LEADER 00875nam a2200241 i 4500 001 991002105149707536 008 130702s2012 it b 000 0 ita d 020 $a9788873957942 035 $ab14121918-39ule_inst 040 $aBibl. Interfacoltà T. Pellegrino$bita 082 04$a025.284 100 1 $aLana, Maurizio$0328992 245 10$aBiblioteche digitali :$bun'introduzione /$cMaurizio Lana 260 $aBologna :$bBononia University Press,$cc2012 300 $a134 p. ;$c21 cm. 440 0$aBiblioteca 650 4$aInternet$xImpiego nelle biblioteche 907 $a.b14121918$b02-04-14$c02-07-13 912 $a991002105149707536 945 $aLE002 Bibl. Ris. 592$g1$i2002000889034$lle002$op$pE23.00$q-$rn$so $t0$u0$v0$w0$x0$y.i1552081x$z02-07-13 996 $aBiblioteche digitali$9263419 997 $aUNISALENTO 998 $ale002$b02-07-13$cm$da $e-$fita$git $h0$i0 LEADER 05245nam 2200781 450 001 9910131335803321 005 20200520144314.0 010 $a1-119-02842-6 010 $a1-119-02843-4 010 $a1-119-02840-X 035 $a(CKB)3710000000375290 035 $a(EBL)1895948 035 $a(SSID)ssj0001438157 035 $a(PQKBManifestationID)11901789 035 $a(PQKBTitleCode)TC0001438157 035 $a(PQKBWorkID)11376616 035 $a(PQKB)10518838 035 $a(DLC) 2015007925 035 $a(Au-PeEL)EBL1895948 035 $a(CaPaEBR)ebr11033614 035 $a(CaONFJC)MIL770137 035 $a(OCoLC)904144526 035 $a(CaSebORM)9781118194638 035 $a(MiAaPQ)EBC1895948 035 $a(PPN)248899759 035 $a(EXLCZ)993710000000375290 100 $a20150330h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIndustrial security $emanaging security in the 21st century /$fDavid L. Russell, Pieter Arlow 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d2015. 210 4$d©2015 215 $a1 online resource (221 p.) 300 $aIncludes index. 311 $a1-118-19463-2 320 $aIncludes bibliographical references and index. 327 $aTitle Page; Copyright Page; Contents; Chapter 1 Introduction to Security Risk Assessment and Management; Introduction; Business Definition; Security Versus Risk; Framework for Risk Management; Value at Risk; Calculation of Risk; Risk Assessment Versus Risk Management; Risk Management Plans; Threat Scenarios; Statistics and Mathematics; Pairing Vulnerability and Threat Data; Setting Priorities; Other Definitions of Risk Assessment; Business Definition for Risk Assessment; Broad Definition for Risk Assessment; Quantitative Risk Assessment; Qualitative Risk Assessment; Threats; Vulnerabilities 327 $aCountermeasures for VulnerabilitiesThe D's of security systems; Sample Threat Scenario No. 1; Background; Sample Threat Scenario No. 2; Background; Notes; Chapter 2 Risk Assessment Basics; Street Calculus and Perceived Risk; Street Calculus; Security Risk Assessment Structure; Value at Risk; Sandia Laboratory's Risk Assessment Analysis; Annualized Cost Analysis of Risk; Scenario-driven Cost Risk Analysis; Real-world example; Model-Based Risk Analysis; MBRA example case; Risk Management by Fault Tree Methods and Risk-informed Decision Management; Fault tree analysis; RIDM; Notes 327 $aChapter 3 Assessing Types of Attacks and Threats with Data SourcesWeapons; AK-47; M16; Sniper rifles; Muzzle Energies for Various Cartridges; Rifle Grenades; Rocket-Propelled Grenades and Mortars; Explosive Energies; Impact of explosives; Other Types of Incidents and Accidents; Notes; Chapter 4 Evaluating a Company's Protective Systems; Surveys and Assessments; Site Security Assessments; Checklists; Cyber security checklist; Lighting; Perimeter Barriers: Design Notes and Comments; CCTV; Windows and Doors; Notes; Chapter 5 Port Security; Ranking Threats; Natural threats 327 $aMan-made/accidental threatsIntentional acts-delivery vectors; Weapon threats; Levels of Port Security; Security response plans; Recommended procedures; Identification Procedures for Personnel Screening; Employees; Vendors/contractors/vessel pilots; Truck drivers/passengers; Visitors (all personnel not falling into other categories); Government employees; Vessel personnel access through a facility; Search requirements; Acceptable identification; Access control; Vessel Arrival and Security Procedures While Moored; Internal Security; Vehicle control; Rail security; Key/ID/access card control 327 $aComputer securitySecurity rounds; Perimeter Security and Restricted Areas; Barriers; Fencing; Lighting; Security Alarms/Video Surveillance/Communications Systems; Alarms; Video surveillance; Communications systems; Training and Security Awareness; Floating Barriers; Notes; Chapter 6 Basics of Cyber security; Communications Life Cycle; Some Solutions to the Problem of Cyber crime; General recommendations; Communications Security; Communications as Transactions; Telephone System Security; Radio Communications; Digital Communications; Cyber security; Vulnerability assessment 327 $aUnknowns and alternatives 330 $a"Serves as a comprehensive, yet concise, reference guide and discusses a broad range of physical safety, security measures, and risk management"--$cProvided by publisher. 606 $aIndustries$xSecurity measures 606 $aIndustrial safety 606 $aRisk management 606 $aSecurity systems 606 $aTerrorism$xPrevention 615 0$aIndustries$xSecurity measures. 615 0$aIndustrial safety. 615 0$aRisk management. 615 0$aSecurity systems. 615 0$aTerrorism$xPrevention. 676 $a658.4/73 686 $aPOL037000$2bisacsh 700 $aRussell$b David L.$f1942-$0954038 702 $aArlow$b Pieter 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910131335803321 996 $aIndustrial security$92157542 997 $aUNINA LEADER 01086nam0 22002771i 450 001 UON00307090 005 20231205104037.977 010 $a08-7022-219-8 100 $a20080125d1975 |0itac50 ba 101 $aeng 102 $aUS 105 $a|||| 1|||| 200 1 $aNa Mele o Hawai'i Nei. 101 Hawaiian songs$fcolledted by Samuel H. Elbert and Noelani Mahoe 210 $aHonolulu$cUniversity of Hawaii Press$d1975 215 $a110 p.$d24 cm 620 $aUS$dHonolulu$3UONL000136 686 $aPOL IX H$cPOLINESIA - ARTI - MUSICA, TEATRO, CINEMA, DANZA$2A 700 1$aELBERT$bSamuel H.$3UONV068110$0651435 701 1$aMAHOE$bNoelani$3UONV175848$0696855 712 $aUniversity of Hawai?i Press$3UONV245880$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00307090 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI POL IX H 001 $eSI SA 669 5 001 996 $aNa Mele o Hawai'i Nei$91376245 997 $aUNIOR