Tesis sobre el tema "Internet – security measures. sears"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Internet – security measures. sears".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Texto completoNaude, Kevin Alexander. "Assessing program code through static structural similarity." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Texto completoYu, Kin-ying, and 余見英. "Efficient schemes for anonymous credential with reputation support." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48330012.
Texto completoSato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Texto completoRutherford, Andrew. "Introducing hippocratic log files for personal privacy control." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.
Texto completoMarais, Terrence K. "Electronic payment and security on the Internet." Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Texto completoNagarle, Shivashankarappa A. "Novel framework to support information security audit in virtual environment." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1.
Texto completoDe, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.
Texto completoDacosta, Italo. "Practical authentication in large-scale internet applications." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44863.
Texto completoClayton, Bradley. "Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost." Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.
Texto completoKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Texto completoJanz, Linda, and University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives." Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.
Texto completoCheung, Lai-sze, and 張麗詩. "Delegation of rights using PKI-based components." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.
Texto completoChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Texto completoZhang, Junjie. "Effective and scalable botnet detection in network traffic." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Texto completoDu, Juan. "Constructing the internet panoptic-fortification: a legal study on China's internet regulatory mechanism." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/530.
Texto completoVan, der Schyff Karl Izak. "Cloud information security : a higher education perspective." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011607.
Texto completoPark, Yongro. "A statistical process control approach for network intrusion detection." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.
Texto completoSou, Sok Fong. "An approach to protecting online personal information in Macau government." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3869194.
Texto completoSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Texto completoDemir, Irfan. "Changing Privacy Concerns in the Internet Era." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3187/.
Texto completoFriedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.
Texto completoLeppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.
Texto completoNdinga, S'busiso Simon. "An investigation into tools and protocols for commercial audio web-site creation." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006488.
Texto completoKruger, Richard Carl. "Investigating the possible introduction of managed broadband internet security : a pilot study." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/791.
Texto completoSwart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.
Texto completoJudge, Paul Q. "Security and protection architectures for large-scale content distribution." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9217.
Texto completoSingaravelu, Lenin. "End-to-End Security of Information Flow in Web-based Applications." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16142.
Texto completoHlaing, Nwe Nwe. "Browser security : a requirements-based approach." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/36887/6/36887_Digitised%20Thesis.pdf.
Texto completoNcubukezi, Tabisa. "Security considerations of e-learning in higher education institutions." Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2301.
Texto completoKaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Texto completoDe, Wit Roland Duyvené. "Provisioning VolP wireless networks with security." Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Texto completoHannigan, Kerry. "Protection and security in a technologically advanced society : children and young people's perspectives." Thesis, University of Stirling, 2014. http://hdl.handle.net/1893/21562.
Texto completoEgan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.
Texto completoMooi, Roderick David. "A model for security incident response in the South African National Research and Education network." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.
Texto completoSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Texto completoMegaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.
Texto completoAllam, Sean. "A model to measure the maturuty of smartphone security at software consultancies." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/281.
Texto completoImine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Texto completoDyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Texto completoCheung, Yee-him, and 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Texto completoOliveira, Rogério Leão Santos de [UNESP]. "L3-arpsec - módulo seguro para controle e proteção do protocolo de resolução de endereços em redes definidas por software." Universidade Estadual Paulista (UNESP), 2015. http://hdl.handle.net/11449/128103.
Texto completoOliveira, Rogério Leão Santos de. "L3-arpsec - módulo seguro para controle e proteção do protocolo de resolução de endereços em redes definidas por software /." Ilha Solteira, 2015. http://hdl.handle.net/11449/128103.
Texto completoGerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.
Texto completoOpie, Jake Weyman. "Securing softswitches from malicious attacks." Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Texto completoAbdelhafez, Mohamed. "Modeling and Simulations of Worms and Mitigation Techniques." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19840.
Texto completoTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Texto completo"Internet security threats and solutions." Thesis, 2015. http://hdl.handle.net/10210/13974.
Texto completo"A new approach to dynamic internet risk analysis." Thesis, 2009. http://hdl.handle.net/10210/2959.
Texto completo"Internet payment system--: mechanism, applications & experimentation." 2000. http://library.cuhk.edu.hk/record=b5890314.
Texto completo