Journal articles on the topic 'Security technician'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security technician.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
MURILLO, DE OLIVEIRA DIAS. "TEACHING MATERIALS ON SECURITY TECHNICIAN BUSINESS NEGOTIATION." GPH-International Journal of Educational Research 06, no. 08 (2023): 12–27. https://doi.org/10.5281/zenodo.8367744.
Full textCastillo Escalante, Irma Cecilia, and Adán Guillermo Ramírez García. "Curricular Innovation for Food Security." Education Sciences 13, no. 4 (2023): 374. http://dx.doi.org/10.3390/educsci13040374.
Full textAngelia Merdiyanti, Nabila Dwi Lestari, and Yulius Jatmiko Nuryatno. "ANALISIS BEBAN KERJA KARYAWAN PADA DEPARTEMEN AFTERSALES KIA HARAPAN INDAH." Journal of Social and Economics Research 5, no. 2 (2023): 318–33. http://dx.doi.org/10.54783/jser.v5i2.135.
Full textRushikesh, Patil. "A Review: Artificial Intelligence and Expert Systems for Cyber Security Authors." BOHR International Journal of Engineering 1, no. 1 (2022): 53–57. http://dx.doi.org/10.54646/bije.010.
Full textRushikesh, Patil. "A review: Artificial intelligence and expert systems for cyber security." BOHR International Journal of Engineering 1, no. 1 (2022): 52–56. http://dx.doi.org/10.54646/bije.2022.10.
Full textKazarinoff, Peter. "Letter From Editor JATE." Journal of Advanced Technological Education 1, no. 1 (2022): 1–2. https://doi.org/10.5281/zenodo.6366329.
Full textDr., Vinod Varma Vegesna. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 5, no. 1 (2023): 85–102. https://doi.org/10.38177/AJBSR.2023.5110.
Full textCARTER, CELESTE. "Invited Letter: Welcome to the Journal of Advanced Technological Education." Journal of Advanced Technological Education 1, no. 1 (2022): 3. https://doi.org/10.5281/zenodo.6363578.
Full textVegesna, Dr Vinod Varma. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 05, no. 01 (2023): 85–102. http://dx.doi.org/10.38177/ajbsr.2023.5110.
Full textChoirunisa, Ristyna. "Hearing Loss And Health Complaints In Technicians Air Skadron 3 Iswahjudi Airport And Its Association With Aircraft Noise." JURNAL KESEHATAN LINGKUNGAN 11, no. 1 (2019): 61. http://dx.doi.org/10.20473/jkl.v11i1.2019.61-68.
Full textAhmed, Zainab. "Role of Augmented Reality in Improving Remote Technical Support in Nigeria." International Journal of Technology and Systems 9, no. 3 (2024): 1–11. http://dx.doi.org/10.47604/ijts.2812.
Full textLopes, Luiz Patricio, and Sandra Márcia Tietz Marques. "Cães operacionais no sistema prisional do Rio Grande do Sul, Brasil." Revista Agraria Academica 5, no. 2 (2022): 11–25. http://dx.doi.org/10.32406/v5n2/2022/11-25/agrariacad.
Full textAlharbi, Alhumaidi Mohammed, Waleed Khalaf Alhafy, Mohammed Biday Alharbi, et al. "The importance of health information technicians in the transformation of digital health." International journal of health sciences 8, S1 (2024): 1468–83. http://dx.doi.org/10.53730/ijhs.v8ns1.15292.
Full textCooper, K. "Neutralization of Osmium Tetroxide in Case of Accidental Spillage and for Disposal." Microscopy Today 2, no. 7 (1994): 3–5. http://dx.doi.org/10.1017/s1551929500066633.
Full textQORDJA, Florian, and Sulejman HAXHI. "The role of the radiotherapy technician during prostate radiation treatment." Medicus 7, no. 2 (2023): 14–23. http://dx.doi.org/10.58944/zxbh5669.
Full textYacob, Azliza, Noraida Hj Ali, Aimi Dalila Roslim, et al. "EMPIRICAL ANALYSIS OF A UTAUT-BASED DIGITAL LEARNING SECURITY MODEL IN HIGHER EDUCATION." International Journal of Modern Education 7, no. 24 (2025): 1292–303. https://doi.org/10.35631/ijmoe.724091.
Full textHarefa, Lusi, and Sasa Ani Arnomo. "RANCANG BANGUN SISTEM INFORMASI PELAPORAN MAINTENANCE MESIN PT SCHNEIDER." Computer and Science Industrial Engineering (COMASIE) 10, no. 1 (2024): 93–101. https://doi.org/10.33884/comasiejournal.v10i1.8425.
