2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2008 |
Disciplina | 005.8 |
Soggetto topico |
Computers - Design and construction - Circuits
Integrated circuits - Verification Computer security Electronic security systems Electrical & Computer Engineering Engineering & Applied Sciences Electrical Engineering |
ISBN | 1-5090-7858-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996205031403316 |
[Place of publication not identified], : IEEE, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Anaheim, CA, 9 June 2008 |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2008 |
Disciplina | 005.8 |
Soggetto topico |
Computers - Design and construction - Circuits
Integrated circuits - Verification Computer security Electronic security systems Electrical & Computer Engineering Engineering & Applied Sciences Electrical Engineering |
ISBN |
9781509078585
1509078584 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145387203321 |
[Place of publication not identified], : IEEE, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2011 IEEE International Symposium on Hardware-Oriented Security and Trust |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2011 |
Descrizione fisica | 1 online resource (ix, 166 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Electronic security systems |
ISBN | 1-4577-1058-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996208926203316 |
[Place of publication not identified], : IEEE, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2011 IEEE International Symposium on Hardware-Oriented Security and Trust |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2011 |
Descrizione fisica | 1 online resource (ix, 166 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Electronic security systems |
ISBN |
9781457710582
1457710587 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910141132103321 |
[Place of publication not identified], : IEEE, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic Access Control |
Autore | Norman Thomas L |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | San Diego : , : Elsevier Science & Technology, , 2017 |
Descrizione fisica | 1 online resource (566 pages) |
Disciplina | 621.38928 |
Soggetto topico |
Electronic security systems
Electronic locking devices |
ISBN | 0-12-805465-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover -- Electronic Access Control -- Copyright Page -- Contents -- I. The Basics -- 1 Introduction and Overview -- Chapter Overview -- Rules to Live By -- Who Should Read This Book? -- How Is Material Presented in This Book? -- What Will You Learn, and How Will It Help Your Career? -- What Is in This Book? -- Part I: the basics -- Chapter 2 -- Chapter 3 -- Part II: how things work -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Chapter 18 -- Part III: The things that make systems sing -- Chapter 19 -- Chapter 20 -- Chapter 21 -- Chapter 22 -- Chapter 23 -- Chapter 24 -- Chapter 25 -- Chapter 26 -- Chapter 27 -- Chapter Summary -- 2 Foundational Security and Access Control Concepts -- Chapter Overview -- Understanding Risk -- Types of organization assets -- Types of users -- Types of threat actors -- Understanding criticalities and consequences -- Understanding vulnerability -- Understanding probability -- What is risk? -- Managing Risk -- Methods of managing risk -- How security and access control programs help manage risk -- Security program elements -- The importance of a qualified risk analysis -- The importance of security policies and procedures -- Types of Countermeasures -- Hi-tech -- Lo-tech -- No-tech -- Mixing approaches -- Layering security countermeasures -- Access Control System Concepts -- Types of users -- Types of areas/groups -- User schedules -- Portal programming -- Credential programming -- Group and schedule programming -- Chapter Summary -- 3 How Electronic Access Control Systems Work -- Chapter Overview -- First, a Little History -- The Basics -- Authorized Users, User Groups, Access Zones, Schedules, and Access Groups -- Authorized users -- User groups -- Access zones.
Schedules -- Access groups -- Portals -- Types of portals -- Credential readers -- Electrified locks -- Safety systems -- Alarm monitoring -- Request-to-exit sensors -- Credentials and Credential Readers -- Credential authorization -- Locks, Alarms, and Exit Devices -- Electrified locks -- Alarms -- Exit Devices -- Data, Data Retention, and Reports -- Chapter Summary -- II. How Things Work -- 4 Access Control Credentials and Credential Readers -- Chapter Overview -- Access Credentialing Concepts -- Keypads -- Access Cards, Key Fobs, and Card Readers -- Wiegand Wire Cards -- 125K Passive Proximity Cards -- 125KHz (Low Frequency) Active Proximity Cards -- 13.56MHz (High Frequency) Contactless Smart Cards -- RFID Wireless Transmitter Systems -- Multitechnology Cards -- Mobile Phone Access Control -- Capture Card Reader -- Multitechnology Card Readers -- Biometric Readers -- Photo Identification -- Chapter Summary -- 5 Types of Access Controlled Portals -- Chapter Overview -- Portal Passage Concepts -- Card entry/free exit -- Card entry/card exit -- Tailgate detection -- Positive access control -- 2-Man rule -- Schedules -- Antipassback -- Pedestrian Portal Types -- Standard doors -- Automatic doors -- Revolving doors -- Turnstiles -- Man-traps -- Automated walls -- Vehicle Portals -- Standard barrier gates -- Automated vehicle swing gates -- Automated sliding vehicle gates -- Automated roll-up vehicle gates -- High-security barrier gates -- Sally ports -- Chapter Summary -- 6 Life Safety and Exit Devices -- Chapter Overview -- Life Safety First -- Security Versus Life Safety -- Understanding National and Local Access Control Codes and Standards -- NFPA 101 -- International building code -- NFPA 72 -- More on these codes -- UL 294 -- Life Safety and Locks -- Life Safety and Exit Devices -- Life Safety and Fire Alarm System Interfaces -- Chapter Summary. 