top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2008
Disciplina 005.8
Soggetto topico Computers - Design and construction - Circuits
Integrated circuits - Verification
Computer security
Electronic security systems
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
ISBN 1-5090-7858-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996205031403316
[Place of publication not identified], : IEEE, 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2008
Disciplina 005.8
Soggetto topico Computers - Design and construction - Circuits
Integrated circuits - Verification
Computer security
Electronic security systems
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
ISBN 9781509078585
1509078584
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145387203321
[Place of publication not identified], : IEEE, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2011
Descrizione fisica 1 online resource (ix, 166 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Electronic security systems
ISBN 1-4577-1058-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996208926203316
[Place of publication not identified], : IEEE, 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2011
Descrizione fisica 1 online resource (ix, 166 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Electronic security systems
ISBN 9781457710582
1457710587
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910141132103321
[Place of publication not identified], : IEEE, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic Access Control
Electronic Access Control
Autore Norman Thomas L
Edizione [2nd ed.]
Pubbl/distr/stampa San Diego : , : Elsevier Science & Technology, , 2017
Descrizione fisica 1 online resource (566 pages)
Disciplina 621.38928
Soggetto topico Electronic security systems
Electronic locking devices
ISBN 0-12-805465-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Electronic Access Control -- Copyright Page -- Contents -- I. The Basics -- 1 Introduction and Overview -- Chapter Overview -- Rules to Live By -- Who Should Read This Book? -- How Is Material Presented in This Book? -- What Will You Learn, and How Will It Help Your Career? -- What Is in This Book? -- Part I: the basics -- Chapter 2 -- Chapter 3 -- Part II: how things work -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Chapter 18 -- Part III: The things that make systems sing -- Chapter 19 -- Chapter 20 -- Chapter 21 -- Chapter 22 -- Chapter 23 -- Chapter 24 -- Chapter 25 -- Chapter 26 -- Chapter 27 -- Chapter Summary -- 2 Foundational Security and Access Control Concepts -- Chapter Overview -- Understanding Risk -- Types of organization assets -- Types of users -- Types of threat actors -- Understanding criticalities and consequences -- Understanding vulnerability -- Understanding probability -- What is risk? -- Managing Risk -- Methods of managing risk -- How security and access control programs help manage risk -- Security program elements -- The importance of a qualified risk analysis -- The importance of security policies and procedures -- Types of Countermeasures -- Hi-tech -- Lo-tech -- No-tech -- Mixing approaches -- Layering security countermeasures -- Access Control System Concepts -- Types of users -- Types of areas/groups -- User schedules -- Portal programming -- Credential programming -- Group and schedule programming -- Chapter Summary -- 3 How Electronic Access Control Systems Work -- Chapter Overview -- First, a Little History -- The Basics -- Authorized Users, User Groups, Access Zones, Schedules, and Access Groups -- Authorized users -- User groups -- Access zones.
Schedules -- Access groups -- Portals -- Types of portals -- Credential readers -- Electrified locks -- Safety systems -- Alarm monitoring -- Request-to-exit sensors -- Credentials and Credential Readers -- Credential authorization -- Locks, Alarms, and Exit Devices -- Electrified locks -- Alarms -- Exit Devices -- Data, Data Retention, and Reports -- Chapter Summary -- II. How Things Work -- 4 Access Control Credentials and Credential Readers -- Chapter Overview -- Access Credentialing Concepts -- Keypads -- Access Cards, Key Fobs, and Card Readers -- Wiegand Wire Cards -- 125K Passive Proximity Cards -- 125KHz (Low Frequency) Active Proximity Cards -- 13.56MHz (High Frequency) Contactless Smart Cards -- RFID Wireless Transmitter Systems -- Multitechnology Cards -- Mobile Phone Access Control -- Capture Card Reader -- Multitechnology Card Readers -- Biometric Readers -- Photo Identification -- Chapter Summary -- 5 Types of Access Controlled Portals -- Chapter Overview -- Portal Passage Concepts -- Card entry/free exit -- Card entry/card exit -- Tailgate detection -- Positive access control -- 2-Man rule -- Schedules -- Antipassback -- Pedestrian Portal Types -- Standard doors -- Automatic doors -- Revolving doors -- Turnstiles -- Man-traps -- Automated walls -- Vehicle Portals -- Standard barrier gates -- Automated vehicle swing gates -- Automated sliding vehicle gates -- Automated roll-up vehicle gates -- High-security barrier gates -- Sally ports -- Chapter Summary -- 6 Life Safety and Exit Devices -- Chapter Overview -- Life Safety First -- Security Versus Life Safety -- Understanding National and Local Access Control Codes and Standards -- NFPA 101 -- International building code -- NFPA 72 -- More on these codes -- UL 294 -- Life Safety and Locks -- Life Safety and Exit Devices -- Life Safety and Fire Alarm System Interfaces -- Chapter Summary.