Full textAguirre Vicuña, David. "Prevención del Delito desde la óptica del Agente de Seguridad Penitenciaria basado en la formación dual y la vinculación con la sociedad." Atenas Revista Científica Técnica y Tecnológica 1, no. 1 (2021): 60–73. http://dx.doi.org/10.36500/atenas.1.000.
Full textAguirre Vicuña, David. "Prevención del Delito desde la óptica del Agente de Seguridad Penitenciaria basado en la formación dual y la vinculación con la sociedad." Atenas Revista Científica Técnica y Tecnológica 1, no. 1 (2021): 60–73. http://dx.doi.org/10.36500/atenas.1.001.
Full textAnggoro, Rifqi Lucky, and Walid Jumlad. "Analysis of the Reliability of Security Check Point Equipment in Inspecting Passenger Luggage at Juanda International Airport, Surabaya." JETISH: Journal of Education Technology Information Social Sciences and Health 2, no. 1 (2023): 276–91. http://dx.doi.org/10.57235/jetish.v2i1.366.
Full textTsang, Ton, and Cheung Yip Kan. "Circuit Break Connect Monitoring to 5G Mobile Application." International Journal of Computer Science and Information Technology 13, no. 5 (2021): 59–74. http://dx.doi.org/10.5121/ijcsit.2021.13505.
Full textSiconolfi, Richard M. "A Toxicologist's Viewpoint of the Quality of Computer-Captured Data and Data Audits." Journal of the American College of Toxicology 8, no. 2 (1989): 323–31. http://dx.doi.org/10.3109/10915818909019557.
Full textGibler, Brian, Grace Hayes, Fred Raleigh, Barbara Levenson, Sheryl Heber, and Ann Tham. "Forensic Psychiatric Pharmacy Practice at Atascadero State Hospital." Journal of Pharmacy Practice 9, no. 4 (1996): 222–28. http://dx.doi.org/10.1177/089719009600900403.
Full textDilmurodov, G'olibbek Sobirjon o'g'li. "BURG'ILASH ISHLARINI BAJARISHDA SANOAT XAVFSIZLIGI." Innovative Development in Educational Activities 2, no. 8 (2023): 260–65. https://doi.org/10.5281/zenodo.7884778.
Full textGustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.
Full textNakanishi, Yuko, Kibeum Kim, Yavuz Ulusoy, and Andrew Bata. "Assessing Emergency Preparedness of Transit Agencies: Focus on Performance Indicators." Transportation Research Record: Journal of the Transportation Research Board 1822, no. 1 (2003): 24–32. http://dx.doi.org/10.3141/1822-04.
Full textAl-Ansary, Mohammad Yaqub, Mohammad Habibur Rahman, Samena Akter Kakuli, Mohammad Feroz Kabir, and Mohammad Ershad Ali. "Association between BMI and plantar fasciitis among hospital staff in a selected hospital of Dhaka city." International Journal Of Community Medicine And Public Health 10, no. 4 (2023): 1298–301. http://dx.doi.org/10.18203/2394-6040.ijcmph20230903.
Full textPutti, Nandan, Asmath Qureshi, Latha Sarma, and Mohit Chilana KA. "Monitoring of pulmonary function in people dwelling and working in and near cement factory area." Journal of Medical and Scientific Research 3, no. 1 (2015): 33–36. http://dx.doi.org/10.17727/jmsr.2015/3-6.
Full textMerah, A. "A case study of foundation failure of a residential building: From diagnosis to reparation." Journal of Building Materials and Structures 8, no. 1 (2021): 9–18. http://dx.doi.org/10.34118/jbms.v8i1.772.
Full textParameshwarappa Rajendra Patel, Gowrav M P, Borra Vamsi, and Hemanth kumar S. "A Review on Modern Drug Packaging in Pharmaceutical Industries." International Journal of Research in Pharmaceutical Sciences 11, no. 2 (2020): 1486–92. http://dx.doi.org/10.26452/ijrps.v11i2.2022.
Full textAhmed, Merah. "A case study of foundation failure of a residential building: From diagnosis to reparation." Journal of Building Materials and Structures 8, no. 1 (2020): 9–18. https://doi.org/10.5281/zenodo.4281291.
