Listing 1 - 10 of 2922 | << page >> |
Sort by
|
Choose an application
Choose an application
Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
Choose an application
Security systems. --- Police --- Security systems
Choose an application
An open access book with "chapters" containing videos, links to related resources, blogs and websites.
Choose an application
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.
Choose an application
Superseded by IEEE 692-1997 Criteria are provided for the design of an integrated security system for nuclear power generating stations. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for securityrelated detection, surveillance, access control, communication, and data acquisition.
Choose an application
The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.
Choose an application
A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device's identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=68).
Listing 1 - 10 of 2922 | << page >> |
Sort by
|