7 Door Types and Door Frames -- Chapter Overview -- Basics About Doors and Security -- Standard Single-Leaf and Double-Leaf Swinging Doors -- Hollow metal doors -- Solid core wood doors -- Framed glass doors -- Unframed glass doors -- Total doors -- Pivoting doors -- Balanced doors -- Door Frames and Mountings -- Hollow metal-high-use and high-impact -- Aluminum-medium-use and medium-impact -- Wood-light-use and light-impact -- Door mounting methods -- Overhead Doors -- Roll-up doors -- Paneled overhead doors -- Revolving Doors -- Sliding Panel Doors -- Bifold and Fourfold Doors -- Chapter Summary -- 8 Doors and Fire Ratings -- Chapter Overview -- What Are Fire Ratings? -- Basic fire egress concept -- How should this be done? -- Exceptions -- Fire Penetration Ratings -- Hose stream test -- Door Assembly Ratings -- The three-fourths rule -- Doors with glass -- Temperature rise doors -- Louvers -- Fire Door Frames and Hardware -- Latching devices -- Fire exit hardware -- Pairs of Doors -- Latching hardware -- Inactive leaf on pair of doors -- Double egress pairs -- Astragals -- Smoke and draft control -- "Path of Egress" Doors -- Electrified Locks and Fire Ratings -- Additional References -- Chapter Summary -- 9 Electrified Locks-Overview -- Chapter Overview -- Why Electric Locks? -- Types of Electrified Locks -- How Electrified Locks Work -- Electric strikes -- Electrified mortise locks -- Electrified panic hardware -- Electrified cylinder locks -- Magnetic locks -- Electrified dead-bolts -- Paddle-operated electromechanical dead-bolts -- Lock Power Supplies -- Electrified Lock Wiring Considerations -- Voltage drop example -- Electrified Lock Controls -- Types of Locks Not Recommended -- Chapter Summary -- 10 Free Egress Electrified Locks -- Chapter Overview -- Types of Free Egress Locks -- Electrified Mortise Locks -- Mortise latch only-no lock. Mortise locks with no dead-bolt -- Mortise locks with dead-bolts -- Door frame considerations -- Additional lock switch fittings -- Door handing -- Electrified "Panic" Hardware -- Rim exit devices -- Mortise lock exit devices -- Surface-mounted vertical rod exit devices -- Concealed vertical rod exit devices -- Three-point latching exit device -- Exit device functions -- Electrical options -- Popular double door applications -- Electric Strikes -- Switches available for electric strikes -- Electrified Cylinder Locks -- Self-Contained Access Control Locks -- Chapter Summary -- 11 Magnetic Locks -- Chapter Overview -- Standard Magnetic Locks -- Standard magnetic lock applications -- Magnetic Shear Locks -- Magnetic shear lock applications -- Magnetic Gate Locks -- Cautions About Magnetic Locks -- Egress assurance -- Operational and maintenance warnings -- Chapter Summary -- 12 Electrified Dead-Bolt Locks -- Chapter Overview -- Surface-Mounted Electrified Dead-Bolt Locks -- Concealed Direct-Throw Mortise Dead-Bolt Lock -- Dead-Bolt Equipped Electrified Mortise Lock -- Top-Latch Release Bolt -- Electrified Dead-Bolt Gate Locks -- Electrified dead-bolt lock safety provisions -- Chapter Summary -- 13 Specialty Electrified Locks -- Chapter Overview -- Electrified Dead-Bolt-Equipped Panic Hardware -- Securitech Locks -- Delayed Egress Locks -- Specialize school locks to protect against active shooters -- Hi-Tower Locks -- CRL-Blumcraft Panic Hardware -- Chapter Summary -- 14 Selecting the Right Lockset for a Door -- Chapter Overview -- Standard Application Rules -- How to Select the Right Lock for Any Door -- Description of door -- Framed glass door -- Herculite lobby doors -- High-rise building stair-tower door -- Rear-exit door on warehouse with hi-value equipment -- Office suite door -- Double-egress doors-hospital corridor -- Inswinging office door. Revolving door-emergency egress side door -- Chapter Summary -- 15 Specialized Portal Control Devices and Applications -- Chapter Overview -- Specialized Portals for Pedestrians -- Automatic doors -- Man-traps -- Full-verification portals -- Electronic turnstiles -- Antitailgate alarm -- Specialized Portals for Vehicles -- High-security barrier gates -- Sally ports -- Chapter Summary -- 16 Industry History That can Predict the Future -- Chapter Overview -- A Little Background -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Stalled progress -- Fifth Generation -- Avoiding Obsolescence -- Planned obsolescence -- Unplanned obsolescence -- What the future holds -- Chapter