Listing 1 - 10 of 205 | << page >> |
Sort by
|
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
The analytical report was prepared by the results of the research work "Donbass in the information security system of the state: regional distinctions, external challenges, tools of struggle against anti-Ukrainian propaganda", which was performed at the I.F. Kuras Institute of Political and Ethnic Studies of the National Academy of Sciences of Ukraine in 2015. As a result of a project completion, the regional distinctions of Donbass, external challenges, tools of struggle against anti-Ukrainian propaganda in the information security system of the state were examined.
Choose an application
Modern biometrics delivers an enhanced level of security by means of a ""proof of property"". The design and deployment of a biometric system, however, hide many pitfalls, which, when underestimated, can lead to major security weaknesses and privacy threats. Issues of concern include biometric identity theft and privacy invasion because of the strong connection between a user and his identity. This book showcases a collection of comprehensive references on the advances of biometric security technology. It compiles a total of fourteen articles, all contributed by thirty-two eminent researchers
Biometric identification. --- Security systems. --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- Security measures --- Burglary protection
Choose an application
"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
Industries --- Industrial safety. --- Risk management. --- Security systems. --- Terrorism --- Security measures. --- Prevention.
Choose an application
Security systems --- Business enterprises --- Management. --- Security measures. --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Security measures --- Burglary protection
Choose an application
"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
International relations. Foreign policy --- Polemology --- anno 2000-2099 --- Industrial safety --- Risk management --- Security systems --- Terrorism --- Prevention --- Industries --- Security measures
Choose an application
Prepared by the Building Rating Security Committee (BRSC) of the Architectural Engineering Institute of ASCE. This Manual of Practice presents a building security rating system (BSRS) that can be used to improve the security of buildings and occupants subjected to violent attack. The BSRS offers a comprehensive method to account for threats and hazards, consequences and impacts, and vulnerability and mitigation as related to building security. In doing so, it provides a quantifiable measure of building security status. Multidisciplinary in scope, the BSRS uses a rigorous risk-based system that first identifies physical and operational criteria that enhance building security and then evaluates the extent to which a building meets these criteria. The BSRS has three elements: building classification, security countermeasures, and a rating system. MOP 128 presents the risk-based tools for classifying a building by its hazards and consequences, as well as identifying vulnerabilities to be addressed with security countermeasures. The rating system designates a building's security level in five categories: rated, bronze, silver, gold, and platinum. Appendixes present extensive commentary on the factors for building classification and security countermeasures for each level of the rating system. Ten years in development, the BSRS is now publicly available for the first time. Architects, designers, structural engineers, planners, building owners, security professionals, and government officials will rely on MOP 128 as the essential reference for implementing improved, cost-effective building security.
Buildings --- Security systems --- Structural safety --- Building systems --- Ratings --- Risk management --- Building design --- Government buildings --- Architectural engineering --- Security measures --- Evaluation.
Choose an application
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiologic
Terrorism --- Computer security. --- Risk management. --- Security systems. --- Prevention. --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Security measures --- Burglary protection --- Insurance --- Management --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop t
Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities. Teaches ISO/IEC 27000 best practices on information security management Discusses risks and controls within the context of an overall information security management system (ISMS) Provides foundational information for experienced professionals as well as those new to the industry.
Computer Science --- Engineering & Applied Sciences --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 10 of 205 | << page >> |
Sort by
|