Rozprawy doktorskie na temat „Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Telatin, Michela. "The development-security nexus and security sector reform." Thesis, University of Westminster, 2011. https://westminsterresearch.westminster.ac.uk/item/90095/the-development-security-nexus-and-security-sector-reform.
Pełny tekst źródłaMemon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Pełny tekst źródłaAntonsson, Martin. "Securing XML Web Services : using WS-security." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-580.
Pełny tekst źródłaForman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.
Pełny tekst źródłaKonstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.
Pełny tekst źródłaEstenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.
Pełny tekst źródłaKalibjian, Jeff. "Securing Telemetry Post Processing Applications with Hardware Based Security." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605052.
Pełny tekst źródłaHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Pełny tekst źródłaTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Pełny tekst źródłaKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Pełny tekst źródłaHaley, Charles B. "Arguing security : a framework for analyzing security requirements." Thesis, Open University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439343.
Pełny tekst źródłaCramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.
Pełny tekst źródłaPowell, Rhonda L. "Security and the right to security of person." Thesis, University of Oxford, 2008. http://ora.ox.ac.uk/objects/uuid:26e81a46-54d5-44f5-a3cd-c74a5798ea0d.
Pełny tekst źródłaКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.
Pełny tekst źródłaWullenweber, Emily Rose Stephens John D. "Biofuels the security threats of a security solution /." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2123.
Pełny tekst źródłaHaley, Charles B. "Arguing security : a framework for analyzing security requirements." n.p, 2006. http://ethos.bl.uk/.
Pełny tekst źródłaKlasson, Daniel, Kim Klasson, and Anatoly Iourtchenko. "Network Security Report : Penetration Tools for Network Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24545.
Pełny tekst źródłaSINIGAGLIA, FEDERICO. "Security Analysis of Multi-Factor Authentication Security Protocols." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1010670.
Pełny tekst źródłaEkström, Dan. "Securing a wireless local area network : using standard security techniques." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5662.
Pełny tekst źródłaConsolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.
Pełny tekst źródłaLamprecht, Christiaan Johan. "Adaptive security." Thesis, University of Newcastle Upon Tyne, 2012. http://hdl.handle.net/10443/1435.
Pełny tekst źródłaYousuff, Razu. "Network security." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199380.
Pełny tekst źródłaOvchinnikov, I. I., and E. A. Minin. "Internet security." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33773.
Pełny tekst źródłaHuarcaya, Arroyo Ricardo Miguel, Espinoza Gilbert Daniel Lopez, Visaloth Luis Enrique Mendoza, Cribilleros Agustin Bartolome Romero, and Leon Patricia Alcira Torres. "Security Kids." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/625338.
Pełny tekst źródłaBlanco, Collazos Arturo Enrique, Kuoman María del Carmen Wong, and Huamán Elvis Yaringaño. "Security Clean." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/625349.
Pełny tekst źródłaAndersson, Martin. "Software Security Testing : A Flexible Architecture for Security Testing." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2388.
Pełny tekst źródłaGruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.
Pełny tekst źródłaShipman-Sercu, Chris. "A False Sense of Security: The Social Security Debate." Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.
Pełny tekst źródłaBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Pełny tekst źródłaWalden, Ian Newark. "Data communications security : legislating and contracting for legal security." Thesis, Nottingham Trent University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314417.
Pełny tekst źródłaBilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.
Pełny tekst źródłaBaratz, Joshua W. (Joshua William) 1981. "Regions Security Policy (RSP) : applying regions to network security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17933.
Pełny tekst źródłaAltinpinar, Mustafa. "Adapting to a new security environment : Turkey's border security." Thesis, University of Portsmouth, 2016. https://researchportal.port.ac.uk/portal/en/theses/adapting-to-a-new-security-environment(7ab2f7fb-8e8a-46dc-8f00-a7d08014fece).html.
Pełny tekst źródłaKaur, Kirandeep. "Virtualisation Security Issues : Security Issues Arises In Virtual Environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43345.
Pełny tekst źródłaHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Pełny tekst źródłaSudhodanan, Avinash. "Black-Box Security Testing of Browser-Based Security Protocols." Doctoral thesis, Università degli studi di Trento, 2017. https://hdl.handle.net/11572/368805.
Pełny tekst źródłaSudhodanan, Avinash. "Black-Box Security Testing of Browser-Based Security Protocols." Doctoral thesis, University of Trento, 2017. http://eprints-phd.biblio.unitn.it/2006/1/Avinash_PhD_thesis.pdf.
Pełny tekst źródłaBugai, Veaceslav D. "European security organizations in the post-Cold-War security environment the new frame of European security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FBugai.pdf.
Pełny tekst źródłaValella, William. "Securing open source Virtual Private Networks a study in Linux security /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000362.
Pełny tekst źródłaAsan, Pinar. "Security Through Integration: The Eu As A Pluralistic Security Community." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/2/12609764/index.pdf.
Pełny tekst źródłaPersson, Lars. "Implementing a SOAP security proxy and Evaluating SOAP security standards." Thesis, Umeå universitet, Institutionen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-58062.
Pełny tekst źródłaWakim, Mike. "Employing Android Security Features for Enhanced Security and Privacy Preservation." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36353.
Pełny tekst źródłaArsenault, Denis. "Environment, security and natural disasters, contesting discourses of environmental security." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0018/MQ36809.pdf.
Pełny tekst źródłaRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Pełny tekst źródłaHengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.
Pełny tekst źródłaRouhi, Mahsa. "Security discourse and security decision-making in Iran, 1979-1989." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708104.
Pełny tekst źródłaKumar, Richa. "Constructing security : a relational mapping of the EU security market." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/63935/.
Pełny tekst źródłaBasaran, Tugba. "Geographies of security : security, law and space in liberal states." Thesis, University of Cambridge, 2008. https://www.repository.cam.ac.uk/handle/1810/283846.
Pełny tekst źródłaTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Pełny tekst źródłaElsadig, Abdalla Abdalla Mohamed. "Virtualization Security Issues : Security issues arise in the virtual environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42474.
Pełny tekst źródła