Title |
Author |
Type |
Date |
Words |
F-Secure releases latest version of Android security protection. |
|
Brief article |
Jun 30, 2010 |
137 |
Israeli Goodwill Gestures to PA. |
|
|
May 24, 2010 |
87 |
Heightened State of Alert as Yom Kippur Approaches. |
|
Brief article |
Sep 27, 2009 |
86 |
The Ides of March. |
Coffin, Bill |
|
Mar 1, 2009 |
776 |
ESDP : MERKEL AND SARKOZY PROCLAIM THEIR FAITH IN COMMON SECURITY. |
|
|
Feb 6, 2009 |
431 |
Orissa has peaceful Christmas. |
|
Brief article |
Jan 9, 2009 |
153 |
Button down security amid the festivities. |
|
|
Dec 1, 2008 |
625 |
Container scanning. |
Wagenheim, Kal |
Brief article |
Sep 1, 2008 |
152 |
Preventing the next campus shooting. |
Harwood, Matt |
|
Aug 1, 2007 |
4458 |
Rattlesnakes and other surprise solutions. |
Longmore-Etheridge, Ann |
|
Aug 1, 2007 |
3046 |
Protecting Turkey's Heritage. |
Elliott, Robert |
|
Aug 1, 2007 |
3305 |
Campus access controlled: in need of an access control system, security at the University of Pittsburgh sought a solution that would support existing ID cards. |
Anderson, Teresa |
|
Jul 1, 2007 |
806 |
How smart is the government's plan? |
Hartsook, Shelly; Hannah, Gordon |
|
Jul 1, 2007 |
2076 |
Towers of integrity: rebuilding fraud free. |
Wetzel, Deborah |
|
Jul 1, 2007 |
2697 |
Scanning security. |
|
Brief article |
Mar 1, 2006 |
132 |
Group accuses nuclear plant of security lapses. |
|
Brief Article |
Feb 1, 2006 |
225 |
Maritime security. |
Wade, Jared |
|
Dec 1, 2005 |
1685 |
Disaster planning. |
|
|
Oct 1, 2005 |
1365 |
CIOs to turn night watchmen. |
|
|
Jun 10, 2005 |
349 |
Keeping Coast Guard cutters afloat a full-time chore. |
Pappalardo, Joe |
|
May 1, 2005 |
2859 |
$ecurity Support Services spending to skyrocket. |
|
Brief Article |
Dec 1, 2004 |
144 |
EU/IRAQ: EXPLORATORY MISSION TO IDENTIFY COURSE OF ACTION. |
|
|
Sep 15, 2004 |
429 |
Spotlight on security: cooperation between private and public sectors can make everyone safer. |
Garrett, Kelly |
Cover Story |
Sep 1, 2004 |
3995 |
Asa Hutchinson watchful of the diplomacy of security. |
Pappalardo, Joe |
|
Aug 1, 2004 |
759 |
How to assess resource allocation: an objective self-assessment can help a facility determine where to allocate precious resources and how to justify security expenditures to management. |
Warren, Bryan |
|
May 1, 2004 |
2452 |
I know what you did last shift: a new study examines why employees don't report security concerns about coworkers and what management can do. |
Wood, Suzanne |
|
Apr 1, 2004 |
1985 |
How to take the easy way out: U.K. businesses have adapted emergency response procedures to the new threat environment. |
Cohen, Lawrence Mark |
|
Oct 1, 2003 |
4103 |
A high-tech lobby. (Working Wise). |
Piazza, Peter |
Brief Article |
Jul 1, 2002 |
924 |
Simple, effective control: Computer-managed locking systems simplify security. (Safety & Security). |
Koziol, Jeff |
