Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
Schlagwörter
  • 1
    Online-Ressource
    Online-Ressource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    almahu_9948198376002882
    Umfang: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Inhalt: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Anmerkung: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Weitere Ausg.: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    edocfu_9959327396702883
    Umfang: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Inhalt: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Anmerkung: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Weitere Ausg.: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    almafu_9959327396702883
    Umfang: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Inhalt: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Anmerkung: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Weitere Ausg.: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 111908426?
Meinten Sie 111902840x?
Meinten Sie 1119028434?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz