Narrow your search
Listing 1 - 10 of 57 << page
of 6
>>
Sort by

Book
2004 38th Annual International Carnahan Conference on Security Technology
Author:
Year: 2004 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
2004 38th Annual International Carnahan Conference on Security Technology
Author:
Year: 2004 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
Electronic safety and soundness : securing finance in a new age
Authors: --- ---
ISBN: 082135759X 9786610084333 1280084332 141750059X Year: 2004 Publisher: Washington, DC : World Bank,


Periodical
The journal of physical security.
Author:
Year: 2004 Publisher: Argonne, IL : Vulnerability Assessment Team at Argonne National Laboratory

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Security Economy

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the market for security goods and services having expanded rapidly since 9/11, this study examines the potential costs of major disruptions, the trade-offs between tighter security and economic efficiency, and the implications of tighter security for privacy and other democratic liberties.

Handbook of loss prevention and crime prevention
Author:
ISBN: 1281014559 9786611014551 0080495214 9780080495217 0750674539 9781281014559 6611014551 Year: 2004 Publisher: Amsterdam Boston Elsevier Butterworth Heinemann

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information. This revised volume brings together the expertise of more than 40 security and crime prevention experts who provide practical information and advice. The Handbook continues to be the most comprehensive reference of its kind, with the Fourth Edition covering the latest on topics ranging from community-oriented

Security consulting
Author:
ISBN: 1281028495 9786611028497 0080516866 1417537035 9781417537037 9780080516868 0750677945 Year: 2004 Publisher: Amsterdam Boston Butterworth-Heinemann/Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption- which could bring any business to it's knees- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting

Bluetooth security
Authors: --- ---
ISBN: 1580538851 9781580538855 9781580535045 1580535046 Year: 2004 Publisher: Boston Artech House

Loading...
Export citation

Choose an application

Bookmark

Abstract

"This resource examine the most significant attacks on Bluetooth security mechanisms and their implementations, demonstrating how some of these known weaknesses can be avoided with appropriate defensive measures. The book presents concrete examples of how to design security solutions for some Bluetooth applications and products built on these applications. Professionals find real-world case studies including technical algorithms, mechanisms and protocols, and security architecture. These architectures offer valuable guidelines for use in building Bluetooth and non-Bluetooth-specific security mechanisms."--Jacket.

IT ethics handbook
Authors: ---
ISBN: 1281055905 9786611055905 0080478824 9780080478821 1931836140 9781931836142 9781281055903 6611055908 Year: 2004 Publisher: Rockland, MA. Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter

Check Point Next Generation with application intelligence security administration
Authors: ---
ISBN: 9781932266894 1932266895 1931836132 9781931836135 0080476449 9780080476445 9786611056353 1281056359 Year: 2004 Publisher: Rockland, Mass. : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features. Security professionals will buy, read, and keep this book because it will cover

Listing 1 - 10 of 57 << page
of 6
>>
Sort by