Dissertations / Theses on the topic 'Component of corporate security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Component of corporate security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Копча, Ю. Ю., та Yu Yu Kopcha. "Механізм формування потенціалу економічної безпеки підприємств: дисертація". Thesis, Національний авіаційний університет, 2020. http://dspace.lvduvs.edu.ua/handle/1234567890/3513.
Full textRudkovsky, O. V. "Corporate security organizations." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36239.
Full textHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textKelechi, Ugwu, Charles Maina, Sergio Silva, and Gabriel Vargas. "Corporate Identity:Communication as a key Component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1329.
Full textVargas, Gabriel, Sergio Silva, Ugwu Keliche, and Charles Maina. "Corporate Identity : Communication as a key component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1327.
Full textDyskant, Lucas Bubman. "The illiquidity component of corporate bond spreads." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/19304.
Full textКрапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, et al. "Tax security as a component of the financial security of a country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43525.
Full textThomson, Kerry-Lynn. "Integrating information security into corporate culture." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/132.
Full textPosthumus, Shaun Murray. "Corporate information risk : an information security governance framework." Thesis, Nelson Mandela Metropolitan University, 2006. http://hdl.handle.net/10948/814.
Full textBond, Anders, and Nils Påhlsson. "A Quantitative Evaluation Framework for Component Security in Distributed Information Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2410.
Full textSohrakoff, Karen A. "Immigrant integration a missing component of Homeland Security strategy and policy /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FSohrakoff.pdf.
Full textBen, Said Najah. "Information Flow Security in Component-Based Models : From verification to Implementation." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM053/document.
Full textMaslyuk, L. L., and V. V. Loiko. "The production component of economic security for the production of clothing." Thesis, КНУТД, 2016. https://er.knutd.edu.ua/handle/123456789/2169.
Full textBurkhead, Randy L. "A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management." Thesis, Capella University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3682325.
Full textYu, Suxiu. "Essays on Corporate Finance, Security Design and Information Choice." Thesis, Toulouse 1, 2017. http://www.theses.fr/2017TOU10028.
Full textOlsen, Brett C. "Essays on security issuance." Diss., Columbia, Mo. : University of Missouri-Columbia, 2007. http://hdl.handle.net/10355/6261.
Full textTran, Tam M. Allen James O. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA383767.
Full textSousa, Goncalo. "A legal reasoning component of a network security command and control system." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5457.
Full textTran, Tam M., and James O. Allen. "Interoperability and security support for heterogeneous Cots/Gots/legacy component-based architecture." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9419.
Full textDementis, Georgios Sousa Goncalo. "A legal reasoning component of a network security command and control system." Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FDementis.pdf.
Full textKukuruzovic, Naida. "Security Management : Fulfillment of the Government Requirements for a component assurance process." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189983.
Full textHodges, Randy T. "The exegesis of culture as a critical component of Christian corporate worship." Theological Research Exchange Network (TREN), 1993. http://www.tren.com.
Full textPeterson, Mikael. "CAESAR : A proposed method for evaluating security in component-based distributed information systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2470.
Full textZiegan, Marius Christoph. "Essays on the determinants and costs of corporate security offerings." Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/essays-on-the-determinants-and-costs-of-corporate-security-offerings(f687d966-21d1-46e0-987b-cf366b8ee456).html.
Full textMayisela, Simphiwe Hector. "Data-centric security : towards a utopian model for protecting corporate data on mobile devices." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011094.
Full textVorobiev, Artem. "An architectural approach to achieving higher-level security for component (service) based software systems." Swinburne Research Bank, 2008. http://hdl.handle.net/1959.3/47779.
Full textArmstrong, Helen L. "A soft approach to management of information security." Curtin University of Technology, School of Public Health, 1999. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=10235.
Full textNoe, Ewell Adriel. "A Discussion of Intercultural Relations as a Critical Component of Corporate Social Responsibility." Thesis, University of the Pacific, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10276597.
Full textFrey, Rüdiger, Lars Rösler, and Dan Lu. "Corporate Security Prices in Structural Credit Risk Models with Incomplete Information." Wiley, 2017. http://dx.doi.org/10.1111/mafi.12176.
Full textMomot, T. V., I. O. Filatova, and D. T. Momot. "Customer relationship management in the system of stakeholders-oriented corporate security." Thesis, Київський національний університет технологій та дизайну, 2018. https://er.knutd.edu.ua/handle/123456789/10138.
Full textJohnson, Kenneth Tyrone. "The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.
Full textRempfer, Thomas L. "Anthrax vaccine as a component of the strategic national stockpile: a dilemma for Homeland Security." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FRempfer.pdf.
Full textElish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.
Full textRich, Ronald P., and Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.
Full textKulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Full textChau, Foo-cheong Sidney, and 周富祥. "Application the principles of corporate governance to enhance efficiency of airport security services." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B5025456X.
Full textHammouri, Tariq M. "Improving Jordan's corporate loan security system : the floating charge; evaluation, modification and transplantation." Thesis, University of Bristol, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247558.
Full textDavis, Robert Elliot. "Relationship between Corporate Governance and Information Security Governance Effectiveness in United States Corporations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3873.
Full textMichiel, Michael. "The institutionalisation of an information security culture in a petroleum organisation in the Western Cape." Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2749.
Full textVan, Niekerk Johannes Frederick. "Fostering information security culture through intergrating theory and technology." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1404.
Full textSahd, Lize-Marie. "A structured approach to the identification of the significant risks related to enterprise mobile solutions at a mobile technology component level." Thesis, Stellenbosch : Stellenbosch University, 2015. http://hdl.handle.net/10019.1/96674.
Full textHolmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.
Full textO'Reilly, Conor Francis. "Towards state-corporate symbiosis : the role of the security consultancy industry in transnational policing." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.479401.
Full textYeung, Ping E. "Belief-revisions after earnings announcements : evidence from security analysts' forecast revisions /." view abstract or download file of text, 2003. http://wwwlib.umi.com/cr/uoregon/fullcit?p3095287.
Full textMcGee, Anthony. "Corporate security's professional project : an examination of the modern condition of corporate security management and the potential for further professionalisation of the occupation." Thesis, Cranfield University, 2010. http://dspace.lib.cranfield.ac.uk/handle/1826/4658.
Full textLevendal, Arend Randolph Dimitre. "Assessing cultural readiness for lean implementation at an automotive component manufacturer in Port Elizabeth." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18145.
Full textSteiner, Max [Verfasser], and Peter [Akademischer Betreuer] Liggesmeyer. "Integrating Security Concerns into Safety Analysis of Embedded Systems Using Component Fault Trees / Max Steiner ; Betreuer: Peter Liggesmeyer." Kaiserslautern : Technische Universität Kaiserslautern, 2016. http://d-nb.info/1115183664/34.
Full textGamu, Jonathan Kishen. "Corporate security governance : multinational mining companies and the local political economy of violence in Peru." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59957.
Full textLoh, Roger K. "Three Essays on Security Analysts." The Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=osu1213984051.
Full textKaufman, Jason R. "Digital video watermarking using singular value decomposition and two-dimensional principal component analysis." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141855950.
Full text