Printer Friendly

Browse Security systems topic

Usage subtopic


1-129 out of 129 article(s)
Title Author Type Date Words
Use trusted apps, programs to link to home security systems: MoI. Sep 22, 2020 469
Use trusted apps, programs to link to home security systems: MoI. Sep 22, 2020 474
Dynamic Traffic Detection and Modeling for Beidou Satellite Networks. Qu, Yanyu; Pu, Fangling; Yin, Jianguo; Liu, Lingzi; Xu, Xin Mar 1, 2020 6664
Schoolboy who failed A-level computing becomes one of world's richest hackers; Mark Litchfield, who is married to Playboy model Carley Lynn, is an ethical hacker who uses his skills for good. Sep 7, 2019 628
LeClairRyan Aviation Attorney cautions airports, airlines in use of on boarding facial recognition technology. Jul 11, 2019 282
LeClairRyan Aviation Attorney cautions airports, airlines in use of on boarding facial recognition technology. Jul 11, 2019 299
INTEGRATED SYSTEM OF INDUSTRIAL SAFETY AND LABOR PROTECTION. Akbarova, M.A.; Bitnyi-Shliakhto, V.M.; Smirnova, E.U.; Popov, A.V. Jan 1, 2019 2718
Use of Electronic Security Systems in the Security of Information Resources in Federal University Libraries in Southern Nigeria. Chioma, Ezeabasili Augusta; Nwosu, Obiora Dec 1, 2018 2213
Artificial intelligence has a role in cybersecurity but isn't the magic bullet. Nov 6, 2018 725
Application of Local Outlier Factor Algorithm to Detect Anomalies in Computer Network. Auskalnis, Juozas; Paulauskas, Nerijus; Baskys, Algirdas Report Jun 1, 2018 2994
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. Novikova, Evgenia; Bekeneva, Yana; Shorov, Andrey Jan 1, 2018 6753
Network Intrusion Detection with Threat Agent Profiling. Bajtos, Tomas; Gajdos, Andrej; Kleinova, Lenka; Lucivjanska, Katarina; Sokol, Pavol Jan 1, 2018 10263
Smart attendance system using face recognition. Devan, P. Arun Mozhi; Venkateshan, M.; Vignesh, A.; Karthikraj, S.R.M. May 1, 2017 2420
Trends in Cervical Cytology Screening and Reporting Practices: Results From the College of American Pathologists 2011 PAP Education Supplemental Questionnaire. Crothers, Barbara A.; Darragh, Teresa M.; Tambouret, Rosemary H.; Nayar, Ritu; Barkan, Guliz A.; Zha Survey Jan 1, 2016 8191
Quantitative management of financial risk in supplying a health plan/La administracion cuantitativa del riesgo financiero en la provision de un plan de salud/A administracao quantitativa do risco financeiro na provisao de um plano de saude. Castro-Iragorri, Carlos Alberto Jan 1, 2015 5874
Destination News - Europe. Gesar, Aram Mar 3, 2014 1325
U.S. offers electronic security help for Olympics. Brief article Feb 17, 2014 117
U.S. offers electronic security help for Olympics. Brief article Feb 3, 2014 117
Burglar-proof your garage: is your garage door an easy entrance? Wentz, Gary Apr 1, 2013 1164
A privacy-aware graph-based access control system for the healthcare domain. Tian, Yuan; Song, Biao; Hassan, Mohammad Mehedi; Huh, Eui-Nam Oct 1, 2012 9854
Smart object tracking system using MATLAB. Alhadidi, Basim Jul 1, 2012 1528
What's hot: in nonregulated services. Shields, Tennille Jul 1, 2012 1530
Acme Packet Net-Net Session Director session border controllers deployed by R Cable y Telecomunicaciones Galicia. Brief article Feb 20, 2012 171
Forethought central in designing high security spaces. Spector, Scott Oct 7, 2009 756
Technology protects lottery: staff contributes to multiple layers of 'system security'. Waldon, George Sep 28, 2009 1228
In the crosshairs: limiting the impact of workplace shootings. Gunther, Will Nov 1, 2008 1394
Airport initiative hopes to speed up wait on lines: fliers can choose security lanes based on travel experience. Brooks, David Aug 29, 2008 385
Emergency notification in an instant: following the recent campus shootings, universities are seeking the most effective and multifaceted electronic alert systems from a host of IT companies. Galuszka, Peter Mar 6, 2008 1950
ERM and the security profession. Johnson, Michael P.; Spivey, Jeff M. Jan 1, 2008 2153
Safe control for silo parks. Brief article Sep 1, 2007 304
Security shopping: today's shopping centers require integrated security solutions. Morey, Scott Jul 1, 2007 481
Campus access controlled: in need of an access control system, security at the University of Pittsburgh sought a solution that would support existing ID cards. Anderson, Teresa Jul 1, 2007 806
Thwarting drug thieves: to catch pharmacy thieves, one drug company has funded a Web-based incident database; it also pays rewards for crime tips. Straw, Joseph Feb 1, 2007 1128
