hdl.handle.net/1983/c82ae0fa-9b13-4482-92c2-aaee197b57b7.

Full text
Abstract:
Over the last 60 years, public attention to child deaths within families has indicated that there is a mandate for the state to work to prevent child maltreatment and that it will be held responsible in cases where it is thought to have neglected this duty. At the same time, 'the family' is awarded a special place as a cultural ideal in the UK; it is considered a haven from the public sphere and a site for freedom from state intervention. This thesis constructs these issues as a dilemma in a liberal state where policies must be seen to protect less powerful citizens within families, while main
APA, Harvard, Vancouver, ISO, and other styles
6

Kogelschatz, Megan. "Protecting the Past for a Better Future: Protecting Palestinian Cultural Heritage." Thesis, University of Oregon, 2016. http://hdl.handle.net/1794/20523.

Full text
Abstract:
Cultural heritage is fundamentally important to humanity. Societies around the world have recognized this for centuries. However, in the context of war, damage to cultural heritage goes unnoticed until it is too late. Palestinian cultural heritage is disappearing at a rate of 12,000 pieces per year. If this destruction continues, there may not be any cultural heritage left for future generations. This paper examines the current legal framework in place for the protection of Palestinian cultural heritage in light of the biggest threats to it, in order to determine if there is an adequate le
APA, Harvard, Vancouver, ISO, and other styles
7

Widman, Ulrika. "Protecting forests through partnerships." Doctoral thesis, Umeå universitet, Statsvetenskapliga institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-127072.

Full text
Abstract:
This thesis addresses the potential of private-public partnerships (PPPs) to involve private forest owners in formal forest protection. These partnerships have been widely advocated as means to engage actors from diverse sectors in collaborative new relationships, formed in a step-wise manner, to improve management of resources that combine public and private goods. Nature Conservation Agreements (NCAs) are the first kind of PPPs to be used in Swedish forest protection. NCAs were introduced in 1993 and are agreements based in civil law between a private forest owner and the Swedish Forest Agen
APA, Harvard, Vancouver, ISO, and other styles
8

Krohn, Erik Allyn Varadarajan Kasturi. "Surveilling roads and protecting art." [Iowa City, Iowa] : University of Iowa, 2009. http://ir.uiowa.edu/etd/390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schmitt, Douglas S. "Protecting our most valuable resources /." Full text available online, 2004. http://www.lib.rowan.edu/find/theses.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lehmuskallio, E. (Eero). "Cold protecting emollients and frostbite." Doctoral thesis, University of Oulu, 2001. http://urn.fi/urn:isbn:9514259882.

Full text
Abstract:
Abstract Frostbite of the face and ears is a common problem in cold winters. Application of an emollient on the face is a traditional way to prevent frostbite in Finland. The preliminary results of an epidemiological study on frostbite in Finnish conscripts unexpectedly showed that the use of cold protecting emollients increased the risk of facial frostbite. This finding motivated studies on the effects and use of cold protecting emollients. 830 male Finnish conscripts answered a questionnaire concerning the use of cold protecting emollients, subjective experience of using them in cold a
APA, Harvard, Vancouver, ISO, and other styles
11

D'Agostino, Elena. "Protecting buyers form fine print." Thesis, University of Nottingham, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Huang, Lin-Shung. "Protecting Browsers from Network Intermediaries." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/430.

Full text
Abstract:
Network intermediaries relay traffic between web servers and clients, and are often deployed on the Internet to provide improved performance or security. Unfortunately, network intermediaries can actually do more harm than good. In this thesis, we articulate the dangers of network intermediaries, which motivates the need for pervasive encryption. We further seek to understand the reasons why encryption isn't more widely deployed and fix them. The existence of network intermediaries makes web security particularly challenging, considering that network intermediaries may operate (1) erroneously
APA, Harvard, Vancouver, ISO, and other styles
13

McKnight, Michael Vincent. "Heterocycles as amine protecting groups." Thesis, University of Liverpool, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

McGinley, Susan. "Parasitic Wasps: Protecting Greenhouse Tomatoes." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/622306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sifuentes, Ann Marie. "Veteran Homelessness: Protecting our Protectors." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525338811510693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Olivetti, Alfred M. "Protecting property rights in America." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=770.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 1999.<br>Title from document title page. Document formatted into pages; contains vi, 187 p. : ill. (some col.), map Includes abstract. Includes bibliographical references (p. 166-176).
APA, Harvard, Vancouver, ISO, and other styles
17

Woodruff, Debra. "Protecting Bees-The Natural Way." College of Agriculture, University of Arizona (Tucson, AZ), 1992. http://hdl.handle.net/10150/295728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Krohn, Erik Allyn. "Surveilling roads and protecting art." Diss., University of Iowa, 2009. https://ir.uiowa.edu/etd/390.

Full text
Abstract:
Placing security cameras in buildings, finding good locations for cameras to enforce speed limits or placing guards to defend a border are some of the problems we face everyday. A nation that wishes to defend its border with armed guards wants to be sure the entire border is secure. However, hiring more guards than necessary can be costly. A start-up company moving into a new building wants to be sure every room in the building is seen by some security camera. Cameras are expensive and the company wants to install the smallest number of cameras; at the same time the company wants to be sure th
APA, Harvard, Vancouver, ISO, and other styles
19

Finken, Paul J. "Protecting the force : application of statistical process control for force protection in Bosnia /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection." Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.

Full text
Abstract:
<p>In the search for companies to distinguish themselves from the mass, so called non-traditional trade marks have become increasingly popular, and in particular colour marks. It is now clear that abstract colour marks can be registered as trade marks, and the number of registered colour marks has increased considerably in recent years. However, it remains a lot more uncertain, mainly due to lack of case law, what the extent of colour marks’ scope of protection is. Are colours actually worth protecting? The purpose of this thesis is to examine the scope of protection of registered abstract col
APA, Harvard, Vancouver, ISO, and other styles
21

Gonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.

Full text
Abstract:
This thesis is intended to develop a comprehensive understanding of how trade secrets can be used as a means to protect knowledge developed through projects conducted in the telecommunications sector. At the same time, the study explores which mechanisms should be employed to regulate access and utilization of trade secrets when their disclosure is inevitable to accomplish project requirements. Telecommunication firms are large and globally distributed organizations whose business operations rely upon interoperability and close collaboration with different parties. This suggests that conductin
APA, Harvard, Vancouver, ISO, and other styles
22

Howell, Aaron Christopher. "Protecting the Self: An Ethnographic Study of Emotion Management Among Child Protective Investigators." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Harvey, Janell M. "Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park /." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Clubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.

Full text
Abstract:
Home guardianship measures provide individuals with a means to enhance and ensure the safety of themselves, their family, and their property inside their homes. However, research regarding the factors considered in the decision to employ home guardianship measures as well as the means by which individuals assess this information regarding potential threats and protective responses is limited and varied in its implementation. This study attempts to provide a theoretical framework for understanding the use of home guardianship measures with the application of a modified version of Ronald Rogers’
APA, Harvard, Vancouver, ISO, and other styles
25

Sallaku, Redlon <1994&gt. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.

Full text
Abstract:
The main purpose of the thesis is to study Privacy and how protecting Privacy, including the new regulation framework proposed by EU the GDPR, investigating how static analysis could help GDPR enforcement, and develop a new static analysis prototype to fulfill this task in practice. GDPR (General Data Protection Regulation) is a recent European regulation to harmonize and enforce data privacy laws across Europe, to protect and empower all EU citizens data privacy, and to reshape the way organizations deal with sensitive data. This regulation has been enforced starting from May 2018. While it i
APA, Harvard, Vancouver, ISO, and other styles
26

Borger, Michael A. "Protecting the brain during cardiac surgery." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ59031.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ravert, Brian P. "Protecting America Through Better Civic Education." Thesis, Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37698.

Full text
Abstract:
CHDS State/Local<br>How does civic education affect homeland security? A civic education curriculum that provides for the foundations of our youths individual and collective identity may significantly contribute to the preservation of our democracy and enhance homeland security. Through a civic education, students can enhance their grasp of the concepts of our American representative democracy and learn the tenets of good citizenship, critical thinking, and the ability to self-govern. Presidential Directive Number Eight (8) clearly indicates the need for national preparedness using a whole of
APA, Harvard, Vancouver, ISO, and other styles
28

FREIRE, ANA HELENA GIGLIOTTI DE LUNA. "NAFTA AND THE ENVIRONMET: PROTECTING WHO?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7185@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO<br>Esta pesquisa tem como tema a aproximação entre as agendas internacionais de comércio e meio ambiente, mais especificamente a inserção de cláusulas ambientais em acordos internacionais de comércio, a partir da experiência do Nafta. Busca as origens deste fenômeno na sociedade civil dos EUA, utilizando-se do conceito neogramsciano de hegemonia. Argumenta-se que o projeto de integração econômica regional é parte da estratégia de consolidação da hegemonia dos EUA, mas que a negociação do Acaan - acordo paralelo para tratar a questão amb
APA, Harvard, Vancouver, ISO, and other styles
29

Abu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.

