|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn907479484 |
003 |
OCoLC |
005 |
20231120111952.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
150416s2015 ne o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d OCLCF
|d OCLCO
|d U3W
|d D6H
|d ABC
|d SFB
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9780128028421
|
035 |
|
|
|a (OCoLC)907479484
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Bernard, Ray,
|e author.
|
245 |
1 |
0 |
|a Security technology convergence insights /
|c Ray Bernard.
|
264 |
|
1 |
|a Amsterdam, Netherlands :
|b Security Executive Council,
|c 2015.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed April 16, 2015).
|
505 |
0 |
|
|a ""Front Cover""; ""Security Technology Convergence Insights""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""About the Author""; ""Introduction""; ""Chapter 1: What Is Security Convergence?""; ""Two Types of Convergence""; ""Security Convergence Collaboration""; ""The Introduction of the Term �aȶConvergence�a�?""; ""Four Categories of Convergence""; ""Mastering Convergence""; ""Integration of Physical Security and Logical Security""; ""Why Convergence Didn�a�?t Really Disappear""; ""Convergence �aȶDisappears�a�? in the IT Domain""
|
505 |
8 |
|
|a ""Chapter 2: Convergence Trends""""The Value of Technology""; ""Coopetition and Open Standards""; ""Technological Value""; ""The Security Industry World Has Changed""; ""Video System Attack""; ""Access Control System Attack""; ""The New World""; ""IP-Based Card Readers Compromised""; ""Why Don�a�?t Many Manufacturers Care?""; ""An IT Perspective""; ""Commitment to Customers�a�? Interests""; ""Some Companies Do Care""; ""Convergence in Design: Virtual Construction""; ""Building Information Modeling""; ""Traditional Design and Construction""; ""Virtual Design and Construction""; ""Visualization""
|
505 |
8 |
|
|a Security Design and BIMAcknowledgments -- Chapter 3: Physical Security and Information Technology Collaboration -- Collaboration between Physical Security and Information Technology -- How IT Can Help with Physical Security System Planning -- The Scope of Security Systems Integration -- Convergence Roles and Responsibilities -- Service-Level Agreements -- Security Video Requires Convergence Collaboration -- Data Security for Corporate Security Departments -- Financial Impact of Cyber Risk -- Protecting Information in Human Memory
|
505 |
8 |
|
|a Network Protection for Security SystemsPhysical Security for Computing Systems -- Developing a Plan for the Physical Protection of IT Systems -- Understanding Computing Systems Attacks and Defenses -- Policy and Procedure Convergence -- Let IT Be Your Force Multiplier -- Security Patrols for Desktop Security -- IT Policies -- Security Officer Patrols -- Desktop Inspections -- Exceptions -- Results -- Chapter 4: Education Training -- Return on Investment for Convergence Education and Training -- Certifications Relevant to Convergence
|
505 |
8 |
|
|a Knowledge Gap: Customers and Security IntegratorsLearning About Internet Protocol-Based Systems -- Maximizing Your Progress in the New Year -- ASIS Annual Seminars Sessions -- ASIS Webinars -- ASIS Member Council Participation -- Chapter 5: Security Planning -- Convergence Initiatives: Timing Can Be Critical -- Convergence and Layers of Security -- Security Layers -- Security Functions by Layer -- Levels of Security -- Multimodal Devices -- Multimodal Security Design -- Layers and Levels -- Security Functions -- Why Do I Need a Technology Roadmap?
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128028421
|z Texto completo
|