7 Door Types and Door Frames -- Chapter Overview -- Basics About Doors and Security -- Standard Single-Leaf and Double-Leaf Swinging Doors -- Hollow metal doors -- Solid core wood doors -- Framed glass doors -- Unframed glass doors -- Total doors -- Pivoting doors -- Balanced doors -- Door Frames and Mountings -- Hollow metal-high-use and high-impact -- Aluminum-medium-use and medium-impact -- Wood-light-use and light-impact -- Door mounting methods -- Overhead Doors -- Roll-up doors -- Paneled overhead doors -- Revolving Doors -- Sliding Panel Doors -- Bifold and Fourfold Doors -- Chapter Summary -- 8 Doors and Fire Ratings -- Chapter Overview -- What Are Fire Ratings? -- Basic fire egress concept -- How should this be done? -- Exceptions -- Fire Penetration Ratings -- Hose stream test -- Door Assembly Ratings -- The three-fourths rule -- Doors with glass -- Temperature rise doors -- Louvers -- Fire Door Frames and Hardware -- Latching devices -- Fire exit hardware -- Pairs of Doors -- Latching hardware -- Inactive leaf on pair of doors -- Double egress pairs -- Astragals -- Smoke and draft control -- "Path of Egress" Doors -- Electrified Locks and Fire Ratings -- Additional References -- Chapter Summary -- 9 Electrified Locks-Overview -- Chapter Overview -- Why Electric Locks? -- Types of Electrified Locks -- How Electrified Locks Work -- Electric strikes -- Electrified mortise locks -- Electrified panic hardware -- Electrified cylinder locks -- Magnetic locks -- Electrified dead-bolts -- Paddle-operated electromechanical dead-bolts -- Lock Power Supplies -- Electrified Lock Wiring Considerations -- Voltage drop example -- Electrified Lock Controls -- Types of Locks Not Recommended -- Chapter Summary -- 10 Free Egress Electrified Locks -- Chapter Overview -- Types of Free Egress Locks -- Electrified Mortise Locks -- Mortise latch only-no lock.
Mortise locks with no dead-bolt -- Mortise locks with dead-bolts -- Door frame considerations -- Additional lock switch fittings -- Door handing -- Electrified "Panic" Hardware -- Rim exit devices -- Mortise lock exit devices -- Surface-mounted vertical rod exit devices -- Concealed vertical rod exit devices -- Three-point latching exit device -- Exit device functions -- Electrical options -- Popular double door applications -- Electric Strikes -- Switches available for electric strikes -- Electrified Cylinder Locks -- Self-Contained Access Control Locks -- Chapter Summary -- 11 Magnetic Locks -- Chapter Overview -- Standard Magnetic Locks -- Standard magnetic lock applications -- Magnetic Shear Locks -- Magnetic shear lock applications -- Magnetic Gate Locks -- Cautions About Magnetic Locks -- Egress assurance -- Operational and maintenance warnings -- Chapter Summary -- 12 Electrified Dead-Bolt Locks -- Chapter Overview -- Surface-Mounted Electrified Dead-Bolt Locks -- Concealed Direct-Throw Mortise Dead-Bolt Lock -- Dead-Bolt Equipped Electrified Mortise Lock -- Top-Latch Release Bolt -- Electrified Dead-Bolt Gate Locks -- Electrified dead-bolt lock safety provisions -- Chapter Summary -- 13 Specialty Electrified Locks -- Chapter Overview -- Electrified Dead-Bolt-Equipped Panic Hardware -- Securitech Locks -- Delayed Egress Locks -- Specialize school locks to protect against active shooters -- Hi-Tower Locks -- CRL-Blumcraft Panic Hardware -- Chapter Summary -- 14 Selecting the Right Lockset for a Door -- Chapter Overview -- Standard Application Rules -- How to Select the Right Lock for Any Door -- Description of door -- Framed glass door -- Herculite lobby doors -- High-rise building stair-tower door -- Rear-exit door on warehouse with hi-value equipment -- Office suite door -- Double-egress doors-hospital corridor -- Inswinging office door.
