Narrow your search

Library

ULiège (2922)

KU Leuven (2857)

ULB (2610)

VIVES (2603)

Thomas More Kempen (2602)

Odisee (2601)

Thomas More Mechelen (2598)

UCLL (2565)

UGent (1238)

KBC (910)

More...

Resource type

book (2848)

periodical (74)

digital (16)

dissertation (3)

article (1)


Language

English (2845)

French (49)

German (11)

Dutch (4)

Italian (2)

More...

Year
From To Submit

2025 (2)

2024 (51)

2023 (67)

2022 (99)

2021 (119)

More...
Listing 1 - 10 of 2922 << page
of 293
>>
Sort by

Book
Proceedings 44th Annual 2010 International Carnahan Conference on Security Technology
Authors: ---
ISBN: 1424474027 1424474035 9781424474028 Year: 2010 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
IEEE Std 692-2013 (Revision of IEEE Std 692-2010) - Redline : IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations - Redline
Author:
ISBN: 0738188085 Year: 2013 Publisher: [Place of publication not identified] : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.


Multi
Discovering the total cost of security to the enterprise : proven practices
Author:
ISBN: 132209764X 9781322097640 9780128009215 0128009217 9780128020807 0128020806 Year: 2015 Publisher: Oxfordshire, [England] ; Waltham, Massachusetts : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary


Book
2004 38th Annual International Carnahan Conference on Security Technology
Author:
Year: 2004 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
La police et ses auxiliaires particuliers : Informateurs, délateurs et agents provocateurs
Author:
ISBN: 1412374804 Year: 2011 Publisher: Chicoutimi, Quebec : J.-M. Tremblay,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Ubiquitous Surveillance
Author:
ISBN: 1607852721 Year: 2011 Publisher: [Place of publication not identified] : Open Humanities Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

An open access book with "chapters" containing videos, links to related resources, blogs and websites.


Book
Security Technology (SecTech), 2014 7th International Conference on
Author:
ISBN: 1479977756 1479977772 1479977764 Year: 2014 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology.


Book
IEEE Std 692-1986 : IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations
Author:
ISBN: 0738143987 Year: 1986 Publisher: New York, USA : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Superseded by IEEE 692-1997 Criteria are provided for the design of an integrated security system for nuclear power generating stations. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for securityrelated detection, surveillance, access control, communication, and data acquisition.


Book
IEEE Std 692-2010 (Revision of IEEE Std 692-1997) - Redline : IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations - Redline
Author:
ISBN: 0738186996 Year: 2010 Publisher: New York, USA : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.


Book
IEEE Std 802.1AR-2018 (Revision of IEEE Std 802.1AR-2009) - Redline : IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity - Redline
Author:
ISBN: 150445698X Year: 2018 Publisher: New York, New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device's identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=68).

Listing 1 - 10 of 2922 << page
of 293
>>
Sort by