Skip to main content

Books in Electronic security

11-20 of 34 results in All results

Security Technology Convergence Insights

  • 1st Edition
  • April 1, 2015
  • Ray Bernard
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 0 0 1 - 1
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.

Integrated Security Systems Design

  • 2nd Edition
  • September 3, 2014
  • Thomas L. Norman
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 0 2 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 1 9 3 - 6
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible.The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.

Online Security for the Business Traveler

  • 1st Edition
  • August 23, 2014
  • Deborah Gonzalez
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 6 9 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 2 0 1 - 8
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.

Defence Electronics

  • 1st Edition
  • May 15, 2014
  • Ray Tricker
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 6 5 5 1 - 6
Defence Electronics: Standards and Quality Assurance is a reference manual for the standards and organizations involved in quality assurance in the general field of defense electronics. The book is comprised of 14 chapters that are organized into six parts. The text first covers the quality systems and control of defense electronics, and then proceeds to tackling the certification and purchasing of electronic components. The third part discusses the defense sales and quality in the U.K. Part Four discusses the North Atlantic Treaty Organization (NATO) structure and standards. The next part covers the application and availability of the global electronic defenses standards. The last part deals with the European defense market. The book will be of great use to individuals involved in the manufacturing and selling of defense related products. Military officials and employees of defense related agencies will also benefit from the text.

The Science and Technology of Counterterrorism

  • 1st Edition
  • February 26, 2014
  • Carl Young
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 0 5 6 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 0 6 1 - 6
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics. The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.

CCTV

  • 3rd Edition
  • September 18, 2013
  • Vlado Damjanovski
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 0 4 5 5 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 6 0 7 - 8
The new edition of CCTV, a high-level professional reference, is expanded to cover all video compression techniques used in the ever-increasing assortment of digital video recorders (DVRs) available on the market today. In addition to demystifying DVR technology, the third edition also clarifies the technology of data networking and explains various compression techniques. Along with all this, the book retains the particulars that made the previous editions convenient and valuable, including details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design.

Bring Your Own Device (BYOD) to Work

  • 1st Edition
  • March 25, 2013
  • Bob Hayes + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 1 6 1 0 - 8
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.

Security and Loss Prevention

  • 6th Edition
  • January 18, 2013
  • Philip Purpura
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 7 8 4 7 - 2
The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book’s backbone, and Philip Purpura continues this strong effort with new sidebars and text boxes presenting actual security challenges from real-life situations. Globally recognized and on the ASIS International Certified Protection Professional reading list, the sixth edition of Security and Loss Prevention enhances its position in the market as a comprehensive, interdisciplinary, and up-to-date treatment of the area, connecting the public and private sector and the worlds of physical security and technological security. Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource encompassing the breadth and depth of considerations involved when implementing general loss prevention concepts and security programs within an organization.

Wireless Reconnaissance in Penetration Testing

  • 1st Edition
  • October 29, 2012
  • Matthew Neely + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 7 3 1 - 2
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 7 3 2 - 9
In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.

Electronic Access Control

  • 1st Edition
  • September 26, 2011
  • Thomas L. Norman
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 2 0 2 9 - 7
Electronic Access Control introduces the fundamentals of electronic access control through clear, well-illustrated explanations. Access Control Systems are difficult to learn and even harder to master due to the different ways in which manufacturers approach the subject and the myriad complications associated with doors, door frames, hardware, and electrified locks. This book consolidates this information, covering a comprehensive yet easy-to-read list of subjects that every Access Control System Designer, Installer, Maintenance Tech or Project Manager needs to know in order to develop quality and profitable Alarm/Access Control System installations. Within these pages, Thomas L. Norman – a master at electronic security and risk management consulting and author of the industry reference manual for the design of Integrated Security Systems – describes the full range of EAC devices (credentials, readers, locks, sensors, wiring, and computers), showing how they work, and how they are installed.