Academic literature on the topic 'Security company in Noida'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security company in Noida.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security company in Noida"
Yadav, Archana. "Human Resource Management Practices and Employee Retention." Asian Journal of Managerial Science 9, no. 1 (2020): 30–35. http://dx.doi.org/10.51983/ajms-2020.9.1.1633.
Full textCheema, Surbhi, and Ritu Srivastava. "Tale of a City – Greater Noida: A Qualitative Study." European Journal of Social Sciences 1, no. 3 (2018): 111. http://dx.doi.org/10.26417/ejss.v1i3.p111-122.
Full textKumar, Ravindra, and Himanshu Agarwal. "Employment Opportunities & Retention for Women in Information Technology Sector." Journal of Commerce and Trade 15, no. 1 (2020): 73–79. https://doi.org/10.26703/JCT.v15i1-10.
Full textPandey, Rina. "Milkbasket: Changing the face of grocery shopping." Delhi Business Review 23, no. 1 (2022): 87–98. http://dx.doi.org/10.51768/dbr.v23i1.231202208.
Full textOtinashvili, Ramaz. "Security in Company Management." Works of Georgian Technical University, no. 2(520) (June 25, 2021): 67–75. http://dx.doi.org/10.36073/1512-0996-2021-2-67-75.
Full textHinde, S. V. "Company computer security policy." Computer Audit Update 1992, no. 10 (1992): 8–12. http://dx.doi.org/10.1016/0960-2593(92)90050-w.
Full textRai, Neel, and Shivani Agarwal. "Technical Report." International Journal of Risk and Contingency Management 8, no. 1 (2019): 74–78. http://dx.doi.org/10.4018/ijrcm.2019010105.
Full textAggarwal, Rashmi Kumar, and Bikramjit Rishi. "Dish Tv India Limited: the dilemma of celebrity endorsement." Emerald Emerging Markets Case Studies 11, no. 3 (2021): 1–16. http://dx.doi.org/10.1108/eemcs-08-2020-0292.
Full textSAGAR, RAHUL. "To Analyze Customer Satisfaction Towards E-commerce Retail Company (Blinkit)." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50407.
Full textSudharshan, Prabhu S., and Pai T. Vaikunth. "A Study on Products and Services of HCL Technologies." International Journal of Case Studies in Business, IT and Education (IJCSBE) 2, no. 1 (2018): 45–53. https://doi.org/10.5281/zenodo.1253722.
Full textDissertations / Theses on the topic "Security company in Noida"
Loiko, V. V., and A. О. Skoriatina. "Economic security fashion company." Thesis, КНУТД, 2016. https://er.knutd.edu.ua/handle/123456789/4885.
Full textGunderson, Renee M. "Network security for a communications company." Online version, 2002. http://www.uwstout.edu/lib/thesis/2002/2002gundersonr.pdf.
Full textSpandonidis, Bladimiros. "Linking Information Security Awareness to Information Security Management Strategy.A Study in an IT Company." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45894.
Full textAbrahamsson, Charlotte, and Mattias Wessman. "WLAN Security : IEEE 802.11b or Bluetooth - which standard provides best security methods for companies?" Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2320.
Full textPeters, Joseph G. "A job task analysis survey for patrol officers in XYZ Security Company." Online version, 2009. http://www.uwstout.edu/lib/thesis/2009/2009petersj.pdf.
Full textQureshi, Muhammad Sohail. "Measuring Efficacy of Information Security Policies : A Case Study of UAE based company." Thesis, KTH, Data- och systemvetenskap, DSV, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-103475.
Full textOwen, Morné. "An enterprise information security model for a micro finance company: a case study." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1151.
Full textKokt, D., and der Merwe C. A. Van. "The impact of organisational culture on service delivery in a major private security company." Journal for New Generation Sciences, Vol 7, Issue 2: Central University of Technology, Free State, Bloemfontein, 2009. http://hdl.handle.net/11462/535.
Full textJanaby, Mohamad. "The legal regime applicable to private military and security company personnel in armed conflicts." Thesis, University of Aberdeen, 2015. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981.
Full textKlasson, Sebastian, and Nina Lindström. "Longitudinal analysis of the certificate chains of big tech company domains." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-178396.
Full textBooks on the topic "Security company in Noida"
Kazakova, Nataliya. Financial security of the company. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1908969.
Full textUpadhyaya, Sanjay. Labour, employment, and social security issues in education industry: A case study of private schools of NOIDA. V.V. Giri National Labour Institute, 2005.
Find full textJie, Yuan, and CCH Asia Pte Limited, eds. PRC company & security laws: A practical guide. CCH Asia Pte Ltd., 2006.
Find full textPesonen, Markku. Yrityksen turvallisuusjärjestelyt: Security arrangements of a company. M. Pesonen, 1993.
Find full textCommission, Fiji Law Reform, ed. Company and commercial law reform: Securities over personal property. Fiji Law Reform Commission, 1998.
Find full textSwaraj Art Archive (Noida, India), ed. Artists from afar: Paintings and watercolours of India by European artists 1780-1947. Swaraj Art Archive, 2018.
Find full textFisher, Richard P. Business GuardDog: Practical security & loss prevention tips & techniques to protect your company. JIAN Tools for Sales, 1992.
Find full textShepherd, C. David. Preventive measures: Is your company ready? Are you? Preventive Measures, 2006.
Find full textJanaby, Mohamad Ghazi. The Legal Regime Applicable to Private Military and Security Company Personnel in Armed Conflicts. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42231-2.
Full textBook chapters on the topic "Security company in Noida"
Brown, Jeffrey W. "Company Culture." In The Security Leader's Communication Playbook. CRC Press, 2021. http://dx.doi.org/10.1201/9781003100294-6.
Full textElliot, A. G. P. "Company Welfare Benefits." In Fringe Benefits, Labour Costs and Social Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003184706-11.
Full textLong, Ian. "Data Protection and Data Security." In The Complete Company Policies. Routledge, 2024. http://dx.doi.org/10.4324/9781003258995-7.
Full textMezentseva, Yuliya, and Zamir Bidgiev. "FINANCIAL SECURITY OF THE COMPANY." In Business security management in modern conditions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635b07761.24354249.
Full textFennelly, Lawrence J., and Marianna A. Perry. "Vehicular Accidents Involving a Company Vehicle." In Security Officers and Supervisors. CRC Press, 2024. http://dx.doi.org/10.4324/9781003402718-85.
Full textPils, Martin. "Increasing Security Awareness in the Company." In essentials. Springer Fachmedien Wiesbaden, 2025. https://doi.org/10.1007/978-3-658-46683-1_3.
Full textPrem, Berenike. "Who Am I? The Blurring of the Private Military and Security Company (PMSC) Category." In Security Privatization. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63010-6_3.
Full textArkhipov, Eduard L., Albina N. Sokolova, Vera E. Shumilina, Nataliya Y. Izvarina, and Svetlana Y. Kazantseva. "The Model of Company Security in Crisis Conditions." In Current Problems and Ways of Industry Development: Equipment and Technologies. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69421-0_82.
Full textJawad, Wasnaa Kadhim. "Evaluation of Information Security Policy for Small Company." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71187-0_4.
Full textMorison, Kip, Lei Wang, Fred Howell, James Viikinsalo, and Alan Martin. "Implementation of Online Dynamic Security Assessment at Southern Company." In Real-Time Stability Assessment in Modern Power System Control Centers. John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9780470423912.ch6.
Full textConference papers on the topic "Security company in Noida"
Sun, Zhongmiao, and Yike Xi. "Dynamic Investment Strategy of Blockchain Technology for Shipping Company." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00010.
Full textSkryl, Sergey V., Ekaterina S. Golubtsova, and Ivan S. Golubtsov. "Raising Company Employee Awareness in Information Security Based on Risk-Oriented Approach and Modern Trends." In 2025 7th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE). IEEE, 2025. https://doi.org/10.1109/reepe63962.2025.10970834.
