Cargando…

Access control and personal identification systems /

Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bowers, Dan M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Butterworths, �1988.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 SCIDIR_ocn895009067
003 OCoLC
005 20231117044641.0
006 m o d
007 cr bn||||||abp
007 cr bn||||||ada
008 141111s1988 maua o 001 0 eng d
010 |a  87034220  
040 |a OCLCE  |b eng  |e pn  |c OCLCE  |d OCLCF  |d OPELS  |d N$T  |d E7B  |d YDXCP  |d OCLCQ  |d OCLCA  |d UKAHL  |d VLY  |d LUN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 762928097  |a 974619753  |a 987746598  |a 1100962434  |a 1162020538 
020 |a 9781483144887  |q (electronic bk.) 
020 |a 1483144887  |q (electronic bk.) 
020 |z 0409900834 
020 |z 9780409900835 
035 |a (OCoLC)895009067  |z (OCoLC)762928097  |z (OCoLC)974619753  |z (OCoLC)987746598  |z (OCoLC)1100962434  |z (OCoLC)1162020538 
042 |a dlr 
050 4 |a QA76.9.A25  |b B68 1988eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a MSR 939f  |2 stub 
084 |a ST 276  |2 rvk 
084 |a ST 310  |2 rvk 
100 1 |a Bowers, Dan M. 
245 1 0 |a Access control and personal identification systems /  |c Dan M. Bowers. 
260 |a Boston :  |b Butterworths,  |c �1988. 
300 |a 1 online resource (xiii, 232 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [S.l.] :  |c HathiTrust Digital Library,  |d 2011.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2011  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
505 0 |a Front Cover; Access Control and Personal Identification Systems; Copyright Page; Dedication; Table of Contents; Introduction; Chapter 1. The Security System; ELEMENTS OF A TOTAL SECURITY SYSTEM; ALARMS AND ALARM SYSTEMS; CLOSED-CIRCUIT TELEVISION EQUIPMENT AND SYSTEMS; DESIGNING THE TOTAL SECURITY SYSTEM; THE ACCESS CONTROL SYSTEM AS PART OF THE TOTAL SECURITY SYSTEM; Chapter 2. Applications of Access Control Systems; ACCESS CONTROL SYSTEMS IN INDUSTRIAL FACILITIES; ACCESS CONTROL SYSTEMS IN THE OFFICE; ACCESS CONTROL SYSTEMS IN FINANCIAL INSTITUTIONS; ACCESS CONTROL SYSTEMS IN HOTELS 
505 8 |a OTHER APPLICATIONS OF ACCESS CONTROLChapter 3. Access Control in Computer and Communications Security; REASONS FOR LOSSES TO COMPUTER CRIME; RISKS AND EXPOSURES IN COMPUTER AND COMMUNICATIONS OPERATIONS; PRODUCTS FOR COMPUTER AND COMMUNICATIONS SECURITY; VENDORS OF COMPUTER AND COMMUNICATIONS SECURITY PRODUCTS; Chapter 4. Principles of Access Control and Personal Identification Systems; THE TECHNIQUES OF ACCESS CONTROL; COMBINATIONS AND MISCELLANEOUS FEATURES; ACCESS CONTROL SYSTEMS VERSUS PERSONAL IDENTIFICATION SYSTEMS; ERRORS IN ACCESS CONTROL OR PERSONAL IDENTIFICATION SYSTEMS 
505 8 |a Chapter 5. Keypad Access Control SystemsKEYPAD ACCESS CODES AND THEIR SECURITY; FEATURES, FUNCTIONS, AND CONSIDERATIONS; MANUFACTURERS AND THEIR OFFERINGS; PRODUCT FEATURES AND COSTS; Chapter 6. Card and Other Portable-Key Systems; CODES IN PORTABLE-KEY SYSTEMS; CODING TECHNIQUES FOR PORTABLE-KEY SYSTEMS; OTHER CONSIDERATIONS IN CARD SELECTION; READING AND READERS; CARD-PLUS-KEYPAD SYSTEMS; OPTIONS, FEATURES, AND FUNCTIONS; MANUFACTURERS AND THEIR OFFERINGS; PRODUCT FEATURES AND COSTS; Chapter 7. Proximity Access Control Systems; PRINCIPLES OF OPERATION; CODES AND CODING IN PROXIMITY SYSTEMS 
505 8 |a FEATURES AND FUNCTIONSMANUFACTURERS AND THEIR OFFERINGS; Chapter 8. Access Control Systems Based on Physical Attributes; EARLY DEVELOPMENTS; THE PROGNOSIS; FACE RECOGNITION SYSTEMS; SIGNATURE VERIFICATION SYSTEMS; FINGERPRINT RECOGNITION SYSTEMS; THE HAND GEOMETRY SYSTEM; RETINAL PATTERN OF THE EYE; VOICEPRINTS; ERRORS IN PERSONAL IDENTIFICATION SYSTEMS BASED ON PHYSICAL ATTRIBUTES; COMBINATION SYSTEMS USING PHYSICAL ATTRIBUTES; Chapter 9. Command and Control Systems; ALTERNATIVES FOR COMMAND AND CONTROL IN ACCESS CONTROL SYSTEMS; THE CENTRAL-COMPUTER CONTROLLER 
505 8 |a EQUIPMENT FOR THE CENTRAL-COMPUTER CONTROLLERCONTROL OF ACCESS AND ALARMS; SYSTEM FUNCTIONS AND OPERATIONS; OPERATIONS AND FACILITIES; Chapter 10. Selecting and Implementing an Access Control System; SUPPLIERS OF ACCESS CONTROL EQUIPMENT AND SYSTEMS; THE PROCUREMENT PROCESS; CONTRACT TERMS AND CONDITIONS: PRICE, DELIVERY, GENERAL; PROJECT MANAGEMENT AND MONITORING; Chapter 11. The Future of Access Control and Electronic Security Systems; THE FUTURE OF ACCESS CONTROL; ARTICLE IDENTIFICATION AND SURVEILLANCE SYSTEMS; THE FUTURE OF ALARM SYSTEMS; THE FUTURE OF CLOSED-CIRCUIT TELEVISION SYSTEMS 
520 |a Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed. 
546 |a English. 
650 0 |a Computer security. 
650 0 |a Identification. 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Identification.  |0 (CaQQLa)201-0013869 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Identification  |2 fast  |0 (OCoLC)fst00966861 
650 7 |a Personenkontrolle  |2 gnd  |0 (DE-588)4244981-9 
650 7 |a Sicherheitseinrichtung  |2 gnd  |0 (DE-588)4116487-8 
650 7 |a Zutrittsrecht  |2 gnd  |0 (DE-588)4068169-5 
653 0 |a 10030  |a equipment  |a security  |a electronic 
653 0 |a Computer security 
653 0 |a Electronic security systems 
653 0 |a Identification 
776 0 8 |i Print version:  |a Bowers, Dan M.  |t Access control and personal identification systems.  |d Boston : Butterworths, �1988  |w (DLC) 87034220  |w (OCoLC)17234208 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780409900835  |z Texto completo