Listing 1 - 10 of 119 | << page >> |
Sort by
|
Choose an application
Choose an application
The standard provides criteria for the design, testing, and maintenance of security system equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.
Choose an application
Choose an application
Criteria are provided for the design of an integrated security system for nuclear power generating stations. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.
Choose an application
Security (Psychology) --- Security systems --- Surveillance detection
Choose an application
Electronic security systems. --- Video surveillance --- Computer algorithms. --- Technological innovations.
Choose an application
Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both infor
Risk management. --- Security systems --- Evaluation. --- Security measures --- Burglary protection --- Insurance --- Management --- Information Technology --- General and Others
Choose an application
Business enterprises --- Computer security --- Office buildings --- Risk assessment --- Security systems --- Security measures
Choose an application
Security systems. --- Crime prevention. --- Crime --- Crime prevention --- Prevention of crime --- Public safety --- Security measures --- Burglary protection --- Prevention --- Government policy
Choose an application
The government of the People's Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China's capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.
Information warfare --- Cyberspace --- Computer networks --- Military art and science --- Space and time --- Computers --- Telematics --- Security measures. --- Prevention. --- Security measures --- China --- Military policy. --- Security systems --- Informationskrigsførelse --- Sikkerhedspolitik
Listing 1 - 10 of 119 | << page >> |
Sort by
|