Revolving door-emergency egress side door -- Chapter Summary -- 15 Specialized Portal Control Devices and Applications -- Chapter Overview -- Specialized Portals for Pedestrians -- Automatic doors -- Man-traps -- Full-verification portals -- Electronic turnstiles -- Antitailgate alarm -- Specialized Portals for Vehicles -- High-security barrier gates -- Sally ports -- Chapter Summary -- 16 Industry History That can Predict the Future -- Chapter Overview -- A Little Background -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Stalled progress -- Fifth Generation -- Avoiding Obsolescence -- Planned obsolescence -- Unplanned obsolescence -- What the future holds -- Chapter Summary -- 17 Access Control Panels and Networks -- Chapter Overview -- Access Control Panel Attributes and Components -- Communications Board -- Power supply and battery -- Central processing unit -- Erasable programmable read-only memory -- Random access memory -- Input/output interfaces -- Access Control Panel Form Factors -- Access Control Panel Functions -- Access Control Panel Locations -- Local and Network Cabling -- Networking Options -- Redundancy and Reliability Factors -- Good wiring and installation -- Good design -- Good power -- Good data infrastructure -- Redundancy -- Chapter Summary -- 18 Access Control System Servers and Workstations -- Chapter Overview -- Server/Workstation Functions -- Store system configurations -- Store the system's historical event data -- Manage communications throughout the entire system -- Serve workstations with real-time data and reports -- Decision Processes -- System Scalability -- Unscalable Systems -- Basic scalability -- Multisite systems -- System-wide card compatibility -- Enterprise-wide system -- Master host -- Super-host/subhost -- Access Control System Networking -- The core network.
The server network.
Record Nr. UNINA-9910583003703321
Norman Thomas L  
San Diego : , : Elsevier Science & Technology, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic safety and soundness [[electronic resource] ] : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin
Electronic safety and soundness [[electronic resource] ] : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin
Autore Glaessner Thomas C
Pubbl/distr/stampa Washington, DC, : World Bank, 2004
Descrizione fisica 1 online resource (187 p.)
Disciplina 332.1/78
Altri autori (Persone) KellermannTom
McNevinValerie
Collana World Bank working paper
Soggetto topico Electronic funds transfers - Security measures
Electronic security systems
Soggetto genere / forma Electronic books.
ISBN 1-280-08433-2
9786610084333
1-4175-0059-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910455831603321
Glaessner Thomas C  
Washington, DC, : World Bank, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic safety and soundness : : securing finance in a new age / / Thomas C. Glaessner, Tom Kellermann, Valerie McNevin
Electronic safety and soundness : : securing finance in a new age / / Thomas C. Glaessner, Tom Kellermann, Valerie McNevin
Autore Glaessner Thomas C
Pubbl/distr/stampa Washington, D.C. : , : World Bank, , 2004
Descrizione fisica ix, 174 pages : illustrations ; ; 26 cm
Disciplina 332.1/78
Altri autori (Persone) KellermannTom
McNevinValerie
Collana World Bank working paper
Soggetto topico Electronic funds transfers - Security measures
Electronic security systems
ISBN 1-280-08433-2
9786610084333
1-4175-0059-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910780202803321
Glaessner Thomas C  
Washington, D.C. : , : World Bank, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic safety and soundness : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin
Electronic safety and soundness : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin
Autore Glaessner Thomas C
Edizione [1st ed.]
Pubbl/distr/stampa Washington, DC, : World Bank, 2004
Descrizione fisica ix, 174 pages : illustrations ; ; 26 cm
Disciplina 332.1/78
Altri autori (Persone) KellermannTom
McNevinValerie
Collana World Bank working paper
Soggetto topico Electronic funds transfers - Security measures
Electronic security systems
ISBN 1-280-08433-2
9786610084333
1-4175-0059-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- TABLE OF CONTENTS -- Foreword -- Abstract -- Preface -- Executive Summary -- 1. Introduction to E-Security -- 2. Policy Framework -- 3. Legal and Regulatory Framework (Pillar 1) -- 4. External Monitoring of E-Security Practices (Pillar 2) -- 5. Certifications, Policies, Standards, and Procedures (Pillar 3) -- 6. Twelve Layers of Security (Pillar 4) -- Annexes: -- Annex A: Selected Public E-Security Incidents -- Annex B: Types of E-Fraud -- Annex C: Worldwide E-Security Industry -- Annex D: Risk Management: A Blueprint for Layered Security -- Annex E: Identity Management: Authentication and Non-Repudiation -- Annex F: Wireless Vulnerabilities -- Glossary -- References -- LIST OF BOXES: -- Box 1.1: Money Laundering -- Box 1.2: Selected Country Case Studies -- Box 2.1: G8 Principles for Protecting Critical Information Infrastructures 2003 -- Box 2.2: The Electronic Security Industry: Imperfect Competition -- Box 3.1: Money Transmitters and Internet Service Providers -- Box 4.1: Principles for Managing Risk in Online Banking -- Box 4.2: ISO/IEC 13335 Information Technology-Security Techniques-Guidelines for the Management of IT Security GMITS -- Box 6.1: Instant Messaging -- Box 6.2: Blended Threats -- Box 6.3: Survivable System Development -- Box B.1: Voice-over-IP (VOIP) -- Box B.2: Case Study: Bugbear.B -- Box B.3: Identity Theft: Abraham Abdallah -- Box C.1: Evolution of Technology and International Standards -- Box D.1: BITs Master Security Criteria -- Box D.2: The Future of Access Controls -- Box D.3: Next Generation Instruction Detection System -- Box D.4: SQL Vulnerability -- LIST OF FIGURES: -- Figure 1.1: E-Finance Penetration: 2000 and Projected Rates for 2005 and 2010 -- Figure 1.2: Number of Incidents Reported by CERT, Worldwide -- Figure 6.1: Five Layers of Data Flow -- Figure B.1: Computer Incidents 1990-2002.
