|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn904144526 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
150225s2015 nju ob 001 0 eng |
010 |
|
|
|a 2015007925
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d N$T
|d DG1
|d EBLCP
|d OCLCF
|d IDEBK
|d E7B
|d CDX
|d RECBK
|d YDXCP
|d DEBSZ
|d COO
|d UMI
|d OCLCQ
|d DEBBG
|d CCO
|d IDB
|d LOA
|d COCUF
|d K6U
|d CNNOR
|d STF
|d C6I
|d LIP
|d PIFAG
|d FVL
|d ZCU
|d OCLCQ
|d MERUC
|d U3W
|d D6H
|d OCLCQ
|d ICG
|d VT2
|d OCLCQ
|d G3B
|d WYU
|d TKN
|d OCLCQ
|d UAB
|d DKC
|d OCLCQ
|d UKAHL
|d UX1
|d OCLCQ
|d RDF
|d OCLCQ
|d SDF
|d OCLCO
|d OCLCQ
|d INARC
|d OCLCO
|
019 |
|
|
|a 928627978
|a 959872662
|a 961828067
|a 1055389088
|a 1066568016
|a 1100434984
|a 1101725106
|a 1103259832
|a 1105779893
|a 1124399840
|a 1148147635
|a 1391572344
|
020 |
|
|
|a 9781119028406
|q (Adobe PDF)
|
020 |
|
|
|a 111902840X
|q (Adobe PDF)
|
020 |
|
|
|a 9781119028420
|q (ePub)
|
020 |
|
|
|a 1119028426
|q (ePub)
|
020 |
|
|
|a 9781118194638
|q (hardback)
|
020 |
|
|
|a 1118194632
|q (hardback)
|
020 |
|
|
|a 9781119028437
|
020 |
|
|
|a 1119028434
|
029 |
1 |
|
|a AU@
|b 000056073293
|
029 |
1 |
|
|a AU@
|b 000066260779
|
029 |
1 |
|
|a CHBIS
|b 010442480
|
029 |
1 |
|
|a CHNEW
|b 000944050
|
029 |
1 |
|
|a CHVBK
|b 480242801
|
029 |
1 |
|
|a DEBBG
|b BV042739920
|
029 |
1 |
|
|a DEBBG
|b BV043397568
|
029 |
1 |
|
|a DEBBG
|b BV043616051
|
029 |
1 |
|
|a DEBSZ
|b 431874689
|
029 |
1 |
|
|a DEBSZ
|b 44947741X
|
029 |
1 |
|
|a DEBSZ
|b 453329071
|
029 |
1 |
|
|a DEBSZ
|b 485056259
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999927050305765
|
029 |
1 |
|
|a GBVCP
|b 820672513
|
029 |
1 |
|
|a GBVCP
|b 823528839
|
029 |
1 |
|
|a NZ1
|b 16078933
|
035 |
|
|
|a (OCoLC)904144526
|z (OCoLC)928627978
|z (OCoLC)959872662
|z (OCoLC)961828067
|z (OCoLC)1055389088
|z (OCoLC)1066568016
|z (OCoLC)1100434984
|z (OCoLC)1101725106
|z (OCoLC)1103259832
|z (OCoLC)1105779893
|z (OCoLC)1124399840
|z (OCoLC)1148147635
|z (OCoLC)1391572344
|
037 |
|
|
|a CL0500000669
|b Safari Books Online
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a HD61.5
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
0 |
|a 658.4/73
|2 23
|
084 |
|
|
|a POL037000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Russell, David L.,
|d 1942-
|
245 |
1 |
0 |
|a Industrial security :
|b managing security in the 21st century /
|c David L. Russell, PE., Pieter C. Arlow.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley & Sons,
|c 2015.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
|c Provided by publisher
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record and CIP data provided by publisher.
|
505 |
0 |
|
|a Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment.
|
505 |
8 |
|
|a Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades.
|
505 |
8 |
|
|a Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems.
|
505 |
8 |
|
|a Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction.
|
505 |
8 |
|
|a FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Industries
|x Security measures.
|
650 |
|
0 |
|a Industrial safety.
|
650 |
|
0 |
|a Risk management.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
0 |
|a Terrorism
|x Prevention.
|
650 |
|
6 |
|a Industrie
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité du travail.
|
650 |
|
6 |
|a Gestion du risque.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
6 |
|a Terrorisme
|x Prévention.
|
650 |
|
7 |
|a occupational safety.
|2 aat
|
650 |
|
7 |
|a risk management.
|2 aat
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Political Freedom & Security
|x Terrorism.
|2 bisacsh
|
650 |
|
7 |
|a Industrial safety
|2 fast
|
650 |
|
7 |
|a Industries
|x Security measures
|2 fast
|
650 |
|
7 |
|a Risk management
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
650 |
|
7 |
|a Terrorism
|x Prevention
|2 fast
|
700 |
1 |
|
|a Arlow, Pieter.
|
776 |
0 |
8 |
|i Print version:
|a Russell, David L., 1942-
|t Industrial security.
|d Hoboken, New Jersey : John Wiley & Sons Inc., 2015
|z 9781118194638
|w (DLC) 2014043896
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118194638/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27098693
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 29819531
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1895948
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4040656
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11033614
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 966798
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29819531
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00607388
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12404475
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12678019
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12343547
|
938 |
|
|
|a Internet Archive
|b INAR
|n industrialsecuri0000russ
|
994 |
|
|
|a 92
|b IZTAP
|