Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 13330 dokumen yang sesuai dengan query
cover
June, Dale L.
London: CRC Press, Taylor & Francis Group, 2008
658.473 JUN i
Buku Teks SO  Universitas Indonesia Library
cover
New York: Taylor & Francis Group, 2008
363.179 INT
Buku Teks  Universitas Indonesia Library
cover
Barnum, Barbara Stevens
Maryland: An Aspen, 1995
362.173 BAR n
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks SO  Universitas Indonesia Library
cover
Mohammad Tehranipoor, editor
"This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures."
New York: [Springer, ], 2012
e20418611
eBooks  Universitas Indonesia Library
cover
London: ICOM, 1993
R 069.54 MUS
Buku Referensi  Universitas Indonesia Library
cover
Benny, Daniel J
"Machine generated contents note: 1.Importance of Culture Property Protection: Museums, Historic Sites, Archives, and Libraries
Introduction
Museums
Private Museums
Local Museums
County Museums
State Museums
National Museums
Military Museums
Historic Sites
Private, Local, and County Historic Sites
State Historic Sites
National Historic Sites
Archives
Private, Local, and County Archives
State Archives
National Archives
Libraries
Private Libraries
Campus Libraries
Local Libraries
County Libraries
State Libraries
National Libraries
Summary
Bibliography
2.Security Threats to Museums, Historic Sites, Archives, and Libraries
Security Threats to Museums
Security Threats to Historic Sites
Security Threats to Archives
Security Threats to Libraries
Security Threats to Individuals
Workplace Violence
Prevention of Violence in the Workplace
Identification of Behavioral Indicators
Contents note continued: Threats from Terrorism
Target Selection
Counter Terrorism
Signs of Terrorism
3.Physical Security Protection for Museums, Historic Sites, Archives, and Libraries
Intrusion and Fire Detection Systems
Security Cameras
Determining Total System Costs
Design Costs
Installation Costs
Operational Costs
IT Costs
Maintenance Costs
Replacement Costs
Cost-Benefit Analysis
Cost Factors
Benefit Factors
Cost of Loss
Prevention Costs
Return on Investment
Lock and Key Control
Mechanical Locks
Wafer Tumbler Locks
Dial Combination Locks
High Security Dead Bolt Locks
Card Access Electrified Locks
Exit Locks
Master Locking Systems
Control of Keys and Locking Devices
Master Keys
Duplication
Lost Keys
Disposition at Transfer or Termination
Security Containers
Security Filing Cabinets
Security Barriers and Fencing
Security Lighting
Contents note continued: Protection of Windows and Utility Ports
Radio Frequency Identification, Magnetometers, and X-Ray Devices
Protection of Artifacts
Artifacts on Display
Artifacts in Storage
Artifacts in Transit
Protection of Books, Publications, Documents, and Photographs
Internet Protection
4.Security Department Organization and Operation
Chief Security Officer
Determining Size of Department
Mission
Legal Authorization to Protect Property
Property Profile and Security Threats
Proprietary Security Force
Contract Security Force
Uniforms and Identification
Staff and Visitor Identification
Protective Equipment
Use of Force Continuum
Vehicles
Communications
Report Procedures
Protection of Department Information
Lost and Found
Ethics and Conduct
Ethics
Conduct
Training
Professional Certifications
Recruitment and Supervision
Patrols
Service Calls
Vehicle Stops
Contents note continued: Authority
Approaching Suspect Vehicle with Patrol Vehicle
Felony Vehicle Inquiries
Use of Force
Handcuffs
Oleoresin Capsicum (OC)
Extremities as Defensive Weapons
Batons
Firearms
Investigations
Apprehension and Arrest
Court Testimony
Security Information Center
Dealing with Media
5.Safety and Fire Protection
General Safety Policy
Safety Culture
Safety Program
Safety Coordinator
Fire Protection
Inspections
Protection Equipment
Fire Evacuation Plans and Drills
Employee and Visitor Protection Measures
Right-to-Know Worker Protection Act
Hazardous Chemical Inventory
Material Safety Data Sheets (MSDS)
Container Marking
Bloodborne Pathogens Act
Policy
Exposure Control Officer
Department Managers and Supervisors
Education or Training Coordinator
Employees
Exposure Determination
Universal Precautions and Engineering Controls
Contents note continued: Hepatitis B Vaccination Program
Hazardous Waste Management
6.Emergency Responses
Medical Emergencies
Responding to Medical Emergencies
Treatment of Victim
Vehicle Accidents
Fires
Evacuation
Firefighting
Gas Leaks
Important Safety Precautions
Severe Weather and Natural Disasters
Bomb Threats
Notification and Evacuation
Bomb Search
Return to Facility
Hostage Situations
Appendix A Commonwealth of Pennsylvania Library Theft Act
(Act 95 of Session 1982, 18 Purdon's Statutes [&​#x00A7;]3929.1)
House Bill 671
Appendix B Cultural Property Resources
Professional Cultural Property Security Organizations
Professional Cultural Property Organizations
Regional and State Museum Conferences and Associations
Regional Conservation Guilds and Associations
Cultural Property Journals and Publications
Cultural Property Funding Organizations
Contents note continued: Cultural Property Organizations for Reporting Thefts
Appendix C Cultural Property Physical Security Checklist
Perimeter Barriers
Protective Lighting
Intrusion Detection System
Security Communications
Personnel Identification and Control
Lock Security
Security Force
Appendix D Cultural Property Key Control Program Checklist
A.Control measures
B.Custodians appointed in writing for
C.Quarterly inspections
D.Access roster
E.Keys and padlocks
F.Key depositories
G.Combination locks
H.Seals and bands
Appendix E Cultural Property Security Force Checklist
Security Operation
Proprietary Security Department
Contract Security
Administration Issues
Miscellaneous."
Boca Raton, FL : CRC Press, 2013
363.69 BEN c
Buku Teks  Universitas Indonesia Library
cover
Wang, Jie
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>