Dissertations / Theses on the topic 'Security technician'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security technician.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Alqatawna, Ja'Far S. "Multi-stakeholder enquiry for securing e-Business environments : a socio-technical security framework." Thesis, Sheffield Hallam University, 2010. http://shura.shu.ac.uk/19255/.
Full textHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Full textLi, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368938.
Full textLi, Tong. "Holistic Security Requirements Engineering for Socio-Technical Systems." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1751/1/phd_thesis_tong.pdf.
Full textVan, Der Merwe Melani. "Energy transitions: the case of South African electric security." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/27906.
Full textMenzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.
Full textKarokola, Geoffrey Rwezaura. "A Framework for Securing e-Government Services : The Case of Tanzania." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-80722.
Full textOlandersson, Sandra, and Jeanette Fredsson. "Threats in Information Security : Beyond technical solutions. - Using Threat Tree Analysis." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3829.
Full textManinjwa, Prosecutor Mvikeli. "Managing an information security policy architecture : a technical documentation perspective." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1020757.
Full textStamm, Sidney L. "Anticipating and hardening the Web against socio-technical security attacks." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3344603.
Full textLong, Cheri Lanette. "A socio-technical perspective on information security knowledge and attitudes /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textPaja, Elda. "STS: a Security Requirements Engineering methodology for socio-technical Systems." Doctoral thesis, Università degli studi di Trento, 2014. https://hdl.handle.net/11572/368991.
Full textPaja, Elda. "STS: a Security Requirements Engineering methodology for socio-technical Systems." Doctoral thesis, University of Trento, 2014. http://eprints-phd.biblio.unitn.it/1312/1/Paja-May2014.pdf.
Full textTarimo, Charles N. "ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1354.
Full textNard, Karen D. "Improving Information Systems Security Through Management Practices: A Non-technical Approach." NSUWorks, 2004. http://nsuworks.nova.edu/gscis_etd/745.
Full textPeiris, Wedige. "A socio-technical security risk mitigation methodology for information systems access." Thesis, Curtin University, 2014. http://hdl.handle.net/20.500.11937/2596.
Full textMenzel, Michael [Verfasser], and Christoph [Akademischer Betreuer] Meinel. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies / Michael Menzel. Betreuer: Christoph Meinel." Potsdam : Universitätsbibliothek der Universität Potsdam, 2012. http://d-nb.info/1022242229/34.
Full textGwozd, Ryszard. "Security of information systems, what technical solutions exist and what is needed." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ59323.pdf.
Full textCharif, Abdul Rahim. "Contextualizing Secure Information System Design: A Socio-Technical Approach." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/999.
Full textGreen, Benjamin. "Augmenting ICS cyber security risk assessments : assimilation of socio-technical characteristics and constructs." Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/126782/.
Full textWaly, Nesren Saleh. "Organisational information security management : the impact of training and awareness : evaluating the socio-technical impact on organisational information security policy management." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5666.
Full textChaula, Job Asheri. "A Socio-technical Analysis of Information Systems Security Assurance : A Case Study for Effective Assurance." Doctoral thesis, Kista : Department of Computer and Systems Sciences, Stockholm University/KTH DSV, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-1350.
Full textDrake, Paul David. "Communicative action in information security systems : an application of social theory in a technical domain." Thesis, University of Hull, 2005. http://hydra.hull.ac.uk/resources/hull:5623.
Full textMwakalinga, Jeffy. "A Framework for Adaptive Information Security Systems : A Holistic Investigation." Doctoral thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33805.
Full textGoode, Jodi. "Comparing Training Methodologies on Employee’s Cybersecurity Countermeasures Awareness and Skills in Traditional vs. Socio-Technical Programs." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1045.
Full textTakacs, Gergely. "Integration of CTI into security management." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74246.
Full textJacobsen, Katja Lindskov. "Rethinking the 'bio' of biopolitical security through humanitarian experimentation : the making of bodily boundaries and technical authority." Thesis, Lancaster University, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.660116.
Full textLundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.
