E-viri
-
Robert L. Pearson
Electronic Security Systems, 2007Book Chapter
This chapter discusses the security design process. A tremendous effort goes into the approval process for a new installation project. Months and maybe years go by having areas with poor security or a security control center (SCC) that is inadequate and inefficient. Security is always competing against other groups within the company for limited funding. As companies focus on their core business, it is even more difficult to designate funds for security, when it could be used by the part of the company that makes money. The Security department is considered a “necessary evil” and an overhead burden on the company. Although the Security department does not normally make a profit, it does enable other departments to do so. To assure the success of security design project, it is important that the steps up to the point of acceptance of the project are properly handled. These steps include security survey, functional requirements, design, procurement, installation, testing, initial operation, and ongoing support.
Avtor
![loading ... loading ...](themes/default/img/ajax-loading.gif)
Vnos na polico
Trajna povezava
- URL:
Faktor vpliva
Dostop do baze podatkov JCR je dovoljen samo uporabnikom iz Slovenije. Vaš trenutni IP-naslov ni na seznamu dovoljenih za dostop, zato je potrebna avtentikacija z ustreznim računom AAI.
Leto | Faktor vpliva | Izdaja | Kategorija | Razvrstitev | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Baze podatkov, v katerih je revija indeksirana
Ime baze podatkov | Področje | Leto |
---|
Povezave do osebnih bibliografij avtorjev | Povezave do podatkov o raziskovalcih v sistemu SICRIS |
---|
Vir: Osebne bibliografije
in: SICRIS
To gradivo vam je dostopno v celotnem besedilu. Če kljub temu želite naročiti gradivo, kliknite gumb Nadaljuj.