Cargando…

Security technology convergence insights /

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information tec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bernard, Ray (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands : Security Executive Council, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn907479484
003 OCoLC
005 20231120111952.0
006 m o d
007 cr cnu---unuuu
008 150416s2015 ne o 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d OCLCF  |d OCLCO  |d U3W  |d D6H  |d ABC  |d SFB  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |z 9780128028421 
035 |a (OCoLC)907479484 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
100 1 |a Bernard, Ray,  |e author. 
245 1 0 |a Security technology convergence insights /  |c Ray Bernard. 
264 1 |a Amsterdam, Netherlands :  |b Security Executive Council,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management. 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed April 16, 2015). 
505 0 |a ""Front Cover""; ""Security Technology Convergence Insights""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Acknowledgments""; ""About the Author""; ""Introduction""; ""Chapter 1: What Is Security Convergence?""; ""Two Types of Convergence""; ""Security Convergence Collaboration""; ""The Introduction of the Term �aȶConvergence�a�?""; ""Four Categories of Convergence""; ""Mastering Convergence""; ""Integration of Physical Security and Logical Security""; ""Why Convergence Didn�a�?t Really Disappear""; ""Convergence �aȶDisappears�a�? in the IT Domain"" 
505 8 |a ""Chapter 2: Convergence Trends""""The Value of Technology""; ""Coopetition and Open Standards""; ""Technological Value""; ""The Security Industry World Has Changed""; ""Video System Attack""; ""Access Control System Attack""; ""The New World""; ""IP-Based Card Readers Compromised""; ""Why Don�a�?t Many Manufacturers Care?""; ""An IT Perspective""; ""Commitment to Customers�a�? Interests""; ""Some Companies Do Care""; ""Convergence in Design: Virtual Construction""; ""Building Information Modeling""; ""Traditional Design and Construction""; ""Virtual Design and Construction""; ""Visualization"" 
505 8 |a Security Design and BIMAcknowledgments -- Chapter 3: Physical Security and Information Technology Collaboration -- Collaboration between Physical Security and Information Technology -- How IT Can Help with Physical Security System Planning -- The Scope of Security Systems Integration -- Convergence Roles and Responsibilities -- Service-Level Agreements -- Security Video Requires Convergence Collaboration -- Data Security for Corporate Security Departments -- Financial Impact of Cyber Risk -- Protecting Information in Human Memory 
505 8 |a Network Protection for Security SystemsPhysical Security for Computing Systems -- Developing a Plan for the Physical Protection of IT Systems -- Understanding Computing Systems Attacks and Defenses -- Policy and Procedure Convergence -- Let IT Be Your Force Multiplier -- Security Patrols for Desktop Security -- IT Policies -- Security Officer Patrols -- Desktop Inspections -- Exceptions -- Results -- Chapter 4: Education Training -- Return on Investment for Convergence Education and Training -- Certifications Relevant to Convergence 
505 8 |a Knowledge Gap: Customers and Security IntegratorsLearning About Internet Protocol-Based Systems -- Maximizing Your Progress in the New Year -- ASIS Annual Seminars Sessions -- ASIS Webinars -- ASIS Member Council Participation -- Chapter 5: Security Planning -- Convergence Initiatives: Timing Can Be Critical -- Convergence and Layers of Security -- Security Layers -- Security Functions by Layer -- Levels of Security -- Multimodal Devices -- Multimodal Security Design -- Layers and Levels -- Security Functions -- Why Do I Need a Technology Roadmap? 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a Computer networks  |x Access control  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128028421  |z Texto completo