Brief Article |
Apr 1, 2002 |
722 |
Partners in protection: By combining IT and physical security, this company saved money and improved response time to incidents. (Management). |
Morris, James R. |
|
Feb 1, 2002 |
2822 |
JUSTICE AND HOME AFFAIRS COUNCIL: SECURITY MEASURES FOR EU SUMMITS APPROVED. |
|
Brief Article |
Jul 18, 2001 |
449 |
Attacks, vulnerabilities increase. |
|
Brief Article |
Jul 1, 2001 |
146 |
Running on Manual. |
BOYNTON, RANDALL S. |
|
Jun 1, 2001 |
2590 |
E-Signed, Sealed, and Delivered. |
Piazza, Peter |
|
Apr 1, 2001 |
3424 |
Revisiting Visitor Badging. |
REED, RICHARD B. |
|
Mar 1, 2001 |
1968 |
THE NEIGHBOR-FRIENDLY PERIMETER ASSESSMENT SYSTEM. |
HANSON, CHARLES G.; MOSIMANN, JERRY |
|
Jul 1, 2000 |
2043 |
Security Controls in Perspective: A Case Study of the St. Louis County Justice Center. |
BAKER, JIM; KOSTNER, DALE; LATTA, ALAN R. |
|
Apr 1, 2000 |
2311 |
How Can Companies Tackle Terrorism? |
DECKER, RONALD RAY |
|
Apr 1, 2000 |
1813 |
You've Only Just Begun. |
GUNDRUM, JACK W. |
|
Mar 1, 2000 |
3576 |
A high-tech alternative. |
Samburg, Gene |
|
Jun 1, 1999 |
844 |
Play it safe. |
McDaniel, Danny L. |
|
Jun 1, 1999 |
2435 |
The challenge of global gatherings. |
Patty, Ben |
|
Jun 1, 1999 |
3055 |
Profiting from overseas opportunities. |
O'Connor, Tara |
|
Jun 1, 1999 |
3181 |
Getting out while the getting's good. |
Joyce, Gene; Hurth, Larry |
|
May 1, 1999 |
2639 |
Fire protection finds a home. |
Schneider, Paul G., Jr. |
|
May 1, 1999 |
1784 |
Investing in better controls. |
Kirch, John F. |
|
May 1, 1999 |
2383 |
Crafting a cohesive program. |
Lex, Mark S. |
|
Mar 1, 1999 |
2512 |
Merger, they wrote. |
Anderson, Teresa |
|
Mar 1, 1999 |
2390 |
Security's human resourcefulness. |
Wilson, Timothy M.; Bielec, Miles |
|
Mar 1, 1999 |
4975 |
An ounce of prevention. |
Raiford, Regina |
|
Mar 1, 1999 |
1872 |
Mastering security amid merger mania. |
Arnheim, Louise A. |
Cover Story |
Feb 1, 1999 |
2693 |
In the eye of the beholder. |
Smith, Ernie |
|
Feb 1, 1999 |
2916 |
Just say yes. |
Jones, Russell F., Jr. |
|
Feb 1, 1999 |
2856 |
Mapping a network security strategy. |
Middleton, Bruce |
|
Feb 1, 1999 |
3647 |
Avoiding a date with destiny. |
Hassett, Daniel B. |
|
Feb 1, 1999 |
2728 |
Score with the right game plan. |
Cottringer, William |
|
Dec 1, 1998 |
1097 |
Restructuring to reduce losses. |
Osborn, Charles W. |
|
Dec 1, 1998 |
3106 |
To the manner born. |
|
|
Nov 1, 1998 |
509 |
Command performance. |
Hawkes, Kenneth Gale; Neal, Jim |
|
Nov 1, 1998 |
2648 |
How to face down fraud. |
Frank, Craig |
|
Sep 1, 1998 |
2258 |
When security means business. |
Cogan, Dan |
|
Sep 1, 1998 |
2638 |
A hospital staves off security ills. |
Parente, Genilee Swope |
|
Sep 1, 1998 |
2677 |
A fertile ground for security. |
Heinisch, Robert A. |
|
Sep 1, 1998 |
2574 |
Tackling the crime at its roots. |
Mittelstadt, Charles D. |
|
Aug 1, 1998 |
1146 |
Lock in a good key policy. |
Cameron, Charles |
|
Aug 1, 1998 |
2618 |
Secure places: different facility types call for different security strategies. |
Watkins-Miller, Elaine |
|
May 1, 1998 |
1994 |
The ties that bind. |
Davis, Stephen M. |
|
Apr 1, 1998 |
2621 |
Cruise control. |
Gips, Michael A. |
|
Mar 1, 1998 |
567 |
The pain of problem solving. |
Cottringer, William |
|
Mar 1, 1998 |
1702 |
Building a whole that's greater than its parts. |
Murphy, Roy J. |
|
Mar 1, 1998 |
1977 |
Finding the path of reason. |
Metscher, Robert |
|
Dec 1, 1997 |
1207 |
May the force be with you. |
Morris, Cole |
|
Nov 1, 1997 |
2293 |
Security and the beast. |
Burgess, Cary S. |
|
Sep 1, 1997 |
3215 |
The real deal on seals. |
Johnston, Roger G. |
|
Sep 1, 1997 |
3179 |
Read all about it. |
Koslow, Bruce N. |
|
Sep 1, 1997 |
2278 |
The next chapter in library security. |
Thompson, Amy |
|
Aug 1, 1997 |
1841 |
Taking stock of losses. |
Talbott, Paul G. |
Cover Story |
Jun 1, 1997 |
2780 |
Graduating to an integrated system. |
Gundrum, Jack W.; Bryan, Michael |
|
Jun 1, 1997 |
3886 |
I survived an upgrade. |
Williams, Dean D. |
|
Jun 1, 1997 |
3041 |
Giving security space at the mall. |
Johnson, Brian R. |
|
Jun 1, 1997 |
2326 |
Capture the big picture: time-lapse video delivers the goods on security. |
Collazo, Sergio |
|
Jun 1, 1997 |
551 |
Security with a light touch. |
Leslie, Russell P. |
|
Mar 1, 1997 |
2443 |
The vital signs of life safety. |
Gilbert, Gregory A. |
|
Jan 1, 1997 |
2842 |
At home abroad. |
Richardson, Charles N. |
|
Jan 1, 1997 |
3668 |
Management lessons from the computer age. |
Cottringer, William |
|
Nov 1, 1996 |
1503 |
Continuous improvement in prison security. |
Czerniak, Stan W.; Upchurch, James R. |
Cover Story |
Jul 1, 1996 |
1729 |
Security seals the deal. |
DeJesus, Anthony P. |
|
Jun 1, 1996 |
3433 |
Keeping your guard up. |
McNicholas, James F. |
|
Apr 17, 1996 |
944 |
Contracting with confidence. |
Walla, J. Robert |
|
Feb 1, 1996 |
2034 |
The painless path to policy revision. |
Fletcher, William |
|
Feb 1, 1996 |
2497 |
Security, heal thyself. |
Crawford, Jay B. |
|
May 1, 1995 |
3358 |
Making a clean sweep of spies. |
Spring, Stephen |
|
Apr 1, 1995 |
2271 |
Caterpillar creates a new security landscape. |
Blackwell, Ray |
|
Mar 1, 1995 |
1920 |
The next generation. |
Somerson, Ira S. |
|
Jan 1, 1995 |
3215 |
Balancing security systems and procedures. |
Phelps, E. Floyd |
|
Sep 1, 1994 |
2005 |
Major league security hits the minors. |
Arbetter, Lisa |
|
Aug 1, 1994 |
4046 |
Maintaining quality through management reviews. |
DeSalvo, Gerald L. |
|
Aug 1, 1994 |
1781 |
Security's challenges: a roundtable discussion. |
Goldberg, Joel A. |
Panel Discussion |
Jul 1, 1994 |
2475 |
Safeguarding Virginia's colonial past. |
McDaniel, Danny |
|
Jul 1, 1994 |
3438 |
Profile. |
|
|
Apr 1, 1994 |
263 |
Making success a shared responsibility. |