Full text
Abstract:
The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an a
APA, Harvard, Vancouver, ISO, and other styles
30

Baker, Corie Elizabeth. "Protecting the neighborhood safety through design/." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3295.

Full text
Abstract:
Thesis (M. Arch.) -- University of Maryland, College Park, 2005.<br>Thesis research directed by: School of Architecture, Planning and Preservation Architecture. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
31

Wright, Glenn C. "Protecting a Citrus Tree from Cold." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2001. http://hdl.handle.net/10150/146994.

Full text
Abstract:
4 pp.<br>Budding Citrus Trees, Irrigating Citrus Trees<br>Citrus trees are not particularly cold hardy, but they are most likely to survive cold temperatures if they are planted in the proper location. This publication focuses on how to help citrus trees survive the winters of Arizona. Topics include site selection and long-term / short-term strategies used to protect citrus trees from frost and freeze.
APA, Harvard, Vancouver, ISO, and other styles
32

Wan, Shengye. "Protecting Web Contents Against Persistent Crawlers." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477068008.

Full text
Abstract:
Web crawlers have been developed for several malicious purposes like downloading server data without permission from website administrator. Armored stealthy crawlers are evolving against new anti-crawler mechanisms in the arms race between the crawler developers and crawler defenders. In this paper, we develop a new anti-crawler mechanism called PathMarker to detect and constrain crawlers that crawl content of servers stealthy and persistently. The basic idea is to add a marker to each web page URL and then encrypt the URL and marker. By using the URL path and user information contained in the
APA, Harvard, Vancouver, ISO, and other styles
33

Graaf, Anne van der. "Managing financial risks : protecting the organisation." Thesis, Paris, Institut d'études politiques, 2018. http://www.theses.fr/2018IEPP0020/document.

Full text
Abstract:
Cette thèse porte sur la gestion des risques associés aux marchés financiers au sein des grandes organisations financières européennes. A partir d’un travail ethnographique approfondi et d’entretiens, elle vise à améliorer la compréhension de la gestion des risques de marchés financiers dans les banques et les compagnies d'assurance de la zone euro. Cette recherche montre que les gestionnaires de risque construisent leur connaissance et leur évaluation des risques avec un but premier : celui de satisfaire les exigences de d’acteurs extérieurs à l’organisation davantage que de couvrir les risqu
APA, Harvard, Vancouver, ISO, and other styles
34

Gill, Harjeet Singh. "A microprocessor-based system for protecting busbars." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0030/NQ63872.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Mellstrand, Per. "Protecting Software Execution by Dynamic Environment Hardening." Licentiate thesis, Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/904bf1276b462168c1257115004309ff?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

He, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.

Full text
Abstract:
Encryption helps to ensure that information within a session is not compromised. Authentication and access control measures ensure legitimate and appropriate access to information, and prevent inappropriate access to such resources. While encryption, authentication and access control each has its own responsibility in securing a communication session, a combination of these three mechanisms can provide much better protection for information. This thesis addresses encryption, authentication and access control related problems in cloud and distributed environments, since these problems are ver
APA, Harvard, Vancouver, ISO, and other styles
37

Noori, B. M. A. "Investigation of stepped blocks protecting weir slopes." Thesis, University of Southampton, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kalibjian, Jeffrey R. "Accountable Security Architectures for Protecting Telemetry Data." International Foundation for Telemetering, 2001. http://hdl.handle.net/10150/606436.

Full text
Abstract:
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Today there are many security solutions available which can facilitate both protection and sharing of telemetry data. While the technologies behind these solutions are maturing [1] [2] [3], most products lack a consistent and coherent paradigm for enforcing who is able to access the secured data, what is done with it, and insuring it can be recovered if the person who secured it is disabled.
APA, Harvard, Vancouver, ISO, and other styles
39

Larmuseau, Adriaan. "Protecting Functional Programs From Low-Level Attackers." Doctoral thesis, Uppsala universitet, Avdelningen för datalogi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-281318.

Full text
Abstract:
Software systems are growing ever larger. Early software systems were singular units developed by small teams of programmers writing in the same programming language. Modern software systems, on the other hand, consist of numerous interoperating components written by different teams and in different programming languages. While this more modular and diversified approach to software development has enabled us to build ever larger and more complex software systems, it has, however, made it harder to ensure the reliability and security of software systems. In this thesis we study and remedy the s
APA, Harvard, Vancouver, ISO, and other styles
40

Dillon, Patrice. "Taintx: A System for Protecting Sensitive Documents." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/976.

