Listing 1 - 10 of 57 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Radioactive substances --- Nuclear facilities --- Nuclear industry --- Security systems --- Security measures --- Risk assessment
Choose an application
With the market for security goods and services having expanded rapidly since 9/11, this study examines the potential costs of major disruptions, the trade-offs between tighter security and economic efficiency, and the implications of tighter security for privacy and other democratic liberties.
Security systems -- Economic aspects. --- Security systems. --- Terrorism -- Prevention -- Economic aspects. --- Security systems --- Terrorism --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Economic aspects --- Prevention --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Security measures --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Burglary protection --- Economic aspects.
Choose an application
Security breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information. This revised volume brings together the expertise of more than 40 security and crime prevention experts who provide practical information and advice. The Handbook continues to be the most comprehensive reference of its kind, with the Fourth Edition covering the latest on topics ranging from community-oriented
Private security services. --- Security systems. --- Industries --- Crime prevention and architectural design. --- Burglary protection. --- Building security --- Burglary --- Housing security --- Protection against burglary --- Residential security --- Crime prevention --- Architectural design --- Industrial security measures --- Security measures --- Burglary protection --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Security systems --- Police, Private --- Private military companies --- Security consultants --- Security measures. --- Prevention
Choose an application
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption- which could bring any business to it's knees- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting
Security consultants --- Private security services --- Private security companies --- Private security industry --- Protection services, Private --- Security companies, Private --- Security industry, Private --- Security services, Private --- Crime prevention --- Security systems --- Police, Private --- Private military companies --- Consultants
Choose an application
"This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--Jacket.
Bluetooth technology --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Wireless communication systems --- Security measures. --- Protection --- Security measures
Choose an application
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter
Computer security. --- Computers --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Access control. --- Protection --- Security measures
Choose an application
This book focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features. Security professionals will buy, read, and keep this book because it will cover
Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer programs. --- Protection --- Security measures
Listing 1 - 10 of 57 | << page >> |
Sort by
|