Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Keywords
  • 1
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    almahu_9948198376002882
    Format: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Content: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Note: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Additional Edition: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    edocfu_9959327396702883
    Format: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Content: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Note: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Additional Edition: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hoboken, New Jersey :Wiley,
    UID:
    almahu_9948320704602882
    Format: 1 online resource (221 pages) : , illustrations (some color), charts
    ISBN: 9781119028406 (e-book)
    Note: Includes index.
    Additional Edition: Print version: Russell, David L., 1942- Industrial security : managing security in the 21st century. Hoboken, New Jersey : Wiley, c2015 ISBN 9781118194638
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV043616051
    Format: 1 online resource (221 pages)
    Edition: 1st ed
    ISBN: 9781119028406 , 9781118194638
    Content: Provides a comprehensive and practical guide to security organization and planning in industrial plants A primer on industrial security written from a slightly different viewpoint. Industrial Security: Managing Security in the 21st Century focuses on analysis of threats, gives practical examples and guides to security standards and guides, and points the way to improving the overall issue of security. It deals with issues of planning, response, and strategies to implement and improve physical security in manufacturing and chemical facilities, and it can be used as a textbook for teaching the subject of industrial security. Based upon research and lectures on security topics which were presented in the Middle East to supervisors of an oil company guard force. The book covers planning and the risks of setting up a security operation, as well as how to balance the need for upgrades against potential losses. Other topics such as fire and hazmat, two issues which are not usually discussed in security books, are covered. Industrial Security features: Basic definitions related to plant security Countermeasures and response methods Facilities and equipment, and security organization While other texts cover the mechanics of managing and running a guard force, no other current book deals with the foundation and planning behind security operation. The wide range of topics featured in this book can be applied to a multitude of industrial plants. David L Russell, PE is an Environmental Engineer with a background in consulting and in the Chemical Industry. He has over 40 years of experience including 9 years in the chemical industry for Hooker, IMC Chemical and Allied Chemicals. He was an instructor for the American Institute of Chemical Engineers where he taught courses in Practical Wastewater Treatment and Hazardous Materials and Hazardous Wastes.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: Erscheint auch als Druck-Ausgabe Russell, David L . Industrial Security : Managing Security in the 21st Century
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons,
    UID:
    almafu_9959327396702883
    Format: 1 online resource
    ISBN: 9781119028406 , 111902840X , 9781119028420 , 1119028426 , 9781118194638 , 1118194632 , 9781119028437 , 1119028434
    Content: "Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--
    Note: Title page; Table of Contents; Chapter 1: Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment. , Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario No. 2; Chapter 2: Risk Assessment Basics; Street Calculus and Perceived Risk; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis3; Model-Based Risk Analysis; Risk Management by Fault Tree Methods and Risk-informed Decision management; Chapter 3: Assessing Types of Attacks and Threats with Data Sources; Weapons; Muzzle Energies for Various Cartridges; Rifle Grenades. , Rocket-Propelled Grenades and MortarsExplosive Energies; Other Types of Incidents and Accidents; Chapter 4: Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Chapter 5: Port Security; Ranking Threats; Levels of Port Security; Identification Procedures for Personnel Screening; Vessel Arrival and Security Procedures While Moored; Internal Security; Perimeter Security and Restricted Areas; Lighting; Security Alarms/Video Surveillance/Communications Systems. , Training and Security AwarenessFloating Barriers; Chapter 6: Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; How to Perform the Vulnerability Assessment; Communications Procedure Design: Hints and Helps; Benefits: Identified; Cyber Threat Matrix: Categories of Loss and Frequency; Setting up Internet Security; Cyber security Tools; Chapter 7: Scenario Planning and Analyses; Introduction. , FTA, Markov Chains, and Monte Carlo MethodsOther Complimentary Techniques; Sample of Initial Analysis; Failure Modes and Effects Analysis; DHS Analysis and Plans; Bow-tie Analysis; HAZOPS and Process Safety Management; ALOHA, CAMEO, and Security Planning Tools; The Colored Books; Chapter 8: Security System Design and Implementation: Practical Notes; Security Threat-Level Factors; Considered Factors; Security System Design; Electronic Security Systems Design; Review and Assessment of Engineering Design and Implementation; Conclusion; Appendix I: Physical Security Checklist; Building.
    Additional Edition: Print version: Russell, David L., 1942- Industrial security. Hoboken, New Jersey : John Wiley & Sons Inc., 2015 ISBN 9781118194638
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9781118149683?
Did you mean 9781118264638?
Did you mean 9781118146538?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages