Dissertations / Theses on the topic 'Protecting'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Protecting.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Aranda, Ligia Esther. "Protecting CHAAC's gift--groundwater protection in Yucatan, Mexico." Thesis, Massachusetts Institute of Technology, 1994. http://hdl.handle.net/1721.1/63206.
Full textHinderer, Sebastian, Dominique Burger, and Bruno Marmol. "Protecting DAISY content." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-69852.
Full textWinkler, Stephanie D. "Protecting Online Privacy." UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.
Full textHinderer, Sebastian, Dominique Burger, and Bruno Marmol. "Protecting DAISY content." Deutsche Zentralbibliothek für Blinde Leipzig (DZB), 2010. https://slub.qucosa.de/id/qucosa%3A1213.
Full textHenry, Lorna. "Protecting children and protecting family privacy : a study of child neglect." Thesis, University of Bristol, 2008. http://hdl.handle.net/1983/c82ae0fa-9b13-4482-92c2-aaee197b57b7.
Full textKogelschatz, Megan. "Protecting the Past for a Better Future: Protecting Palestinian Cultural Heritage." Thesis, University of Oregon, 2016. http://hdl.handle.net/1794/20523.
Full textWidman, Ulrika. "Protecting forests through partnerships." Doctoral thesis, Umeå universitet, Statsvetenskapliga institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-127072.
Full textKrohn, Erik Allyn Varadarajan Kasturi. "Surveilling roads and protecting art." [Iowa City, Iowa] : University of Iowa, 2009. http://ir.uiowa.edu/etd/390.
Full textSchmitt, Douglas S. "Protecting our most valuable resources /." Full text available online, 2004. http://www.lib.rowan.edu/find/theses.
Full textLehmuskallio, E. (Eero). "Cold protecting emollients and frostbite." Doctoral thesis, University of Oulu, 2001. http://urn.fi/urn:isbn:9514259882.
Full textD'Agostino, Elena. "Protecting buyers form fine print." Thesis, University of Nottingham, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537630.
Full textHuang, Lin-Shung. "Protecting Browsers from Network Intermediaries." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/430.
Full textMcKnight, Michael Vincent. "Heterocycles as amine protecting groups." Thesis, University of Liverpool, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328176.
Full textMcGinley, Susan. "Parasitic Wasps: Protecting Greenhouse Tomatoes." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1998. http://hdl.handle.net/10150/622306.
Full textSifuentes, Ann Marie. "Veteran Homelessness: Protecting our Protectors." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525338811510693.
Full textOlivetti, Alfred M. "Protecting property rights in America." Morgantown, W. Va. : [West Virginia University Libraries], 1999. http://etd.wvu.edu/templates/showETD.cfm?recnum=770.
Full textWoodruff, Debra. "Protecting Bees-The Natural Way." College of Agriculture, University of Arizona (Tucson, AZ), 1992. http://hdl.handle.net/10150/295728.
Full textKrohn, Erik Allyn. "Surveilling roads and protecting art." Diss., University of Iowa, 2009. https://ir.uiowa.edu/etd/390.
Full textFinken, Paul J. "Protecting the force : application of statistical process control for force protection in Bosnia /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380139.
Full textNilsson, Jennie. "Are Colours Worth Protecting? : An Examination of Abstract Colour Marks’ Scope of Protection." Thesis, Jönköping University, JIBS, Commercial Law, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-11212.
Full textGonzalez, Ruiz Diego Hernan. "Developing and protecting intellectual property in virtual projects : Trade secret protection in Telecommunications." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for industriell økonomi og teknologiledelse, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-20973.
Full textHowell, Aaron Christopher. "Protecting the Self: An Ethnographic Study of Emotion Management Among Child Protective Investigators." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002662.
Full textHarvey, Janell M. "Protecting Biscayne an analysis of strategies for the protection of Biscayne National Park /." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000530.
Full textClubb, Audrey C. "Protecting the Castle: Applying Protection Motivation Theory to Explain the Use of Home Guardianship." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cj_theses/4.
Full textSallaku, Redlon <1994>. "Privacy and Protecting Privacy: Using Static Analysis for legal compliance. General Data Protection Regulation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14682.
Full textBorger, Michael A. "Protecting the brain during cardiac surgery." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ59031.pdf.
Full textRavert, Brian P. "Protecting America Through Better Civic Education." Thesis, Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37698.
Full textFREIRE, ANA HELENA GIGLIOTTI DE LUNA. "NAFTA AND THE ENVIRONMET: PROTECTING WHO?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7185@1.
Full textAbu-Bakar, Kamalrulnizam. "Protecting agents against malicious host attacks." Thesis, Aston University, 2004. http://publications.aston.ac.uk/10612/.
Full textBaker, Corie Elizabeth. "Protecting the neighborhood safety through design/." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3295.
Full textWright, Glenn C. "Protecting a Citrus Tree from Cold." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2001. http://hdl.handle.net/10150/146994.
Full textWan, Shengye. "Protecting Web Contents Against Persistent Crawlers." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477068008.
Full textGraaf, Anne van der. "Managing financial risks : protecting the organisation." Thesis, Paris, Institut d'études politiques, 2018. http://www.theses.fr/2018IEPP0020/document.
Full textGill, Harjeet Singh. "A microprocessor-based system for protecting busbars." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0030/NQ63872.pdf.
Full textMellstrand, Per. "Protecting Software Execution by Dynamic Environment Hardening." Licentiate thesis, Karlskrona : Department of Interaction and System Design, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/904bf1276b462168c1257115004309ff?OpenDocument.
Full textHe, Yijun, and 何毅俊. "Protecting security in cloud and distributed environments." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617631.
Full textNoori, B. M. A. "Investigation of stepped blocks protecting weir slopes." Thesis, University of Southampton, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.370369.
Full textKalibjian, Jeffrey R. "Accountable Security Architectures for Protecting Telemetry Data." International Foundation for Telemetering, 2001. http://hdl.handle.net/10150/606436.
Full textLarmuseau, Adriaan. "Protecting Functional Programs From Low-Level Attackers." Doctoral thesis, Uppsala universitet, Avdelningen för datalogi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-281318.
Full textDillon, Patrice. "Taintx: A System for Protecting Sensitive Documents." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/976.
Full textHarper, Dana C. "Protecting financial services while ensuring regulatory compliance." Thesis, Utica College, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10252116.
Full textSarbinowski, Pawel. "VTPin: Protecting Legacy Software from VTable Hijacking." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-190195.
Full textFeng, Yicheng. "Template protecting algorithms for face recognition system." HKBU Institutional Repository, 2007. http://repository.hkbu.edu.hk/etd_ra/832.
Full textJarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.
Full textWhitmer, Evelyn, and Linda Block. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2007. http://hdl.handle.net/10150/146292.
Full textWhitmer, Evelyn. "Identity Theft: Simple Guide to Protecting Yourself." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2012. http://hdl.handle.net/10150/239593.
Full textKaprou, Eleni. "Protecting vulnerable consumers from aggressive commercial practices." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/52328/.
Full textSadeghi, Soraya <1995>. "Protecting Human Rights Defenders under International Law." Master's Degree Thesis, Università Ca' Foscari Venezia, 2020. http://hdl.handle.net/10579/17750.
Full textAhmed, Muhammad Raisuddin. "Protecting wireless sensor networks from internal attacks." Doctoral thesis, importedStudentThesis, 2014. https://researchprofiles.canberra.edu.au/en/studentTheses/ac08e070-6810-4c64-8f69-9771992324a8.
Full textShi, Weidong. "Architectural Support for Protecting Memory Integrity and Confidentiality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11460.
Full text