Summary -- 17 Access Control Panels and Networks -- Chapter Overview -- Access Control Panel Attributes and Components -- Communications Board -- Power supply and battery -- Central processing unit -- Erasable programmable read-only memory -- Random access memory -- Input/output interfaces -- Access Control Panel Form Factors -- Access Control Panel Functions -- Access Control Panel Locations -- Local and Network Cabling -- Networking Options -- Redundancy and Reliability Factors -- Good wiring and installation -- Good design -- Good power -- Good data infrastructure -- Redundancy -- Chapter Summary -- 18 Access Control System Servers and Workstations -- Chapter Overview -- Server/Workstation Functions -- Store system configurations -- Store the system's historical event data -- Manage communications throughout the entire system -- Serve workstations with real-time data and reports -- Decision Processes -- System Scalability -- Unscalable Systems -- Basic scalability -- Multisite systems -- System-wide card compatibility -- Enterprise-wide system -- Master host -- Super-host/subhost -- Access Control System Networking -- The core network. The server network. |
Record Nr. | UNINA-9910583003703321 |
Norman Thomas L | ||
San Diego : , : Elsevier Science & Technology, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic safety and soundness [[electronic resource] ] : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin |
Autore | Glaessner Thomas C |
Pubbl/distr/stampa | Washington, DC, : World Bank, 2004 |
Descrizione fisica | 1 online resource (187 p.) |
Disciplina | 332.1/78 |
Altri autori (Persone) |
KellermannTom
McNevinValerie |
Collana | World Bank working paper |
Soggetto topico |
Electronic funds transfers - Security measures
Electronic security systems |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-08433-2
9786610084333 1-4175-0059-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910455831603321 |
Glaessner Thomas C | ||
Washington, DC, : World Bank, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic safety and soundness : : securing finance in a new age / / Thomas C. Glaessner, Tom Kellermann, Valerie McNevin |
Autore | Glaessner Thomas C |
Pubbl/distr/stampa | Washington, D.C. : , : World Bank, , 2004 |
Descrizione fisica | ix, 174 pages : illustrations ; ; 26 cm |
Disciplina | 332.1/78 |
Altri autori (Persone) |
KellermannTom
McNevinValerie |
Collana | World Bank working paper |
Soggetto topico |
Electronic funds transfers - Security measures
Electronic security systems |
ISBN |
1-280-08433-2
9786610084333 1-4175-0059-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910780202803321 |
Glaessner Thomas C | ||
Washington, D.C. : , : World Bank, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic safety and soundness : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin |
Autore | Glaessner Thomas C |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Washington, DC, : World Bank, 2004 |
Descrizione fisica | ix, 174 pages : illustrations ; ; 26 cm |
Disciplina | 332.1/78 |
Altri autori (Persone) |
KellermannTom
McNevinValerie |
Collana | World Bank working paper |
Soggetto topico |
Electronic funds transfers - Security measures
Electronic security systems |
ISBN |
1-280-08433-2
9786610084333 1-4175-0059-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- TABLE OF CONTENTS -- Foreword -- Abstract -- Preface -- Executive Summary -- 1. Introduction to E-Security -- 2. Policy Framework -- 3. Legal and Regulatory Framework (Pillar 1) -- 4. External Monitoring of E-Security Practices (Pillar 2) -- 5. Certifications, Policies, Standards, and Procedures (Pillar 3) -- 6. Twelve Layers of Security (Pillar 4) -- Annexes: -- Annex A: Selected Public E-Security Incidents -- Annex B: Types of E-Fraud -- Annex C: Worldwide E-Security Industry -- Annex D: Risk Management: A Blueprint for Layered Security -- Annex E: Identity Management: Authentication and Non-Repudiation -- Annex F: Wireless Vulnerabilities -- Glossary -- References -- LIST OF BOXES: -- Box 1.1: Money Laundering -- Box 1.2: Selected Country Case Studies -- Box 2.1: G8 Principles for Protecting Critical Information Infrastructures 2003 -- Box 2.2: The Electronic Security Industry: Imperfect Competition -- Box 3.1: Money Transmitters and Internet Service Providers -- Box 4.1: Principles for Managing Risk in Online Banking -- Box 4.2: ISO/IEC 13335 Information Technology-Security Techniques-Guidelines for the Management of IT Security GMITS -- Box 6.1: Instant Messaging -- Box 6.2: Blended Threats -- Box 6.3: Survivable System Development -- Box B.1: Voice-over-IP (VOIP) -- Box B.2: Case Study: Bugbear.B -- Box B.3: Identity Theft: Abraham Abdallah -- Box C.1: Evolution of Technology and International Standards -- Box D.1: BITs Master Security Criteria -- Box D.2: The Future of Access Controls -- Box D.3: Next Generation Instruction Detection System -- Box D.4: SQL Vulnerability -- LIST OF FIGURES: -- Figure 1.1: E-Finance Penetration: 2000 and Projected Rates for 2005 and 2010 -- Figure 1.2: Number of Incidents Reported by CERT, Worldwide -- Figure 6.1: Five Layers of Data Flow -- Figure B.1: Computer Incidents 1990-2002.
