Listing 1 - 10 of 3161 | << page >> |
Sort by
|
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
This book is a compilation of empirical studies focusing on security practices and discourses in the province of Buenos Aires, Argentina. It explores the dynamics of various actors and institutions involved in public and private security measures from 2010 to 2018. Utilizing qualitative methodologies, the authors aim to provide insights into the social and political aspects of security, including the roles of police and other agents. The work is intended for scholars, students, and general readers interested in sociological studies of violence, security, and public conflict. It includes case studies and an interview with a prominent academic in the field, contributing to broader political reflections on these issues.
Buenos Aires (Argentina) --- Security systems. --- Buenos Aires (Argentina). --- Security systems
Choose an application
Control systems play a vital role in the advancement of many engineering and science fields. The increasing demand for safety and reliability has led to the development of fault diagnosis (FD) and fault-tolerant control (FTC) systems, which play a paramount role in safety-critical systems, such as water distribution networks, aircrafts, spacecrafts, chemical, and biochemical plants, and nuclear power plants, where even minor faults can lead to catastrophic consequences. FD has primary importance since it enables online monitoring processes, allowing for the implementation of so-called active FTC systems. In an active FTC system, the FD module determines which component exhibits abnormal behavior and feeds this information to the controller. Based on this information, it redistributes or adapts the control law to maintain stability with a controlled degradation of the system's performance. Therefore, there is an increasing interest in creating new techniques or adapting the existing fault diagnosis and fault-tolerant methods to make the above-mentioned systems secure. At the same time, control theory is developing ceaselessly, and new theoretical results are continually being discovered that can be used in innovative fault diagnosis and fault-tolerant control techniques.
Choose an application
Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer,
Security systems --- Security measures --- Burglary protection --- Evaluation.
Choose an application
Security systems --- Business enterprises --- Management. --- Security measures.
Choose an application
Annotation
Electronic security systems. --- Electronic locking devices.
Choose an application
The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for
Private security services --- Security systems --- Management.
Choose an application
Choose an application
Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector is a clear, concise, and practical resource for drafting effective, legally defensible security policies. Presented in a clear, step-by-step style that can be tailored to fit the smallest organization to the largest, the book offers the strategies needed for reducing risk through solid policy construction. It is the first book available that provides a step-by-step guide to basic security policy construction, along with helpful hints on how to draft a document that conveys exactly what is intended. The book explores common policy creation pitfalls and how to avoid them, outlining proven methods for implementing and disseminating effective policies throughout any organization. Discussing the core security and safety policies that no organization should operate without, the book covers common types of policies, along with the pros and cons of different policy-making methodologies. It is a one-stop reference on functional security policy-making for organizational leaders.
Security systems --- Planning. --- Management. --- Security measures --- Burglary protection
Choose an application
This research report presents the findings of a broad survey of corporate security programs conducted by the Security Executive Council's Security Leadership Research Institute (SLRI). The researchers' objective was to benchmark the state of the security industry in terms of organizational structure, budget, staff resources, board-level risk concerns, program drivers, and services provided. The level of responsibility each respondent reported for a list of 30 security programs or services is also compared across several organizational categories. This report can be used by security p
Organization theory --- Corporations --- Security measures. --- Industrial management. --- Security systems.
Listing 1 - 10 of 3161 | << page >> |
Sort by
|