Tesis sobre el tema "Security threats"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Security threats".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Olandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Texto completoMahmood, Faisal. "SIP Security Threats and Countermeasures." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18126.
Texto completoSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Texto completoXu, Zhang. "Understanding Security Threats in Cloud." W&M ScholarWorks, 2016. https://scholarworks.wm.edu/etd/1477067957.
Texto completoCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Texto completoWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Texto completoByman, G. (Gabriel). "Connected devices:security threats vs. implemented security." Bachelor's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201704111464.
Texto completoBiswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Texto completoZakharov, I. "Threats to information security of the enterprise." Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/7954.
Texto completoGong, Xuwei. "Security Threats and Countermeasures for Connected Vehicles." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259494.
Texto completoFrauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Texto completoLambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.
Texto completoBailey, Daniel A. "Communicating homeland security threats government and public efforts." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5040.
Texto completoSuvor, John. "Diversity Visa Lottery: Threats to U.S. National Security." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.
Texto completoTesfay, Kibrom Gebregziabher. "Threats to and alternatives for financing Social Security." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTesfay.pdf.
Texto completoVecchiato, Sara <1990>. "The Malian crisis: security threats from the Sahel." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4676.
Texto completoInci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Texto completoMalec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.
Texto completoReichling, Peter, P. G. Pererva, and T. V. Romanchik. "Determination of the essence of the economic security of the country." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/39581.
Texto completoMoore, Alan G. "Southwest Hispanic community - the absence of homeland security threats." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27874.
Texto completoElder, James R. "Interactive visualisation for the discovery of cyber security threats." Thesis, University of Surrey, 2017. http://epubs.surrey.ac.uk/842460/.
Texto completoGao, Xing. "Investigating Emerging Security Threats in Clouds and Data Centers." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1550153840.
Texto completoWebb, Kenneth G. "Managing asymmetric threats to national security - terrorist information operations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/284.
Texto completoMabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Texto completoAshby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.
Texto completoCatrantzos, Nicholas. "No dark corners defending against insider threats to critical infrastructure /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FCatrantzos.pdf.
Texto completoKlykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Texto completoMusayev, Namig. "Analysis of Security Threats for Offshore Oil&Gas Installations." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Buscar texto completoJaziri, Stenberg Jasmin. "Realism and new threats : an analysis of Israel's security policy." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21341.
Texto completoWalton, James Calder. "British intelligence and threats to national security, c.1941-1951." Thesis, University of Cambridge, 2007. https://www.repository.cam.ac.uk/handle/1810/226671.
Texto completoStieper, Erica Marie. "The Discursive Construction of National Security Threats from 2001-2018." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83827.
Texto completoHeppelmann, Andrew R. "The implication of emerging security threats on civil-military relations /." (Requires Adobe Acrobat Reader), 2001. http://stinet.dtic.mil/str/tr4%5Ffields.html.
Texto completoQuesinberry, Malora. "An Analysis of Faculty and Staff's Identification of Malware Threats." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3088.
Texto completoJones, Andrew. "Threats to information systems and effective countermeasures." Thesis, University of South Wales, 2004. https://pure.southwales.ac.uk/en/studentthesis/threats-to-information-systems-and-effective-countermeasures(2ffda7b3-38d8-48a3-90da-386ee85f10bf).html.
Texto completoSchmidlin, Marco. "Swiss Armed Forces XXI - the answer to current or future threats." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FSchmidlin.pdf.
Texto completoSaltstone, Scot. "The legal dimensions of combatting threats to the security of Canada." Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/5778.
Texto completoVerhun, A. M., Julia Bondarchuk, and A. S. Linichenko. "Influence of risks, dangers and threats on the enterprise financial security." Thesis, ЦФЕНД, 2018. https://er.knutd.edu.ua/handle/123456789/10530.
Texto completoLarrimore, Nancy Page. "Risk Management Strategies to Prevent and Mitigate Emerging Operational Security Threats." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4866.
Texto completoDuan, Ren. "Machine Learning in Defensive IT Security: Early Detection of Novel Threats." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-266122.
Texto completoSquarcina, Marco <1984>. "Analysis and prevention of security threats in web and cryptographic applications." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12918.
Texto completoSpolaor, Riccardo. "Security and Privacy Threats on Mobile Devices through Side-Channels Analysis." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3426796.
Texto completoArenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.
Texto completoElmrabit, Nebrase. "A multiple-perspective approach for insider-threat risk prediction in cyber-security." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/36243.
Texto completoClementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.
Texto completoFediushyn, O. I., O. O. Yatsiuk, and H. O. Rusanov. "Virtual environment for training auditors with information security." Thesis, ВА ЗС АР; НТУ "ХПІ"; НАУ, ДП "ПДПРОНДІАВІАПРОМ"; УмЖ, 2021. https://openarchive.nure.ua/handle/document/15754.
Texto completoAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Texto completoLombardo, Gary. "Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats." Thesis, Capella University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751570.
Texto completoEzeokafor, Edwin. "The securitization processes and West African security : regime-led neo-patrimonial threats?" Thesis, University of Dundee, 2015. https://discovery.dundee.ac.uk/en/studentTheses/9738c1a6-03b1-4b1c-84bb-ec3e2b2c54d9.
Texto completoAdams, Tamara Kaye. "Potential threats to Spanish security implications for the United States and NATO /." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242517.
Texto completoOkoye, Stella Ifeyinwa. "Strategies to Minimize the Effects of Information Security Threats on Business Performance." Thesis, Walden University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10606454.
Texto completo