Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
Security systems. --- Electronic security systems. --- Electronic apparatus and appliances --- Electronic systems --- Security systems --- Security measures --- Burglary protection
Choose an application
The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private.
Security systems. --- Communication --- Internal security. --- Security, Internal --- Insurgency --- Subversive activities --- Communication, Primitive --- Mass communication --- Sociology --- Security measures --- Burglary protection --- Security measures. --- Communication.
Choose an application
Security systems. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- Burglary protection --- Protection
Choose an application
Computer security. --- Security systems. --- Ports (Electronic computer system) --- Security measures --- Burglary protection --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Computer security. --- Security systems. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security measures --- Burglary protection --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
"Today's business owner is facing a new set of challenges to provide for a safe and secure business environment. But the prudent business owner has only to look to the professional security consultant for assistance in developing strategies to achieve that goal. This unique book provides the private investigator with the information to become a proactive partner with the business owner in enhancing the safety and security within the business. The text includes information pertaining to the legal ramifications of negligent security claims; how to ensure employees are whom they claim to be; optimum utilization of security personnel and electronic security devices and systems; development of relevant security-related policies and procedures; and supervision and management controls. The book's 34 chapters are written in a very clear and concise style and include such topics as: elements of premises liability and negligent security, inadequate security, adequate background investigations, qualifications of a security force, warehouse and cargo security, successful business marketing, armed or unarmed status, separating high-risk employees, workplace violence programs, officer training, preventing internal theft and fraud, employing subcontractors, home and personal safety, guard post orders, parking lot lighting, home security weaknesses, preparation for litigation, crisis management guidelines, convenience store security, protecting human assets, and developing a business safety and security plan"--
Business enterprises --- Private security services. --- Security consultants. --- Security systems. --- Security measures --- Burglary protection --- Consultants --- Security systems --- Private security services --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Police, Private --- Private military companies --- Security consultants --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures. --- E-books
Choose an application
Private security services. --- Corporations --- Security systems. --- Security measures. --- Security measures --- Burglary protection --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Security systems --- Police, Private --- Private military companies --- Security consultants
Choose an application
This book presents the proceedings of the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT. Presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021) Includes tracks on security and management, IoT devices and Internet computing, cyber physical systems and artificial intelligence Supports research directions in the topics of security in IoT, wearable IoT and real time applications of IoT.
Internet of things. --- Security systems. --- Security measures --- Burglary protection --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Cooperating objects (Computer systems). --- Telecommunication. --- Cyber-Physical Systems. --- Communications Engineering, Networks. --- Internet of Things. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers.
Computer security --- Computer security. --- Artificial intelligence --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Security systems. --- Cooperating objects (Computer systems). --- Science --- Security Science and Technology. --- Cyber-Physical Systems. --- Science and Technology Studies. --- Social aspects. --- Science and society --- Sociology of science --- Burglary protection
Choose an application
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information. Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need and opportunity to develop a coherent set of techniques to cope with the changing nature of the upcoming cyber-security challenges. These include evolving threats and new technological means to exploit vulnerabilities of cyber-physical systems that have direct socio-technical, societal and economic consequences for Europe and the world. We witness cyber-attacks on large scale infrastructures for energy, transport, healthcare systems and smart systems. The interplay between security and safety issues is now paramount and will be even more relevant in the future. The book collects contributions from a number of scientists in Europe and presents the results of several European Projects, as NeCS, SPARTA, E-CORRIDOR and C3ISP. It will be of value to industrial researchers, practitioners and engineers developing cyber-physical solutions, as well as academics and students in cyber-security, ICT, and smart technologies in general. .
Data protection. --- Computer crimes. --- Business information services. --- Security systems. --- Data and Information Security. --- Cybercrime. --- IT in Business. --- Security Science and Technology. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security measures --- Burglary protection --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Business --- Business enterprises --- Information services
Listing 1 - 10 of 18 | << page >> |
Sort by
|