Integrated security systems design: concepts, specifications, and implementation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Butterworth-Heinemann
c2007
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xii, 458 p.) |
ISBN: | 9780750679091 0750679093 9780080471440 0080471447 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314221 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2007 |||| o||u| ||||||eng d | ||
020 | |a 9780750679091 |9 978-0-7506-7909-1 | ||
020 | |a 0750679093 |9 0-7506-7909-3 | ||
020 | |a 9780080471440 |c electronic bk. |9 978-0-08-047144-0 | ||
020 | |a 0080471447 |c electronic bk. |9 0-08-047144-7 | ||
035 | |a (ZDB-33-EBS)ocn162593739 | ||
035 | |a (OCoLC)162593739 | ||
035 | |a (DE-599)BVBBV042314221 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Norman, Thomas L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Integrated security systems design |b concepts, specifications, and implementation |c Thomas Norman |
264 | 1 | |a Amsterdam |b Elsevier Butterworth-Heinemann |c c2007 | |
300 | |a 1 Online-Ressource (xii, 458 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Information storage and retrieval systems / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Information storage and retrieval systems |x Security measures | |
650 | 4 | |a Computers |x Access control | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780750679091 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751212 |
Datensatz im Suchindex
_version_ | 1804152907150393344 |
---|---|
any_adam_object | |
author | Norman, Thomas L. |
author_facet | Norman, Thomas L. |
author_role | aut |
author_sort | Norman, Thomas L. |
author_variant | t l n tl tln |
building | Verbundindex |
bvnumber | BV042314221 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn162593739 (OCoLC)162593739 (DE-599)BVBBV042314221 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03254nmm a2200493zc 4500</leader><controlfield tag="001">BV042314221</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750679091</subfield><subfield code="9">978-0-7506-7909-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750679093</subfield><subfield code="9">0-7506-7909-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080471440</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047144-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080471447</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047144-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn162593739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162593739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314221</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Norman, Thomas L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrated security systems design</subfield><subfield code="b">concepts, specifications, and implementation</subfield><subfield code="c">Thomas Norman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Butterworth-Heinemann</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 458 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information storage and retrieval systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780750679091</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751212</subfield></datafield></record></collection> |
id | DE-604.BV042314221 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9780750679091 0750679093 9780080471440 0080471447 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751212 |
oclc_num | 162593739 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xii, 458 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Elsevier Butterworth-Heinemann |
record_format | marc |
spelling | Norman, Thomas L. Verfasser aut Integrated security systems design concepts, specifications, and implementation Thomas Norman Amsterdam Elsevier Butterworth-Heinemann c2007 1 Online-Ressource (xii, 458 p.) txt rdacontent c rdamedia cr rdacarrier Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control http://www.sciencedirect.com/science/book/9780750679091 Verlag Volltext |
spellingShingle | Norman, Thomas L. Integrated security systems design concepts, specifications, and implementation COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
title | Integrated security systems design concepts, specifications, and implementation |
title_auth | Integrated security systems design concepts, specifications, and implementation |
title_exact_search | Integrated security systems design concepts, specifications, and implementation |
title_full | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_fullStr | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_full_unstemmed | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_short | Integrated security systems design |
title_sort | integrated security systems design concepts specifications and implementation |
title_sub | concepts, specifications, and implementation |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computers / Access control Information storage and retrieval systems / Security measures Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
url | http://www.sciencedirect.com/science/book/9780750679091 |
work_keys_str_mv | AT normanthomasl integratedsecuritysystemsdesignconceptsspecificationsandimplementation |