Full textvan, Deursen Hazelhoff Roelfze Nicole. "HI-Risk : a socio-technical method for the identification and monitoring of healthcare information security risks in the information society." Thesis, Edinburgh Napier University, 2014. http://researchrepository.napier.ac.uk/Output/6921.
Full textNakakeeto, Gertrude. "The Impact of Technical Measures on Agricultural Trade: A Case of Uganda, Senegal, and Mali."Improving Food Security through Agricultural Trade"." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/34887.
Full textEmilsson, Daniel. "Småföretags arbetssätt med informationssäkerhet : En kvalitativ studie av utvalda företag." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17362.
Full textMorgner, Philipp [Verfasser], Zinaida [Akademischer Betreuer] Benenson, Felix [Gutachter] Freiling, and Christina [Gutachter] Pöpper. "Security and Privacy in the Internet of Things: Technical and Economic Perspectives / Philipp Morgner ; Gutachter: Felix Freiling, Christina Pöpper ; Betreuer: Zinaida Benenson." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2019. http://d-nb.info/1189424843/34.
Full textHallett, Austin P. "Finding Profitability of Technical Trading Rules in Emerging Market Exchange Traded Funds." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/375.
Full textDibba, Lamin [Verfasser], and Manfred [Akademischer Betreuer] Zeller. "Impact evaluation of improved rice varieties and farmer training on food security and technical efficiency in The Gambia / Lamin Dibba. Betreuer: Manfred Zeller." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2016. http://d-nb.info/1100055436/34.
Full textRibas, Carlos Eduardo. "Sistema de gestão de segurança da informação em organizações da área da saúde." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/5/5160/tde-27092010-145036/.
Full textDepuru, Soma Shekara. "Modeling, Detection, and Prevention of Electricity Theft for Enhanced Performance and Security of Power Grid." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341522225.
Full textAl, Smadi Duha. "Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.
Full textKane, Ousmane. "Development of Agriculture value chains as an asset for the sustainable development and food security: the case of the improvement of agricultural technical and vocational education in Senegal." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/104451.
Full textKlaar, Jonathan, and Allen Masak. "Webbläsares inbyggda lösenordshanterare : Faktorer som påverkar privatpersoners användning/ickeanvändning av webbläsares inbyggda lösenordshanterare." Thesis, Jönköping University, JTH, Avdelningen för datateknik och informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-53217.
Full textShade, Molly. "The Burner Project: Privacy and Social Control in a Networked World." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801891/.
Full textShackelford, Philip Clayton. "Fighting for Air: Cold War Reorganization and the U.S. Air Force Security Service, 1945-1952." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461432022.
Full textKonečný, Pavel. "Fyzická bezpečnost v průmyslovém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318618.
Full textТимошенко, Є. М. "Технічний захист інформації на підприємстві". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24855.
Full textСович, Вікторія Іванівна. "Оцінювання ризиків складних організаційно-технічних систем за вимогами ДСТУ ISO 31010". Магістерська робота, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19547.
Full textMuzeau, Jean-Pierre. "Modele de l'influence d'imperfections sur la securite des structures metalliques en comportement non lineaire : comparaison de reglements internationaux." Clermont-Ferrand 2, 1987. http://www.theses.fr/1987CLF2E378.
Full textShackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.
Full textLachenal, Perrine. "Self-défense féminine dans le Caire en révolution : Techniques du genre et jeux de violence." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM3005.
Full textСідлецький, Є. В. "Комплексна система захисту інформації автоматизованої системи 3 класу системи електронного документообігу центру надання адміністративних послуг". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24977.
Full textPenteado, Marco Antonio de Barros. "Uma avaliação estatística da análise gráfica no mercado de ações brasileiro à luz da teoria dos mercados eficientes e das finanças comportamentais." Universidade de São Paulo, 2003. http://www.teses.usp.br/teses/disponiveis/12/12139/tde-03032009-103053/.
Full textКотляров, В. О. "Удосконалення нормативного забезпечення виготовлення упаковки для кормів домашніх тварин. Розробка технічних умов". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72540.
Full text