Thèses sur le sujet « Security policie »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Security policie ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Texte intégralSchlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.
Texte intégralSQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.
Texte intégralLim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.
Texte intégralGuillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.
Texte intégralHallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.
Texte intégralPersson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.
Texte intégralBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Texte intégralThimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.
Texte intégralBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Texte intégralRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Texte intégralHerzog, Almut. "Usable Security Policies for Runtime Environments." Doctoral thesis, Linköpings universitet, IISLAB - Laboratoriet för intelligenta informationssystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.
Texte intégralHerzog, Almut. "Usable security policies in runtime environments /." Linköping : Department of Computer and Information Science, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.
Texte intégralKhoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.
Texte intégralHwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.
Texte intégralLi, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Texte intégralGiacomantonio, Christopher Joseph. "Policing integration : the inter- and intra-organizational coordination of police work." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:4c85a7d4-4475-42a0-9fa1-226baaca43fc.
Texte intégralMartinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.
Texte intégralYalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.
Texte intégralEl, Maarabani Mazen. "Verification and test of interoperability security policies." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00717602.
Texte intégralMartins, Francisco. "Controlling Security Policies in a Distributed Environment." Doctoral thesis, Department of Informatics, University of Lisbon, 2006. http://hdl.handle.net/10451/14314.
Texte intégralMarhia, Natasha. "Everyday (in)security/(re)securing the everyday : gender, policing and violence against women in Delhi." Thesis, London School of Economics and Political Science (University of London), 2012. http://etheses.lse.ac.uk/759/.
Texte intégralMichael, Deborah Francis. "A sense of security? : the ideology and accountability of private security officers." Thesis, London School of Economics and Political Science (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271286.
Texte intégralGraham, Scott W. Mills Stephen E. "Monitoring information systems to enforce computer security policies /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369434.
Texte intégralSingh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.
Texte intégralWeikard, Hans-Peter. "Industrial policies and social security : investigating the links." Universität Potsdam, 1997. http://opus.kobv.de/ubp/volltexte/2010/4876/.
Texte intégralGraham, Scott W., and Stephen E. Mills. "Monitoring information systems to enforce computer security policies." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/8698.
Texte intégralAlzahrani, Ali Mousa G. "Efficient enforcement of security policies in distributed systems." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9029.
Texte intégralSui, Guang Ye. "Formal Enforcement of Security Policies : An Algebraic Approach." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26466.
Texte intégralSteffinlongo, Enrico <1987>. "Efficient security analysis of administrative access control policies." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12917.
Texte intégralSaboya, PÃmela Costa Landim. "As mudanÃas na formaÃÃo do policial militar do Cearà no contexto da seguranÃa pÃblica." Universidade Federal do CearÃ, 2017. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=19094.
Texte intégralFurst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.
Texte intégralDesilets-Bixler, Nicole L. "Security in transition : police reform in El Salvador and South Africa." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://handle.dtic.mil/100.2/ADA404711.
Texte intégralDoyle, Maria. "FEELINGS OF SAFETY : Feelings of Safety In The Presence Of the Police, Security Guards and Police Volunteers." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35885.
Texte intégralMenzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.
Texte intégralPlotkin, Lori A. "Kuwait, 1979-1991 : problems and policies for internal security." Thesis, University of Oxford, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288970.
Texte intégralHassan, S. M. A. "Food security and regional development policies in arid Sudan." Thesis, Swansea University, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637243.
Texte intégralToje, Asle. "American influence on European Union security policies, 1998-2004." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612838.
Texte intégralLomsak, Daniel. "Toward More Composable Software-Security Policies: Tools and Techniques." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4531.
Texte intégralMallios, Ioannis. "Probabilistic-Cost Enforcement of Security Policies in Distributed Systems." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/736.
Texte intégralSchwan, Matthias. "Specification and verification of security policies for smart cards." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2008. http://dx.doi.org/10.18452/15767.
Texte intégralHanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.
Texte intégralLee, Thomas F. "A new role for local police in radiological security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FLee.pdf.
Texte intégralOliveira, Nathalia Pereira de. "Policiais Violados, policiais violentos: uma análise da formação policial." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/6189.
Texte intégralHamilton, Sheilah Elizabeth. "Private security and government : a Hong Kong perspective, 1841-1941 /." Thesis, Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575102.
Texte intégralGerônimo, Gislene Donizetti. "Segurança pública: dever do Estado: garantia do exercício da cidadania." Universidade Presbiteriana Mackenzie, 2011. http://tede.mackenzie.br/jspui/handle/tede/1028.
Texte intégralDario, Diogo M. "Human security policies in the Colombian conflict during the Uribe government." Thesis, University of St Andrews, 2013. http://hdl.handle.net/10023/4516.
Texte intégralTimilsina, Anga. "Getting the policies right the prioritization and sequencing of policies in post-conflict countries /." Santa Monica, CA : RAND, 2007. http://www.rand.org/pubs/rgs_dissertations/RGSD222/.
Texte intégralHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Texte intégralHerusutopo, Antonius. "A study of computer security policies for the Indonesian Navy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from the National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272533.
Texte intégral