Figure C.1: E-Security Industry and E-Finance -- Figure E.1: Biometric Iris Scan -- Figure E.2: Biometric Fingerprint Scan -- Figure E.3: Access Control Terminal -- Figure E.4: Biometric Facial Scan -- Figure E.5: Keystroking -- Figure E.6: Global Positioning Biometrics -- Figure E.7: Generation of Digital Signatures -- Figure E.8: Authentication Using Digital Certificates and Certificate Authorities -- Figure F.1: A GSM Hack -- Figure F.2: Diagram of a Virtual Private Network -- LIST OF TABLES: -- Table 1.1: Global Connectivity Trends -- Table B.1: Potential Losses from a Denial of Service Attack -- Table F.1: The Wide Range of Mobile Services. |
Record Nr. | UNINA-9910820872503321 |
Glaessner Thomas C | ||
Washington, DC, : World Bank, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson |
Autore | Pearson Robert L |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (382 p.) |
Disciplina | 621.389/28 |
Soggetto topico |
Electronic security systems
Office buildings - Security measures Business enterprises - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-01472-9
9786611014728 0-08-049470-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions; Copyright Page; Table of Contents; Preface; Acknowledgments; Chapter 1. Electronic Access Control; Chapter 2. Badge Making; Chapter 3. Biometrics; Chapter 4. Electronic Alarm Systems; Chapter 5. Fire Systems; Chapter 6. Exterior and Interior Security Sensors; Chapter 7. Closed Circuit Television; Chapter 8. Wireless; Chapter 9. Intercoms and Controls; Chapter 10. Security Control Center; Chapter 11. Database Management; Chapter 12. System Configuration Control
Chapter 13. Process AutomationChapter 14. Building Automation; Chapter 15. Integration; Chapter 16. Consolidation; Chapter 17. Maintenance and Testing; Chapter 18. Security Design Process; Chapter 19. Special Compliance; Chapter 20. Trends; Appendix A. Pros and Cons of a Consolidated Database; Appendix B. Security Audit; Appendix C. Integration Tips; Appendix D. Technical Security Job Grades; Appendix E. Interviewing; Index; About the Author |
Record Nr. | UNINA-9910457081903321 |
Pearson Robert L | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Electronic security systems [[electronic resource] ] : a manager's guide to evaluating and selecting system solutions / / Robert L. Pearson |
Autore | Pearson Robert L |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 |
Descrizione fisica | 1 online resource (382 p.) |
Disciplina | 621.389/28 |
Soggetto topico |
Electronic security systems
Office buildings - Security measures Business enterprises - Security measures |
ISBN |
1-281-01472-9
9786611014728 0-08-049470-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions; Copyright Page; Table of Contents; Preface; Acknowledgments; Chapter 1. Electronic Access Control; Chapter 2. Badge Making; Chapter 3. Biometrics; Chapter 4. Electronic Alarm Systems; Chapter 5. Fire Systems; Chapter 6. Exterior and Interior Security Sensors; Chapter 7. Closed Circuit Television; Chapter 8. Wireless; Chapter 9. Intercoms and Controls; Chapter 10. Security Control Center; Chapter 11. Database Management; Chapter 12. System Configuration Control
Chapter 13. Process AutomationChapter 14. Building Automation; Chapter 15. Integration; Chapter 16. Consolidation; Chapter 17. Maintenance and Testing; Chapter 18. Security Design Process; Chapter 19. Special Compliance; Chapter 20. Trends; Appendix A. Pros and Cons of a Consolidated Database; Appendix B. Security Audit; Appendix C. Integration Tips; Appendix D. Technical Security Job Grades; Appendix E. Interviewing; Index; About the Author |
Record Nr. | UNINA-9910784355003321 |
Pearson Robert L | ||
Amsterdam ; ; Boston, : Butterworth-Heinemann, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|