Listing 1 - 10 of 117 | << page >> |
Sort by
|
Choose an application
This updated and expanded new edition continues its unique approach and engrossing exploration of the elements of residential burglary. Presented in five parts, the first is concerned with what is on a burglar's mind when he or she considers whether to commit a burglary and which house to choose. The second part is concerned with time and the opportunities and limits it places on both burglar and victim, while the third section probes how burglaries are fit into space and the importance of perception of space in the burglary process. The fourth section describes how burglars select a home to b
Choose an application
Vulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer,
Security systems --- Security measures --- Burglary protection --- Evaluation.
Choose an application
Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector is a clear, concise, and practical resource for drafting effective, legally defensible security policies. Presented in a clear, step-by-step style that can be tailored to fit the smallest organization to the largest, the book offers the strategies needed for reducing risk through solid policy construction. It is the first book available that provides a step-by-step guide to basic security policy construction, along with helpful hints on how to draft a document that conveys exactly what is intended. The book explores common policy creation pitfalls and how to avoid them, outlining proven methods for implementing and disseminating effective policies throughout any organization. Discussing the core security and safety policies that no organization should operate without, the book covers common types of policies, along with the pros and cons of different policy-making methodologies. It is a one-stop reference on functional security policy-making for organizational leaders.
Security systems --- Planning. --- Management. --- Security measures --- Burglary protection
Choose an application
Corporations --- Security systems --- Security measures. --- Management. --- Security measures --- Burglary protection
Choose an application
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks. The scope is limited to key operated mechanical locks, thus ke
Locks and keys --- Keys --- Locking devices --- Burglary protection --- Fasteners --- Hardware
Choose an application
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book a
Security systems. --- Burglary protection. --- Building security --- Burglary --- Housing security --- Protection against burglary --- Residential security --- Security measures --- Prevention --- Crime prevention --- Burglary protection
Choose an application
Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both infor
Risk management. --- Security systems --- Evaluation. --- Security measures --- Burglary protection --- Insurance --- Management --- Information Technology --- General and Others
Choose an application
The comprehensive guide for identifying needs, specification and installation of emergency and security lighting systems.Emergency and Security Lighting is a thoroughly practical guide for lighting installers and electricians, intruder alarm and fire alarm installers, and managers with security and health and safety responsibilities. Covering the latest workplace directives, building and fire regulations, it is essential reading. The text is concise and accessible and includes the latest technical developments such as low-energy systems for extended period lighting.This
Emergency lighting --- Security systems --- Security measures --- Burglary protection --- Lighting, Emergency --- Lighting
Choose an application
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area. The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1),
Burglar alarms. --- Alarms, Burglar --- Burglary protection --- Electric alarms --- Electronic alarm systems
Choose an application
Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection, and human activity classification. This detailed book presents the fundamental concepts practitioners need to understand, including electromagnetic wave propagation in free space and in media, antenna theory, and the principles of receiver design. You find in-depth discussions on the interactions of electromagnetic waves with human tissues, the atmosphere and various building and clothing materials. This timely volume explores recently developed detection techniques, such as micro-Doppler radar signatures and correlation radiometry. --
Security systems --- Microwave remote sensing. --- Remote sensing --- Security measures --- Burglary protection --- Remote sensing.
Listing 1 - 10 of 117 | << page >> |
Sort by
|