The ABCs of USB. Piazza, Peter Jan 1, 2007 505
Convergence: smart cards versus biometrics. Piazza, Peter Brief article Jan 1, 2007 359
Keeping students safe: Broward County School District tells how an electronic visitor management system helps it keep out sex offenders and others who might endanger students. Ritter, John R.; Fox, Jonathan Nov 1, 2006 2518
Airtight security: find out how Lufthansa Cargo AG has ramped up security at its facility in Frankfurt, Germany. Thuermer, Karen E. Nov 1, 2006 3113
Security is the number one job in corrections: how well-trained is your staff? Brooks, Tonya M. Oct 1, 2006 727
Anti-theft solutions. Oct 1, 2006 399
Planters and bollards make for safer buildings. Dawson, Huston Aug 2, 2006 673
High tech, high risk? Property/casualty insurers look at emerging technologies not for their typical uses, but for hidden abuses--and potential exposures. Coyne, Frank J. Jul 1, 2006 657
Scoping out malicious mail: Glenbrook Technologies' MailScope x-ray machine protects VIPs from ill-intentioned mail by bringing to light even the most minuscule dangers. Elliott, Robert Apr 1, 2006 1060
Old school, new system. Mury, Charles Apr 1, 2006 2180
Waste not, want not: keeping an eye on losses. Mellgren, James Apr 1, 2006 2211
Anonymous reporting technology. Fratt, Lisa Brief article Apr 1, 2006 252
The Betamax Dilemma. Piazza, Peter Feb 1, 2006 585
Who's listening? Electronic eavesdroppers have many ways to pick up your private conversations. Find out how to catch them. Kaiser, Martin L., III; Stokes, Robert S. Feb 1, 2006 2440
Protecting your privacy: legislation to stop information hounds in their tracks. Leftwich, Siobhan Jan 1, 2006 329
Why your facility needs a visitor management system. Downing, Cindy Jan 1, 2006 629
This facade isn't just a pretty face. Azoulay, Ofer Sep 1, 2005 2041
Security essential: multiple-layer security design for building protection. Stevens, Maxwell A. Aug 1, 2005 2446
Home on the page @ Gips, Michael A. Jul 1, 2005 998
What ails transportation security? Risk managers, continuity planners, and security consultants fill the ranks during transportation security discussions. What's missing are transportation professionals. Ritter, Luke Jul 1, 2005 678
Safeguarding correctional officers and staff while on the job. Smith, Don Jul 1, 2005 951
Department of Energy moving on security initiatives. Pappalardo, Joe May 1, 2005 475
Study questions CCTV's value. Gips, Michael A. May 1, 2005 426
Ports look outward: seaports, shippers, and the government are linking their efforts to maintain a critical infrastructure. DeGaspari, John May 1, 2005 2500
Building owners weigh costs and options the day after new security systems are installed. Rindner, Steven Mar 9, 2005 729
Government mandates key to electronic container tracking's success. Mar 1, 2005 299
MEP and technology innovations for urban living. Lilker, Bruce Feb 16, 2005 643
Keeping links in the security chain strong. Rindner, Steven E. Jan 26, 2005 905
Biometric scheme trialled for New York-Amsterdam flights. Brief Article Jan 17, 2005 134
Unification theory: how advances in connectivity among markets, companies, and systems are reshaping security operations. Harowitz, Sherry L. Jan 1, 2005 2879
SecureScan X-ray: Russia has utilised the latest low-dose X-ray technology in passenger scanning. Wicks, Douglas E. Jan 1, 2005 609
$ecurity Support Services spending to skyrocket. Brief Article Dec 1, 2004 144
The Magshoe: the Magshoe, a new Israeli-designed invention, aims to fill a void in the security market, and is currently on trial in the UK. Dec 1, 2004 552
Motion detection on the move. Gips, Michael A. Oct 1, 2004 679
Powering up log auditing. Gips, Michael A. Oct 1, 2004 1370
False alarm: too many calls to your local police can cost you money. Jackson, Lee Anna Sep 1, 2004 708
Secure devices. Jun 10, 2004 789
Reducing false alarms, a La carte. Brief Article Jun 1, 2004 184
Home on the page: Jun 1, 2004 1056
IT gains clout in making security decisions. Piazza, Peter Jun 1, 2004 579
Does security set the right goals? Before spending money on purchasing security technology, make sure that the investment will promote the organization's business goals. Kim, Gene Jun 1, 2004 1480
Army, marines piercing the gloom. Williams, Robert H. Brief Article Jun 1, 2004 141
Eyes on the prize: new technology options improve access monitoring and control. Morey, Scott May 1, 2004 495