Figure C.1: E-Security Industry and E-Finance -- Figure E.1: Biometric Iris Scan -- Figure E.2: Biometric Fingerprint Scan -- Figure E.3: Access Control Terminal -- Figure E.4: Biometric Facial Scan -- Figure E.5: Keystroking -- Figure E.6: Global Positioning Biometrics -- Figure E.7: Generation of Digital Signatures -- Figure E.8: Authentication Using Digital Certificates and Certificate Authorities -- Figure F.1: A GSM Hack -- Figure F.2: Diagram of a Virtual Private Network -- LIST OF TABLES: -- Table 1.1: Global Connectivity Trends -- Table B.1: Potential Losses from a Denial of Service Attack -- Table F.1: The Wide Range of Mobile Services.
Record Nr. UNINA-9910820872503321
Glaessner Thomas C  
Washington, DC, : World Bank, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson
Autore Pearson Robert L
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (382 p.)
Disciplina 621.389/28
Soggetto topico Electronic security systems
Office buildings - Security measures
Business enterprises - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-01472-9
9786611014728
0-08-049470-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions; Copyright Page; Table of Contents; Preface; Acknowledgments; Chapter 1. Electronic Access Control; Chapter 2. Badge Making; Chapter 3. Biometrics; Chapter 4. Electronic Alarm Systems; Chapter 5. Fire Systems; Chapter 6. Exterior and Interior Security Sensors; Chapter 7. Closed Circuit Television; Chapter 8. Wireless; Chapter 9. Intercoms and Controls; Chapter 10. Security Control Center; Chapter 11. Database Management; Chapter 12. System Configuration Control
Chapter 13. Process AutomationChapter 14. Building Automation; Chapter 15. Integration; Chapter 16. Consolidation; Chapter 17. Maintenance and Testing; Chapter 18. Security Design Process; Chapter 19. Special Compliance; Chapter 20. Trends; Appendix A. Pros and Cons of a Consolidated Database; Appendix B. Security Audit; Appendix C. Integration Tips; Appendix D. Technical Security Job Grades; Appendix E. Interviewing; Index; About the Author
Record Nr. UNINA-9910457081903321
Pearson Robert L  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson
Autore Pearson Robert L
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Descrizione fisica 1 online resource (382 p.)
Disciplina 621.389/28
Soggetto topico Electronic security systems
Office buildings - Security measures
Business enterprises - Security measures
ISBN 1-281-01472-9
9786611014728
0-08-049470-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions; Copyright Page; Table of Contents; Preface; Acknowledgments; Chapter 1. Electronic Access Control; Chapter 2. Badge Making; Chapter 3. Biometrics; Chapter 4. Electronic Alarm Systems; Chapter 5. Fire Systems; Chapter 6. Exterior and Interior Security Sensors; Chapter 7. Closed Circuit Television; Chapter 8. Wireless; Chapter 9. Intercoms and Controls; Chapter 10. Security Control Center; Chapter 11. Database Management; Chapter 12. System Configuration Control
Chapter 13. Process AutomationChapter 14. Building Automation; Chapter 15. Integration; Chapter 16. Consolidation; Chapter 17. Maintenance and Testing; Chapter 18. Security Design Process; Chapter 19. Special Compliance; Chapter 20. Trends; Appendix A. Pros and Cons of a Consolidated Database; Appendix B. Security Audit; Appendix C. Integration Tips; Appendix D. Technical Security Job Grades; Appendix E. Interviewing; Index; About the Author
Record Nr. UNINA-9910784355003321
Pearson Robert L  
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui