Academic literature on the topic 'Security technician'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security technician.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security technician"
MURILLO, DE OLIVEIRA DIAS. "TEACHING MATERIALS ON SECURITY TECHNICIAN BUSINESS NEGOTIATION." GPH-International Journal of Educational Research 06, no. 08 (2023): 12–27. https://doi.org/10.5281/zenodo.8367744.
Full textCastillo Escalante, Irma Cecilia, and Adán Guillermo Ramírez García. "Curricular Innovation for Food Security." Education Sciences 13, no. 4 (2023): 374. http://dx.doi.org/10.3390/educsci13040374.
Full textAngelia Merdiyanti, Nabila Dwi Lestari, and Yulius Jatmiko Nuryatno. "ANALISIS BEBAN KERJA KARYAWAN PADA DEPARTEMEN AFTERSALES KIA HARAPAN INDAH." Journal of Social and Economics Research 5, no. 2 (2023): 318–33. http://dx.doi.org/10.54783/jser.v5i2.135.
Full textRushikesh, Patil. "A Review: Artificial Intelligence and Expert Systems for Cyber Security Authors." BOHR International Journal of Engineering 1, no. 1 (2022): 53–57. http://dx.doi.org/10.54646/bije.010.
Full textRushikesh, Patil. "A review: Artificial intelligence and expert systems for cyber security." BOHR International Journal of Engineering 1, no. 1 (2022): 52–56. http://dx.doi.org/10.54646/bije.2022.10.
Full textKazarinoff, Peter. "Letter From Editor JATE." Journal of Advanced Technological Education 1, no. 1 (2022): 1–2. https://doi.org/10.5281/zenodo.6366329.
Full textDr., Vinod Varma Vegesna. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 5, no. 1 (2023): 85–102. https://doi.org/10.38177/AJBSR.2023.5110.
Full textCARTER, CELESTE. "Invited Letter: Welcome to the Journal of Advanced Technological Education." Journal of Advanced Technological Education 1, no. 1 (2022): 3. https://doi.org/10.5281/zenodo.6363578.
Full textVegesna, Dr Vinod Varma. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 05, no. 01 (2023): 85–102. http://dx.doi.org/10.38177/ajbsr.2023.5110.
Full textChoirunisa, Ristyna. "Hearing Loss And Health Complaints In Technicians Air Skadron 3 Iswahjudi Airport And Its Association With Aircraft Noise." JURNAL KESEHATAN LINGKUNGAN 11, no. 1 (2019): 61. http://dx.doi.org/10.20473/jkl.v11i1.2019.61-68.
Full textDissertations / Theses on the topic "Security technician"
Alqatawna, Ja'Far S. "Multi-stakeholder enquiry for securing e-Business environments : a socio-technical security framework." Thesis, Sheffield Hallam University, 2010. http://shura.shu.ac.uk/19255/.
Full textHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Full textLi, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368938.
Full textLi, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1751/1/phd_thesis_tong.pdf.
Full textVan, Der Merwe Melani. "Energy transitions: the case of South African electric security." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/27906.
Full textMenzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.
Full textKarokola, Geoffrey Rwezaura. "A Framework for Securing e-Government Services : The Case of Tanzania." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-80722.
Full textOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textManinjwa, Prosecutor Mvikeli. "Managing an information security policy architecture : a technical documentation perspective." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020757.
Full textStamm, Sidney L. "Anticipating and hardening the Web against socio-technical security attacks." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344603.
Full textBooks on the topic "Security technician"
Parkin, Simon, and Luca Viganò, eds. Socio-Technical Aspects in Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10183-0.
Full textMehrnezhad, Maryam, and Simon Parkin, eds. Socio-Technical Aspects in Security. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83072-3.
Full textKirk, Hausman Kalani, and Weiss Martin, eds. CompTIA security+. 2nd ed. Pearson, 2009.
Find full textInc, Internet Security Systems, ed. Microsoft Windows 2000 security technical reference. Microsoft Press, 2000.
Find full textPolice, Royal Canadian Mounted. Technical security standard for information technology. Treasury Board, 1995.
Find full textGreat Britain. Department of Health and Social Security. Reform of Social Security: Technical annex. HMSO, 1985.
Find full textGreat Britain. Department for Work and Pensions., ed. Simplicity, security and choice: Technical paper. Department for Work and Pensions, 2002.
Find full textAssociation, Computing Technology Industry, ed. CompTIA security + certification. CompTIA Press, 2008.
Find full textGroß, Thomas, and Theo Tryfonas, eds. Socio-Technical Aspects in Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55958-8.
Full textBook chapters on the topic "Security technician"
Xue, Bowen, Huifen Zhong, Junrui Lu, Tianwei Zhou, and Ben Niu. "Flexible Task Splitting Strategy in Aircraft Maintenance Technician Scheduling Based on Swarm Intelligence." In Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0_2.
Full textBecker, George, and Kathy Slattery. "Security." In Sun Technical Reference Library. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4419-8716-7_6.
Full textRusso, Michael. "System Security." In Sun Technical Reference Library. Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-3000-7_14.