Technology treats hospital's ailments: new CCTV and access control systems help one Ohio hospital increase security while addressing time-and-attendance needs and privacy requirements. Anderson, Teresa May 1, 2004 2723
Inoculating against Murphy's Law: this hospital boosted its immunity to crime by layering security practices such as access control, CCTV, pharmacy controls, and infant protection bands. Roberts, Marta May 1, 2004 3067
New report shows more employers are monitoring staff. Brief Article Mar 11, 2004 113
Crime prevention: security secrets from the dark days. Brief Article Feb 1, 2004 218
SCADA under scrutiny. Jan 1, 2004 373
Update: on intelligent vehicles and intersections: take a look at the latest automotive innovations and intersection technologies for improving driver performance. Funderburg, Keri A. Jan 1, 2004 3244
Security blanket: integrated security can boost new-home sales. Zurier, Steve Nov 1, 2003 1279
Antitheft for antibodies. Gips, Michael A. Nov 1, 2003 1109
Cicero's security philosophy: the Cicero School District's proactive approach to protecting staff and students at one new school offers important lessons for other schools. Timm, Paul D. Nov 1, 2003 2208
On the water front: while tourists flock to south Florida's Atlantic and Gulf coasts, the water doing the real work is inland, and it must be protected. Gips, Michael A. Oct 1, 2003 3027
Can physical and ICT security cooperate? Those charged with protecting information and communications technology (ICT) and those responsible for physical security must learn to work together. Lega, Alessandro Oct 1, 2003 763
The false allure of security technologies. Casella, Ronnie Sep 22, 2003 4500
Safety, security is bottom line concern. Gonzalez, Maria F. Sep 10, 2003 708
New & Improved: government facility updates its security system. (Safety & Security). Piccolomini, Paul Jul 1, 2003 689
School's security moved up a grade. (Working Wise). Anderson, Teresa Jul 1, 2003 1083
Business news. (Industry Focus). Jun 1, 2003 1554
Securing supervisory control & data acquisition systems. Saad, Abdo Y. Brief Article Jul 1, 2002 1703
TECHNOLOGY KEY TO SMOOTHING OUT THE SUPPLY CHAIN. Zaczkiewicz, Arthur Brief Article May 6, 2002 197
Chemical industry gets litmus test. (News and Trends). Gips, Michael A. Brief Article Jan 1, 2002 250
Technology helps industry develop security solutions. Rothenberg, Pamela V.; Treesh, Kelly Jan 1, 2002 1733
New security gadgets abound since Sept. 11. Chapman, Parke Brief Article Nov 21, 2001 768
Today's multifamily residents sound the alarm for increased security. Anderson, Robin L. Brief Article Nov 1, 2001 899
Security Goes to School. Geddes, Andrea L. Brief Article Jul 1, 2001 658
JEEPERS! Keep Out Office Creepers with Improved Security. Maurer, Richard Jul 1, 2001 2287
Intrusion Detection System Guide Issued. PIAZZA, PETER Brief Article Jun 1, 2001 219
A Dose of Reliable Data. GULINELLO, JOSEPH J. May 1, 2001 2740
Stone Walls Do Not a Prison Make. GETZ, WILLIAM J. Sep 1, 2000 3878
Technology and Security -- Opportunities and Challenges. Stewart, Terry L. Brief Article Jul 1, 2000 851
New technology promises to facilitate EAS. Brief Article May 1, 2000 850
San Diego Harbors Design Challenge. JAIMESON, ROBERT Apr 1, 2000 2497
New route for access control. Gips, Michael A. Oct 1, 1999 571
High-tech developments to secure your buildings. Sep 15, 1999 526
Secure it right. Watkins-Miller, Elaine Jul 1, 1999 2155
Police not pushing panic button. Gips, Michael Jun 1, 1999 717
Security at the World Bank. Hall, Steve Dec 1, 1998 3075
Safety first: it's back to the basics when assessing security needs. Vangen, Clara M.W. Oct 1, 1998 580
ANTI-THEFT THRUST FOR RETAIL. Power, Denise Aug 17, 1998 818
Departure alert comes to assisted living. Aug 1, 1998 1062
Banking on a secure Internet. Hammond, Nicolas Feb 1, 1998 2641
Buildings without doormen needn't lack security. Simon, Al Jul 16, 1997 702
Security combines awareness with technology issues. Braly, Damon Sep 1, 1996 1506
Prowler proof. Jun 1, 1995 587
University access. Anderson, Teresa Jan 1, 1995 821
Dissing the diamond dogs. Nov 1, 1992 334
The enemy within. Nov 1, 1992 250
Writing the counterfeit blues. Nov 1, 1992 279
A gallery of security. Stoks, Francis G. Sep 1, 1992 3287
Solving the patient protection problem. Dean, Edward T. Sep 1, 1992 860
Over the edge: managing violent episodes. Franklin, Forrest P. Sep 1, 1991 1581
Avoiding the pitfalls of private security. Somerson, Ira S. Apr 1, 1991 1961
Phasing into control. Moster, Howard A. Nov 1, 1990 1836

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |