Industrial security : managing security in the 21st century /

"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Russell, David L., 1942-
Άλλοι συγγραφείς: Arlow, Pieter
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken, New Jersey : John Wiley & Sons, 2015.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06056nam a2200853 4500
001 ocn904144526
003 OCoLC
005 20170124072556.5
006 m o d
007 cr |||||||||||
008 150225s2015 nju ob 001 0 eng
010 |a  2015007925 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d N$T  |d DG1  |d EBLCP  |d OCLCF  |d IDEBK  |d E7B  |d CDX  |d RECBK  |d YDXCP  |d DEBSZ  |d COO  |d UMI  |d OCLCQ  |d DEBBG  |d CCO  |d GrThAP 
019 |a 928627978  |a 959872662 
020 |a 9781119028406  |q (Adobe PDF) 
020 |a 111902840X  |q (Adobe PDF) 
020 |a 9781119028420  |q (ePub) 
020 |a 1119028426  |q (ePub) 
020 |a 9781118194638  |q (hardback) 
020 |a 1118194632  |q (hardback) 
020 |a 9781119028437 
020 |a 1119028434 
029 1 |a CHBIS  |b 010442480 
029 1 |a CHVBK  |b 334090040 
029 1 |a DEBBG  |b BV042739920 
029 1 |a DEBSZ  |b 431874689 
029 1 |a DEBSZ  |b 44947741X 
029 1 |a DEBSZ  |b 453329071 
029 1 |a GBVCP  |b 823528839 
029 1 |a NZ1  |b 16078933 
029 1 |a DEBBG  |b BV043616051 
029 1 |a DEBBG  |b BV043397568 
035 |a (OCoLC)904144526  |z (OCoLC)928627978  |z (OCoLC)959872662 
037 |a CL0500000669  |b Safari Books Online 
042 |a pcc 
050 0 0 |a HD61.5 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 0 |a 658.4/73  |2 23 
084 |a POL037000  |2 bisacsh 
049 |a MAIN 
100 1 |a Russell, David L.,  |d 1942- 
245 1 0 |a Industrial security :  |b managing security in the 21st century /  |c David L. Russell, PE., Pieter C. Arlow. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons,  |c 2015. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--  |c Provided by publisher. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record and CIP data provided by publisher. 
505 0 |a Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment 
505 8 |a Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades 
505 8 |a Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems 
505 8 |a Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction 
505 8 |a FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building 
650 0 |a Industries  |x Security measures. 
650 0 |a Industrial safety. 
650 0 |a Risk management. 
650 0 |a Security systems. 
650 0 |a Terrorism  |x Prevention. 
650 7 |a POLITICAL SCIENCE  |x Political Freedom & Security  |x Terrorism.  |2 bisacsh 
650 7 |a Industrial safety.  |2 fast  |0 (OCoLC)fst00971664 
650 7 |a Industries  |x Security measures.  |2 fast  |0 (OCoLC)fst00971955 
650 7 |a Risk management.  |2 fast  |0 (OCoLC)fst01098164 
650 7 |a Security systems.  |2 fast  |0 (OCoLC)fst01110883 
650 7 |a Terrorism  |x Prevention.  |2 fast  |0 (OCoLC)fst01148123 
655 4 |a Electronic books. 
700 1 |a Arlow, Pieter. 
776 0 8 |i Print version:  |a Russell, David L., 1942-  |t Industrial security.  |d Hoboken, New Jersey : John Wiley & Sons Inc., 2015  |z 9781118194638  |w (DLC) 2014043896 
856 4 0 |u https://doi.org/10.1002/9781119028437  |z Full Text via HEAL-Link 
994 |a 92  |b DG1