Full textRasmila, Rasmila, and Dilla Nafasari. "Designing a Service Provision Website Using the Design Thinking Method." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 12, no. 2 (2024): 409–18. http://dx.doi.org/10.33558/piksel.v12i2.9972.
Full textDávila-Conn, Vanessa, Maribel Soto-Nava, Yanink N. Caro-Vega, et al. "Seroepidemiology of SARS-CoV-2 in healthcare personnel working at the largest tertiary COVID-19 referral hospitals in Mexico City." PLOS ONE 17, no. 3 (2022): e0264964. http://dx.doi.org/10.1371/journal.pone.0264964.
Full textCussans, Amelia. "Ecosia: Bringing a Greener Search Engine to the NHS." BJPsych Open 9, S1 (2023): S84. http://dx.doi.org/10.1192/bjo.2023.263.
Full textGarcia, Augusto C. F., Sandro V. Soares, Thiago C. Soares, Carlos R. M. Lima, Raimundo N. Lima Filho, and José B. S. O. A. Guerra. "Perceived Quality of Information System Support Service of an Education Institution and Its Relationship with the Users’ Characteristics." International Journal of Business and Management 19, no. 5 (2024): 57. http://dx.doi.org/10.5539/ijbm.v19n5p57.
Full textBloshchynskyi, Ihor. "Peculiarities of Professional Training of the us Border Patrol Special Operations Group’s Agents." Comparative Professional Pedagogy 7, no. 3 (2017): 42–48. http://dx.doi.org/10.1515/rpp-2017-0034.
Full textSrinivas, Adilapuram. "Unveiling Modern Authentication Strategies for Java APIs: Exploring OAuth 2.0, JWT, API Keys, and Basic Authentication." Journal of Scientific and Engineering Research 9, no. 9 (2022): 119–25. https://doi.org/10.5281/zenodo.14631323.
Full textMathew Sebastian. "Securing IoT devices: A comprehensive technical framework." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 334–40. https://doi.org/10.30574/wjarr.2025.26.2.1620.
Full textTalluri Durvasulu, Mohan Babu. "Security in Storage Area Networks: A Technical Overview." International Journal of Advances in Engineering and Management 7, no. 2 (2025): 368–76. https://doi.org/10.35629/5252-0702368376.
Full textSoundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.
Full textBRYANT, BRIAN. "Consultants with Military Background." International Oil Spill Conference Proceedings 2017, no. 1 (2017): 2017082. http://dx.doi.org/10.7901/2169-3358-2017.1.000082.
Full textRishabh Gupta. "Securing Distributed Systems in Government and Public Sector: A Technical Overview." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 441–50. https://doi.org/10.32628/cseit25112378.
Full textKoto, Tabrani, Basir Basir, and Riska Sri Handayani. "Analysis of Technical Training Needs for the Pioneer Battalion of Brimob Polda Metro Jaya in The Context of Securing The National Capital." International Journal of Social Service and Research 3, no. 11 (2023): 2834–41. http://dx.doi.org/10.46799/ijssr.v3i11.589.
Full textAdesina, Thomas Kehinde, and Ogunnowo Aderonke Adunola. "Perceived Effects of Sand Dredging on Livelihood Diversification of Artisanal Fisher Folks in Lagos State, Nigeria." Agricultura Tropica et Subtropica 50, no. 2 (2017): 71–79. http://dx.doi.org/10.1515/ats-2017-0008.
Full textMohit, Thodupunuri. "The Right Way to Manage SSL/TLS Certificates in Modern Applications and Infrastructure." European Journal of Advances in Engineering and Technology 11, no. 3 (2024): 30–37. https://doi.org/10.5281/zenodo.15607021.
Full textAbdullahi, Wada, Alhaji Idi Babate, and Ali Garba Jakwa. "Cloud Computing: Technical, Non-Technical and Security Issues." International Journal of Computer Applications Technology and Research 3, no. 3 (2014): 169–75. http://dx.doi.org/10.7753/ijcatr0303.1008.
Full textZhu, Quanyan. "Technical Committee on Security and Privacy [Technical Activities]." IEEE Control Systems 44, no. 2 (2024): 16–17. http://dx.doi.org/10.1109/mcs.2024.3358560.
Full textUffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.
Full textHoving, Per. "System security: The technical challenge." Computers & Security 5, no. 1 (1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.
Full textBhalla, Neelam. "Information Security: A Technical Review." IETE Technical Review 19, no. 1-2 (2002): 47–59. http://dx.doi.org/10.1080/02564602.2002.11417010.
Full text