Full text
Abstract:
Across the country members of the workforce are being laid off due to downsizing. Most of those people work for large corporations and have access to important company documents. There have been several studies suggesting that employees are taking critical information after learning they will be laid off. This becomes an issue and a threat to a corporation's security. Corporations are then placed in a position to make sure sensitive documents never leave the company. In this study we build a system that is used to assist corporations and systems administrators. This system will prevent users f
APA, Harvard, Vancouver, ISO, and other styles
41

Harper, Dana C. "Protecting financial services while ensuring regulatory compliance." Thesis, Utica College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10252116.

Full text
Abstract:
<p> In the global economy, troubled with financial crime and well-funded terrorist operations, combating money laundering has become a priority for financial institutions (Brill, 2016). The 9/11 terrorist attacks have also increased the U.S. focus on terrorism and money laundering. The purpose of this research project was to examine the regulatory environment which monitors financial institutions and Nonbank Financial Institutions (NBFIs) to mitigate financial crimes, money laundering, and terrorist financing. Currently, there are statutory, regulatory, and supervisory gaps within the Office o
APA, Harvard, Vancouver, ISO, and other styles
42

Sarbinowski, Pawel. "VTPin: Protecting Legacy Software from VTable Hijacking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190195.

Full text
Abstract:
VTable kapning har nyligen blivit befordrad till de facto-teknik för utnyttjar C ++ program, särskilt webbläsare. VTables kan vara manipuleras utan korrumperande minne, helt enkelt genom att utnyttja användning-after-free sårbarheter. Under de senaste Pwn2Own tävlingar alla större webbläsare brott med bedrifter baserade på användning-efter-free sårbarheter och VTable kapning. I detta dokument föreslår vi VTPin: ett system för att skydda mot VTable kapning, via användning-efter-fria sårbarheter, i stora C ++ binärer som kan inte kompileras eller omskrivet. Huvudtanken bakom VTPin är att stift a
APA, Harvard, Vancouver, ISO, and other styles
43

Feng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Jarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Whitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.

Full text
Abstract:
3 pp.<br>The publication covers protecting yourself from identity theft. It covers how identity theft happens and ways to protect yourself from identity theft. It also gives you some steps to take if you are a victim of identity theft as well as identity theft contact information.
APA, Harvard, Vancouver, ISO, and other styles
46

Whitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kaprou, Eleni. "Protecting vulnerable consumers from aggressive commercial practices." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/52328/.

Full text
Abstract:
The Unfair Commercial Practices Directive has been one of the most significant developments in European Consumer Law. It introduced provisions on aggressive commercial practices for the first time on a European level and provides the key definition of consumer vulnerability in European Consumer Law. This thesis draws attention to the previously overlooked topics of aggressive commercial practices and vulnerable consumers. It shows that the UCPD fails to ensure a high level of protection from aggressive practices for vulnerable consumers. The main reason for that is that the system of the UCPD
APA, Harvard, Vancouver, ISO, and other styles
48

Sadeghi, Soraya <1995&gt. "Protecting Human Rights Defenders under International Law." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/17750.

Full text
Abstract:
The main aim of this thesis is to analyse how international instruments and their corresponding mechanisms support and protect Human Rights Defenders and to which extent this support is useful. Human Rights Defenders have always faced difficulties due to their operate that is essential to promote and implement democracy and human rights. After a detailed introduction in which they are described the categories most at risk of HRDs, the first chapter is based on the crucial moment of the adoption of the 1998 UN Declaration on Human Rights Defenders and the consequent role of the UN Special Rappo
APA, Harvard, Vancouver, ISO, and other styles
49

Ahmed, Muhammad Raisuddin. "Protecting wireless sensor networks from internal attacks." Doctoral thesis, importedStudentThesis, 2014. https://researchprofiles.canberra.edu.au/en/studentTheses/ac08e070-6810-4c64-8f69-9771992324a8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.

Full text
Abstract:
This dissertation describes efficient design of tamper-resistant secure processor and cryptographic memory protection model that will strength security of a computing system. The thesis proposes certain cryptographic and security features integrated into the general purpose processor and computing platform to protect confidentiality and integrity of digital content stored in a computing system's memory. System designers can take advantages of the availability of the proposed security model to build future security systems such as systems with strong anti-reverse engineering capability, digital
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!