|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
SCIDIR_ocn895009067 |
003 |
OCoLC |
005 |
20231117044641.0 |
006 |
m o d |
007 |
cr bn||||||abp |
007 |
cr bn||||||ada |
008 |
141111s1988 maua o 001 0 eng d |
010 |
|
|
|a 87034220
|
040 |
|
|
|a OCLCE
|b eng
|e pn
|c OCLCE
|d OCLCF
|d OPELS
|d N$T
|d E7B
|d YDXCP
|d OCLCQ
|d OCLCA
|d UKAHL
|d VLY
|d LUN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 762928097
|a 974619753
|a 987746598
|a 1100962434
|a 1162020538
|
020 |
|
|
|a 9781483144887
|q (electronic bk.)
|
020 |
|
|
|a 1483144887
|q (electronic bk.)
|
020 |
|
|
|z 0409900834
|
020 |
|
|
|z 9780409900835
|
035 |
|
|
|a (OCoLC)895009067
|z (OCoLC)762928097
|z (OCoLC)974619753
|z (OCoLC)987746598
|z (OCoLC)1100962434
|z (OCoLC)1162020538
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b B68 1988eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a MSR 939f
|2 stub
|
084 |
|
|
|a ST 276
|2 rvk
|
084 |
|
|
|a ST 310
|2 rvk
|
100 |
1 |
|
|a Bowers, Dan M.
|
245 |
1 |
0 |
|a Access control and personal identification systems /
|c Dan M. Bowers.
|
260 |
|
|
|a Boston :
|b Butterworths,
|c �1988.
|
300 |
|
|
|a 1 online resource (xiii, 232 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2011.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2011
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
505 |
0 |
|
|a Front Cover; Access Control and Personal Identification Systems; Copyright Page; Dedication; Table of Contents; Introduction; Chapter 1. The Security System; ELEMENTS OF A TOTAL SECURITY SYSTEM; ALARMS AND ALARM SYSTEMS; CLOSED-CIRCUIT TELEVISION EQUIPMENT AND SYSTEMS; DESIGNING THE TOTAL SECURITY SYSTEM; THE ACCESS CONTROL SYSTEM AS PART OF THE TOTAL SECURITY SYSTEM; Chapter 2. Applications of Access Control Systems; ACCESS CONTROL SYSTEMS IN INDUSTRIAL FACILITIES; ACCESS CONTROL SYSTEMS IN THE OFFICE; ACCESS CONTROL SYSTEMS IN FINANCIAL INSTITUTIONS; ACCESS CONTROL SYSTEMS IN HOTELS
|
505 |
8 |
|
|a OTHER APPLICATIONS OF ACCESS CONTROLChapter 3. Access Control in Computer and Communications Security; REASONS FOR LOSSES TO COMPUTER CRIME; RISKS AND EXPOSURES IN COMPUTER AND COMMUNICATIONS OPERATIONS; PRODUCTS FOR COMPUTER AND COMMUNICATIONS SECURITY; VENDORS OF COMPUTER AND COMMUNICATIONS SECURITY PRODUCTS; Chapter 4. Principles of Access Control and Personal Identification Systems; THE TECHNIQUES OF ACCESS CONTROL; COMBINATIONS AND MISCELLANEOUS FEATURES; ACCESS CONTROL SYSTEMS VERSUS PERSONAL IDENTIFICATION SYSTEMS; ERRORS IN ACCESS CONTROL OR PERSONAL IDENTIFICATION SYSTEMS
|
505 |
8 |
|
|a Chapter 5. Keypad Access Control SystemsKEYPAD ACCESS CODES AND THEIR SECURITY; FEATURES, FUNCTIONS, AND CONSIDERATIONS; MANUFACTURERS AND THEIR OFFERINGS; PRODUCT FEATURES AND COSTS; Chapter 6. Card and Other Portable-Key Systems; CODES IN PORTABLE-KEY SYSTEMS; CODING TECHNIQUES FOR PORTABLE-KEY SYSTEMS; OTHER CONSIDERATIONS IN CARD SELECTION; READING AND READERS; CARD-PLUS-KEYPAD SYSTEMS; OPTIONS, FEATURES, AND FUNCTIONS; MANUFACTURERS AND THEIR OFFERINGS; PRODUCT FEATURES AND COSTS; Chapter 7. Proximity Access Control Systems; PRINCIPLES OF OPERATION; CODES AND CODING IN PROXIMITY SYSTEMS
|
505 |
8 |
|
|a FEATURES AND FUNCTIONSMANUFACTURERS AND THEIR OFFERINGS; Chapter 8. Access Control Systems Based on Physical Attributes; EARLY DEVELOPMENTS; THE PROGNOSIS; FACE RECOGNITION SYSTEMS; SIGNATURE VERIFICATION SYSTEMS; FINGERPRINT RECOGNITION SYSTEMS; THE HAND GEOMETRY SYSTEM; RETINAL PATTERN OF THE EYE; VOICEPRINTS; ERRORS IN PERSONAL IDENTIFICATION SYSTEMS BASED ON PHYSICAL ATTRIBUTES; COMBINATION SYSTEMS USING PHYSICAL ATTRIBUTES; Chapter 9. Command and Control Systems; ALTERNATIVES FOR COMMAND AND CONTROL IN ACCESS CONTROL SYSTEMS; THE CENTRAL-COMPUTER CONTROLLER
|
505 |
8 |
|
|a EQUIPMENT FOR THE CENTRAL-COMPUTER CONTROLLERCONTROL OF ACCESS AND ALARMS; SYSTEM FUNCTIONS AND OPERATIONS; OPERATIONS AND FACILITIES; Chapter 10. Selecting and Implementing an Access Control System; SUPPLIERS OF ACCESS CONTROL EQUIPMENT AND SYSTEMS; THE PROCUREMENT PROCESS; CONTRACT TERMS AND CONDITIONS: PRICE, DELIVERY, GENERAL; PROJECT MANAGEMENT AND MONITORING; Chapter 11. The Future of Access Control and Electronic Security Systems; THE FUTURE OF ACCESS CONTROL; ARTICLE IDENTIFICATION AND SURVEILLANCE SYSTEMS; THE FUTURE OF ALARM SYSTEMS; THE FUTURE OF CLOSED-CIRCUIT TELEVISION SYSTEMS
|
520 |
|
|
|a Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Identification.
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Identification.
|0 (CaQQLa)201-0013869
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Identification
|2 fast
|0 (OCoLC)fst00966861
|
650 |
|
7 |
|a Personenkontrolle
|2 gnd
|0 (DE-588)4244981-9
|
650 |
|
7 |
|a Sicherheitseinrichtung
|2 gnd
|0 (DE-588)4116487-8
|
650 |
|
7 |
|a Zutrittsrecht
|2 gnd
|0 (DE-588)4068169-5
|
653 |
|
0 |
|a 10030
|a equipment
|a security
|a electronic
|
653 |
|
0 |
|a Computer security
|
653 |
|
0 |
|a Electronic security systems
|
653 |
|
0 |
|a Identification
|
776 |
0 |
8 |
|i Print version:
|a Bowers, Dan M.
|t Access control and personal identification systems.
|d Boston : Butterworths, �1988
|w (DLC) 87034220
|w (OCoLC)17234208
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780409900835
|z Texto completo
|