Industrial security : managing security in the 21st century /
"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons,
2015.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn904144526 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 150225s2015 nju ob 001 0 eng | ||
010 | |a 2015007925 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d N$T |d DG1 |d EBLCP |d OCLCF |d IDEBK |d E7B |d CDX |d RECBK |d YDXCP |d DEBSZ |d COO |d UMI |d OCLCQ |d DEBBG |d CCO |d IDB |d LOA |d COCUF |d K6U |d CNNOR |d STF |d C6I |d LIP |d PIFAG |d FVL |d ZCU |d OCLCQ |d MERUC |d U3W |d D6H |d OCLCQ |d ICG |d VT2 |d OCLCQ |d G3B |d WYU |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d UX1 |d OCLCQ |d RDF |d OCLCQ |d SDF |d OCLCO |d OCLCQ |d INARC |d OCLCO | ||
019 | |a 928627978 |a 959872662 |a 961828067 |a 1055389088 |a 1066568016 |a 1100434984 |a 1101725106 |a 1103259832 |a 1105779893 |a 1124399840 |a 1148147635 |a 1391572344 | ||
020 | |a 9781119028406 |q (Adobe PDF) | ||
020 | |a 111902840X |q (Adobe PDF) | ||
020 | |a 9781119028420 |q (ePub) | ||
020 | |a 1119028426 |q (ePub) | ||
020 | |a 9781118194638 |q (hardback) | ||
020 | |a 1118194632 |q (hardback) | ||
020 | |a 9781119028437 | ||
020 | |a 1119028434 | ||
029 | 1 | |a AU@ |b 000056073293 | |
029 | 1 | |a AU@ |b 000066260779 | |
029 | 1 | |a CHBIS |b 010442480 | |
029 | 1 | |a CHNEW |b 000944050 | |
029 | 1 | |a CHVBK |b 480242801 | |
029 | 1 | |a DEBBG |b BV042739920 | |
029 | 1 | |a DEBBG |b BV043397568 | |
029 | 1 | |a DEBBG |b BV043616051 | |
029 | 1 | |a DEBSZ |b 431874689 | |
029 | 1 | |a DEBSZ |b 44947741X | |
029 | 1 | |a DEBSZ |b 453329071 | |
029 | 1 | |a DEBSZ |b 485056259 | |
029 | 1 | |a GBVCP |b 820672513 | |
029 | 1 | |a GBVCP |b 823528839 | |
029 | 1 | |a NZ1 |b 16078933 | |
035 | |a (OCoLC)904144526 |z (OCoLC)928627978 |z (OCoLC)959872662 |z (OCoLC)961828067 |z (OCoLC)1055389088 |z (OCoLC)1066568016 |z (OCoLC)1100434984 |z (OCoLC)1101725106 |z (OCoLC)1103259832 |z (OCoLC)1105779893 |z (OCoLC)1124399840 |z (OCoLC)1148147635 |z (OCoLC)1391572344 | ||
037 | |a CL0500000669 |b Safari Books Online | ||
042 | |a pcc | ||
050 | 0 | 0 | |a HD61.5 |
072 | 7 | |a BUS |x 082000 |2 bisacsh | |
072 | 7 | |a BUS |x 041000 |2 bisacsh | |
072 | 7 | |a BUS |x 042000 |2 bisacsh | |
072 | 7 | |a BUS |x 085000 |2 bisacsh | |
082 | 0 | 0 | |a 658.4/73 |2 23 |
084 | |a POL037000 |2 bisacsh | ||
049 | |a UAMI | ||
100 | 1 | |a Russell, David L., |d 1942- | |
245 | 1 | 0 | |a Industrial security : |b managing security in the 21st century / |c David L. Russell, PE., Pieter C. Arlow. |
264 | 1 | |a Hoboken, New Jersey : |b John Wiley & Sons, |c 2015. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"-- |c Provided by publisher | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record and CIP data provided by publisher. | |
505 | 0 | |a Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. | |
505 | 8 | |a Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. | |
505 | 8 | |a Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. | |
505 | 8 | |a Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. | |
505 | 8 | |a FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Industries |x Security measures. | |
650 | 0 | |a Industrial safety. | |
650 | 0 | |a Risk management. | |
650 | 0 | |a Security systems. | |
650 | 0 | |a Terrorism |x Prevention. | |
650 | 6 | |a Industrie |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité du travail. | |
650 | 6 | |a Gestion du risque. | |
650 | 6 | |a Systèmes de sécurité. | |
650 | 6 | |a Terrorisme |x Prévention. | |
650 | 7 | |a occupational safety. |2 aat | |
650 | 7 | |a risk management. |2 aat | |
650 | 7 | |a security systems. |2 aat | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Terrorism. |2 bisacsh | |
650 | 7 | |a Industrial safety |2 fast | |
650 | 7 | |a Industries |x Security measures |2 fast | |
650 | 7 | |a Risk management |2 fast | |
650 | 7 | |a Security systems |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
700 | 1 | |a Arlow, Pieter. | |
776 | 0 | 8 | |i Print version: |a Russell, David L., 1942- |t Industrial security. |d Hoboken, New Jersey : John Wiley & Sons Inc., 2015 |z 9781118194638 |w (DLC) 2014043896 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118194638/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1895948 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH27098693 | ||
938 | |a Coutts Information Services |b COUT |n 29819531 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1895948 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4040656 | ||
938 | |a ebrary |b EBRY |n ebr11033614 | ||
938 | |a EBSCOhost |b EBSC |n 966798 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29819531 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00607388 | ||
938 | |a YBP Library Services |b YANK |n 12404475 | ||
938 | |a YBP Library Services |b YANK |n 12678019 | ||
938 | |a YBP Library Services |b YANK |n 12343547 | ||
938 | |a Internet Archive |b INAR |n industrialsecuri0000russ | ||
994 | |a 92 |b IZTAP |