Full textSewell, Harold James, and Kimberly J. Kaal. "One Company." In SPE Americas E&P Health, Safety, Security and Environmental Conference. Society of Petroleum Engineers, 2013. http://dx.doi.org/10.2118/163759-ms.
Full textMalinoshevska, K. I. "DEVELOPMENT OF THE COMPANY STRATEGY." In Economic security: state, cluster, enterprise. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-187-9-6.
Full textBayir, Batuhan, Ibrahim Berk Yalinkilic, Sebnem Bora, and Ozgu Can. "Company Security Assesment with Agent Based Simulation." In 2020 Innovations in Intelligent Systems and Applications Conference (ASYU). IEEE, 2020. http://dx.doi.org/10.1109/asyu50717.2020.9259865.
Full textYanchenko, A. V. "SECURITY COMPANY: MAIN SOURCES AND RISK FACTORS." In ДАЛЬНЕВОСТОЧНАЯ ВЕСНА - 2021. Комсомольский-на-Амуре государственный университет, 2021. http://dx.doi.org/10.17084/978-5-7765-1472-2_2021_67.
Full textVolner, Rudolf, and Vladimir Smrz. "Security and Information Systems for Air Company." In Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology. IEEE, 2006. http://dx.doi.org/10.1109/ccst.2006.313465.
Full textKhantong, Aran. "HIV/AIDS - A Company Perspective." In SPE Asia Pacific Health, Safety, and Security Environment Conference and Exhibition. Society of Petroleum Engineers, 2007. http://dx.doi.org/10.2118/108852-ms.
Full textVovk, Olha, Alona Kovalchuk, and Vika Lukarzhevska-Mіalyk. "MANAGEMENT OF TRANSPORT COMPANY COMPETITIVENESS IN SECURITY DIRECTIONS." In SPECIALIZED AND MULTIDISCIPLINARY SCIENTIFIC RESEARCHES. European Scientific Platform, 2020. http://dx.doi.org/10.36074/11.12.2020.v1.05.
Full textHadad, Ashif, Dwi Cahyono, Josef Susanto, Eko Wahju Tjahjono, I. Ardhana Putra, and Bambang Rianto. "Hearing Conservation Program in Oil and Gas Company." In Asia Pacific Health, Safety, Security and Environment Conference. Society of Petroleum Engineers, 2009. http://dx.doi.org/10.2118/122751-ms.
Full textReports on the topic "Security company in Noida"
Bulger, Joseph, William Geer, and John Taylor. Pike Creek Computer Company SGT Security Version 4A. Defense Technical Information Center, 1987. http://dx.doi.org/10.21236/ada208001.
Full textAuthor, Not Given. The Detroit Edison Company Onsite Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/972159.
Full textAuthor, Not Given. Kern River Gas Transmission Company Onsite Cyber Security Assessment. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/970614.
Full textNicolls, W. Implementing Company Classification Policy with the S/MIME Security Label. RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3114.
Full textRubin, Alex, Alan Omar Loera Martinez, Jake Dow, and Anna Puglisi. The Huawei Moment. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200079.
Full textde Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.
Full textSkalli, Hasna. Local 'Job Counters' at Casal del Infants: Personal support to help vulnerable young people into work. Oxfam IBIS, 2021. http://dx.doi.org/10.21201/2021.7925.
Full textRonconi, Lucas, and Jorge Colina. Simplification of Labor Registration in Argentina: Achievements and Pending Issues. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0011358.
Full textHarangozó, Dániel. Serbia and the Russia–Ukraine War: Implications and Challenges II. Külügyi és Külgazdasági Intézet, 2022. http://dx.doi.org/10.47683/kkielemzesek.ke-2022.65.
Full textMotel-Klingebiel, Andreas, and Gerhard Naegele. Exclusion and inequality in late working life in the political context of the EU. Linköping University Electronic Press, 2022. http://dx.doi.org/10.3384/9789179293215.
Full text