Narrow your search

Library

KU Leuven (104)

Odisee (97)

UCLL (96)

VIVES (96)

Thomas More Kempen (95)

Thomas More Mechelen (95)

ULiège (88)

ULB (86)

LUCA School of Arts (30)

UGent (26)

More...

Resource type

book (117)

periodical (2)


Language

English (114)

Dutch (2)

French (2)

Italian (1)


Year
From To Submit

2010 (119)

Listing 1 - 10 of 119 << page
of 12
>>
Sort by

Book
Proceedings 44th Annual 2010 International Carnahan Conference on Security Technology
Authors: ---
ISBN: 1424474027 1424474035 9781424474028 Year: 2010 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Security systems


Book
IEEE Std 692-2010 (Revision of IEEE Std 692-1997) - Redline : IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations - Redline
Author:
ISBN: 0738186996 Year: 2010 Publisher: New York, USA : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.


Book
Beveilig uw woning elektronisch
Author:
ISBN: 9781616277826 Year: 2010 Publisher: Lembeek Geert Van Cauwenbergh

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
IEEE Std 692-2010 (Revision of IEEE Std 692-1997): : IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations
Author:
ISBN: 0738162019 Year: 2010 Publisher: New York, NY, USA : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Criteria are provided for the design of an integrated security system for nuclear power generating stations. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.


Book
How to disappear : erase your digital footprint, leave false trails and vanish without a trace.
Authors: ---
ISBN: 9781599219776 Year: 2010 Publisher: Guilford Lyons press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Force Protection Surveillance System : algorithm and performance
Authors: ---
Year: 2010 Publisher: Adelphi, MD : Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Metrics and methods for security risk management
Author:
ISBN: 1282700316 9786612700316 1856179796 1856179788 9781856179782 9781856179799 9781282700314 Year: 2010 Publisher: Amsterdam ; Boston : Syngress/Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both infor


Book
Risk analysis and security countermeasure selection.
Author:
ISBN: 9781420078701 Year: 2010 Publisher: Boca Raton CRC

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Designing out crime from products and systems
Authors: ---
ISBN: 1626373329 1281856096 9786611856090 9781626373327 Year: 2010 Publisher: Boulder, Colorado ; London, [England] : Lynne Rienner Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
China's cyberwarfare capability
Author:
ISBN: 1616714174 9781616714178 9781617612183 1617612189 Year: 2010 Publisher: New York : Nova Science Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.

Listing 1 - 10 of 119 << page
of 12
>>
Sort by