Zaleski, John E. |
|
Mar 1, 1994 |
1098 |
Prepared to be alarmed. |
McCullough, Joseph B. |
|
Mar 1, 1994 |
2367 |
Showdown in the financial industry. |
Wipprecht, William R. |
|
Mar 1, 1994 |
2253 |
The future of ATM security. |
Schreiber, F. Barry |
|
Mar 1, 1994 |
2827 |
Detecting weak links in executive armor. |
Boim, Israel; Smith, Karen |
|
Feb 1, 1994 |
2405 |
The premise behind premises liability. |
Kahn, James R. |
|
Feb 1, 1994 |
2539 |
Understanding the nature of leadership. |
Smith, Jim L. |
Column |
Jan 1, 1994 |
1140 |
Reengineering security's role. |
Harowitz, Sherry |
|
Nov 1, 1993 |
4041 |
The fast track to secure construction. |
Whittle, Thomas J.; Lee, James H. |
|
Nov 1, 1993 |
1771 |
The armored car quagmire. |
McGuffey, Jim |
|
Nov 1, 1993 |
1628 |
The budget paradox. |
Surette, Kevin J. |
Column |
Nov 1, 1993 |
1337 |
Facility management takes center stage. |
Norton, Tim |
|
Nov 1, 1993 |
1607 |
Have we made security an issue? |
Surette, Kevin J. |
Column |
Nov 1, 1993 |
1437 |
Managing a successful expansion. |
Ansley, Robert L. |
|
Oct 1, 1993 |
3645 |
Maintaining integrity. |
Truncer, Earl E.; Magee, Maureen L. |
|
Jun 1, 1993 |
2473 |
Has your store had a check-up? |
Adler, Steven |
|
Apr 1, 1993 |
1309 |
New Security Technology. |
Rykert, Wilbur |
|
Mar 1, 1993 |
1857 |
An investment in asset protection. |
Campbell, George K.; Ennis, Michael; Mulattieri, John |
|
Mar 1, 1993 |
1976 |
A painless approach to construction cost estimating. |
Nason, Randall R. |
|
Nov 1, 1992 |
1598 |
Nuisance annihilation. |
|
|
Nov 1, 1992 |
325 |
On the line with data transmission. |
Sentell, Ronald J. |
|
Nov 1, 1992 |
2208 |
Building blocks for child care security. |
Wells, James W. |
|
Nov 1, 1992 |
1104 |
Deciphering the fine print. |
Roughton, James E. |
|
Nov 1, 1992 |
2019 |
Trust but verify. |
Rosen, Mark B. |
|
Nov 1, 1992 |
2661 |
The big deal with barriers. |
Cook, Gary R. |
|
Nov 1, 1992 |
1654 |
A compromising situation. |
Aggleton, David G. |
|
Nov 1, 1992 |
2223 |
Manufacturing a secure partnership. |
Scroger, Charles W. |
|
Aug 1, 1992 |
1149 |
One by land, two by air. |
Backler, Michael A. |
|
Jun 1, 1992 |
2985 |
Can we keep up with the changing times? |
Beaudry, Mark H. |
Column |
May 1, 1992 |
573 |
Computing a successful system. |
Rauschhuber, Brian J. |
|
Apr 1, 1992 |
2302 |
Mastering the challege of securing a budget motel. |
Kohr, Robert L. |
|
Dec 1, 1991 |
3398 |
The ultimate test. |
Blauvelt, Peter D. |
|
Sep 1, 1991 |
2970 |
The task of terminating. |
Schulze, John C. |
|
Sep 1, 1991 |
2209 |
High security on High Street. |
Sampson, Paul |
|
Jul 1, 1991 |
865 |
Reactions to the war. |
Kornegay, Jennifer |
Cover Story |
Apr 1, 1991 |
2317 |
Take it from the top. |
Wade, James R. |
|
Mar 1, 1989 |
1582 |
Effective information networks combine flexibility with security. |
Bailey, James M. |
|
Jan 1, 1989 |
1933 |