Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Integrated security systems de...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Integrated security systems design : concepts, specifications, and implementation / Thomas Norman.
Saved in:
Bibliographic Details
Main Author:
Norman, Thomas L.
Format:
eBook
Language:
English
Published:
Amsterdam ; Boston :
Elsevier Butterworth-Heinemann,
©2007.
Subjects:
Computer networks
>
Security measures.
Information storage and retrieval systems
>
Security measures.
Computers
>
Access control.
COMPUTERS
>
Internet
>
Security.
COMPUTERS
>
Networking
>
Security.
COMPUTERS
>
Security
>
General.
Computer networks
>
Security measures
Computers
>
Access control
Information storage and retrieval systems
>
Security measures
dissertations.
Academic theses
Academic theses.
Thèses et écrits académiques.
Online Access:
Click for online access
Holdings
Description
Table of Contents
Similar Items
Staff View
Table of Contents:
SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS
1 Introduction and Organization of the Book
2 Integrated Security System Design Benefits and Philosophy
3 History of Electronic Security
SECTION TWO SECURITY SYSTEM DESIGN
4 Security System Design Elements
5 Electronics Elements (High Level Discussion)
6 Electronics Elements (Detailed Discussion)
7 Physical Security Elements
8 The Security Design Process
9 Preliminary Steps in the Design Process
10 Getting Down to the Actual Design
SECTION THREE
SPECIAL DESIGN SECTIONS
11 Information Technology Systems Infrastructure
12 Radio Frequency Systems
13 Interfacing to Legacy Systems and Emerging Technologies
14 Interfacing to Related Systems
15 Delaying Technologies and Response Technologies
16 Alarm Detection and Emerging Video Technologies
17 Design Standards Development
18 System Finalization and Commissioning Steps
19 System Implementation.
Similar Items
Security intelligence : a practitioner's guide to solving enterprise security challenges
by: Li, Qing, 1971-, et al.
Published: (2015)
Implementing NAP and NAC security technologies : the complete guide to network access control
by: Hoffman, Daniel (Daniel V.), 1972-
Published: (2008)
Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
by: Richter, Andy, et al.
Published: (2015)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
by: Cardwell, Kevin
Published: (2014)
Formal models and techniques for analyzing security protocols
Published: (2011)