Full textKou, Weidong. "Technical Fundamentals of Security." In Networking Security and Standards. Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6153-8_2.
Full textViegas, Virgilio, and Oben Kuyucu. "IT Security Technical Controls." In IT Security Controls. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_4.
Full textLenhard, Thomas H. "Hazards in the Technical Environment." In Data Security. Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_5.
Full textSingh, Shveta, and Surendra S. Yadav. "Technical Analysis." In Security Analysis and Portfolio Management. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2520-6_5.
Full textHoughton, Amie B. "Forensic Technicians." In The Distributed Functions of Emergency Management and Homeland Security. CRC Press, 2023. http://dx.doi.org/10.4324/9781003350729-18.
Full textTaylor, Bradley. "A Framework for Network Security." In Sun Technical Reference Library. Springer New York, 1990. http://dx.doi.org/10.1007/978-1-4612-3334-3_11.
Full textMathew, Ashwin J. "Can Security Be Decentralised?" In Socio-Technical Aspects in Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10183-0_4.
Full textConference papers on the topic "Security technician"
Canotilho de Almeida, Rita, and Miguel Corticeiro Neves. "Risk Assessment in a Nuclear Medicine Department." In Applied Human Factors and Ergonomics Conference. AHFE International, 2019. http://dx.doi.org/10.54941/ahfe100172.
Full textDaily, Jeremy S., and Prakash Kulkarni. "SECURE HEAVY VEHICLE DIAGNOSTICS." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3868.
Full textGibbons, Duncan W., Joshua Lubell, and Paul Witherell. "Implementing the Risk Management Framework for Additive Manufacturing Security: A Model-Based Approach." In ASME 2024 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2024. http://dx.doi.org/10.1115/detc2024-143713.
Full textHoleček, Jiří, and Tomáš Zeman. "Cyber security in technical education." In 2023 32nd Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE). IEEE, 2023. http://dx.doi.org/10.23919/eaeeie55804.2023.10181373.
Full textVaarandi, Risto, and Mauno Pihelgas. "Using Security Logs for Collecting and Reporting Technical Security Metrics." In 2014 IEEE Military Communications Conference (MILCOM). IEEE, 2014. http://dx.doi.org/10.1109/milcom.2014.53.
Full textTian, Zhaofu, Ningning Xu, and Wuliang Peng. "E-Commerce Security: A Technical Survey." In 2008 Second International Symposium on Intelligent Information Technology Application (IITA). IEEE, 2008. http://dx.doi.org/10.1109/iita.2008.61.
Full text"Technical session NS1: Network security I." In 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4773004.
Full text"Technical session NS2: Network security II." In 2008 International Conference on Computer Engineering & Systems. IEEE, 2008. http://dx.doi.org/10.1109/icces.2008.4773008.
Full textAhmadjee, Sabreen, Carlos Mera-Gomez, and Rami Bahsoon. "Assessing Smart Contracts Security Technical Debts." In 2021 IEEE/ACM International Conference on Technical Debt (TechDebt). IEEE, 2021. http://dx.doi.org/10.1109/techdebt52882.2021.00010.
Full textAlexan, Wassim, Eyad Mamdouh, Mohamed ElBeltagy, Ahmed Ashraf, Mohamed Moustafa, and Hashem Al-Qurashi. "Social Engineering and Technical Security Fusion." In 2022 International Telecommunications Conference (ITC-Egypt). IEEE, 2022. http://dx.doi.org/10.1109/itc-egypt55520.2022.9855761.
Full textReports on the topic "Security technician"
Bachner, Katherine. Advanced Nuclear Security Culture Technical Exchange: Overview of Nuclear Security Culture [PowerPoint]. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1574910.
Full textO'Connor, Sharon L., Donnie Wayne Whitehead, and Claude S. ,. III Potter. Nuclear power plant security assessment technical manual. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/921722.
Full textStoneburner, Gary. Underlying technical models for information technology security :. National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-33.
Full textDadu, Saurabh. Intel DOE Grid Security Enhancement Security in Power System Edge Final Technical Report. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1864773.
Full textScarfone, K. A., M. P. Souppaya, A. Cody, and A. D. Orebaugh. Technical guide to information security testing and assessment. National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-115.
Full textPeirce, Jennifer, and Alexandre Veyrat-Pontet. Citizen Security in Belize. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0009140.
Full textMcLarnon, Mark, and Marianne Swanson. Automated security self-evaluation tool technical documentation, version 1.03. National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6951.
Full textWayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/935471.
Full textSandoval, Betty Ann, Charlie Brannon, Leticia Pibida, Gordon Gillerman, and Michael Unterweger. National Voluntary Laboratory Accreditation Program (NVLAP) homeland security applications :. National Institute of Standards and Technology (U.S.), 2010. http://dx.doi.org/10.6028/nist.hb.150-23e2010.
Full textShishlyannikov, Oleg. SECURITY CODING OF OPTICAL DISCS AND DIGITAL EXTERNAL MEDIA. Intellectual Archive, 2024. http://dx.doi.org/10.32370/iaj.3111.
Full text