To see the other types of publications on this topic, follow the link: Security technician.

Books on the topic 'Security technician'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security technician.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Gruber, Robert. Physical and technical security. Thomson Delmar Learning, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parkin, Simon, and Luca Viganò, eds. Socio-Technical Aspects in Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10183-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mehrnezhad, Maryam, and Simon Parkin, eds. Socio-Technical Aspects in Security. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-83072-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kirk, Hausman Kalani, and Weiss Martin, eds. CompTIA security+. 2nd ed. Pearson, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, Internet Security Systems, ed. Microsoft Windows 2000 security technical reference. Microsoft Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Police, Royal Canadian Mounted. Technical security standard for information technology. Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Great Britain. Department of Health and Social Security. Reform of Social Security: Technical annex. HMSO, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Great Britain. Department for Work and Pensions., ed. Simplicity, security and choice: Technical paper. Department for Work and Pensions, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Association, Computing Technology Industry, ed. CompTIA security + certification. CompTIA Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Groß, Thomas, and Theo Tryfonas, eds. Socio-Technical Aspects in Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-55958-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Groß, Thomas, and Luca Viganò, eds. Socio-Technical Aspects in Security and Trust. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79318-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Coombs, Jason. Microsoft Internet information services security technical reference. Microsoft Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

James, Aldridge, ed. Security closed circuit television handbook: Applications & technical. C.C. Thomas, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Johnson, William M. Eavesdropping, technical surveillance & technical surveillance countermeasures. Business Espionage Controls & Countermeasures Association, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Conklin, Wm Arthur. Principles of computer security: CompTIA security+ and beyond. 2nd ed. McGraw-Hill Companies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

B, White Gregory, ed. Principles of computer security: CompTIA security+ and beyond. 2nd ed. McGraw-Hill Companies, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Engebretson, David J. Technician's guide to physical security networking: Enterprise solutions. AuthorHouse, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

United States. Advisory Council on Social Security (1989-1991). Social Security Technical Panel. Social Security Technical Panel report to the 1991 Advisory Council on Social Security. Advisory Council on Social Security, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Steve, Watt, ed. Managing information security: A non-technical management guide. Elsevier Advanced Technology, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

1970-, Kiefer Kimberly, ed. Information security: A legal, business, and technical handbook. Section of Science & Technology Law, American Bar Association, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gadzhiev, Nazirhan, Magomed Gazimagomedov, Andrey Doronin, et al. Economic security. INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1048684.

Full text
Abstract:
The textbook contains 15 topics that reveal the specifics of the discipline Economic security". The systems of quantitative and qualitative indicators for assessing economic security are considered; the methodological principles of assessing financial and monetary policy as a sphere of economic security are studied; the conceptual foundations of the regional economic security program are formed; the theoretical foundations of economic security of enterprises are considered. The main problems of economic security are described in the light of national security issues. Security aspects such as the role of the financial system, foreign economic aspects, social security, and the impact of scientific and technical security on economic security are considered. Special attention is paid to the role of law enforcement agencies in ensuring economic security. Methods of ensuring economic security are described that allow combining the analysis of theoretical positions with real practice and providing a higher level of material assimilation by cadets and students. Meets the requirements of the Federal state educational standard of higher education of the latest generation in the specialty 38.05.01 "Economic security (specialty level)".
APA, Harvard, Vancouver, ISO, and other styles
22

Barrett, Diane. CompTIA security+ SY0-301 exam cram. Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

American Bar Association. Section of Litigation., ed. Technical protection devices and computer law. American Bar Association, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

NATO, Advanced Research Workshop on Enhancing Security Sector Governance through Education and Research (2009 Plovdiv Bulgaria). Theoretical and technical perspectives on security sector governance from the Adriatic to the Caspian Sea. IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Reis, Ronald A. Becoming an electronics technician: Securing your high-tech future. 2nd ed. Prentice Hall, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Reis, Ronald A. Becoming an electronics technician: Securing your high-tech future. 4th ed. Prentice Hall, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

D, Ciampa Mark, ed. Lab manual for Security+ guide to network security fundamentals. 3rd ed. Course Technology, Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

United States. Department of Homeland Security. Office of Inspector General. Technical security evaluation of DHS activities at Dulles International Airport. U.S. Dept. of Homeland Security, Office of Inspector General, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

United Nations. Economic Commission for Africa. Population Environment Development Agriculture model: Technical manual. Economic Commission for Africa, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Llc Phelps & Associates and Ervin Frenzel. Cybersecurity: Bridging the Gap Between Technician and Management. Kendall Hunt Publishing Company, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Security systems technician: Start and run a money-making business. TAB Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Perritano, John. Bomb squad technician. 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Navy, Us. Information Systems Technician Training Series: Module 1-Administration and Security NAVEDTRA 14222. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Jr, Tucker Neil. 50331D Windows Client, Enterprise Desktop Support Technician: Troubleshooting and Security Training for on-Premises and Cloud-based Administration of Windows Clients. Tucker LLC, Neil, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Jr, Tucker Neil. 50331D Windows Client, Enterprise Desktop Support Technician: Troubleshooting and Security Training for on-Premises and Cloud-Based Administration of Windows Clients. Tucker LLC, Neil, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Police, Royal Canadian Mounted. Security: Technical security standards for information technology. Minister of Supply and Services Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Security: Technical security standards for information technology. Royal Canadian Mounted Police, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Physical & Technical Security: An Introduction. Cengage Delmar Learning, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Todd, Lin. Intelligence Technical: Technical (Securing Our Nation). Chelsea House Publications, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Information security for non-technical managers. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Information security for non-technical managers. Bookboon.com, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Information security for non-technical managers. Bookboon, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Fruehauf, Roger Cummings; Hugo. SNIA Technical Tutorial: Storage Network Security. Storage Networking Industry Association, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Alexander, Philip. Information Security. www.praeger.com, 2008. http://dx.doi.org/10.5040/9798400670206.

Full text
Abstract:
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of defense in depth -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys information in an understandable way, meaning managers won't need to rely solely on the IT people in their own company—who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.
APA, Harvard, Vancouver, ISO, and other styles
45

Sanger, John. Basic Alarm Electronics: Toolbox Guides for Security Technicians. Elsevier Science & Technology Books, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

White, Gregory, Wm Arthur Conklin, Chuck Cothren, et al. Principles of Computer Security: Security and Beyond. Career Education, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Technical security standard for information technology (TSSIT). Royal Canadian Mounted Police, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Windows Server 2003 security: A technical reference. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Rehak, David, Ales Bernatik, Zdenek Dvorak, and Martin Hromada. Safety and Security Issues in Technical Infrastructures. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rehak, David, Ales Bernatik, Zdenek Dvorak, and Martin Hromada. Safety and Security Issues in Technical Infrastructures. IGI Global, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography