Search Results: 'electronics security'

Search

×
×
×
×
78 results for "electronics security"
Security Now - A Guide to Electronic Security By E Morawski
Paperback: List Price: $39.95 $23.97 | You Save: 40%
Ships in 3-5 business days
(1 Ratings)
All about electronic security systems and loss prevention for all types of business. Information about alarms, CCTV, and access control what they do and how to buy them. Information about residential... More > alarms.< Less
Preventing WikiLeaks: Electronic Document Security, A Management Primer By Robert F. Smallwood, E-Records Institute
Paperback: $129.00
Ships in 3-5 business days
Executives, IT, Records Management and Compliance managers are concerned more than ever about securing confidential e-documents and records. But they need a plainly-worded resource to understand the... More > issues. This timely, concise Management Primer - updated Fall 2011 - lays out the reasons why WikiLeaks happened and why it could happen in most any organization. But it provides the guidance needed to avoid leakage of data from organizations -- even after the e-documents have left internal, secure devices, or after layoffs or firings. Detailed definitions and descriptions of the required technologies, including Data Loss Prevention (DLP), Information Rights Management (IRM) are included. Readers are shown how to set up basic persistent security protections on MS Office 2007 documents, and also using SharePoint. This is a must-have manual for all managers.< Less
Electronics for You By EFY Enterprises Pvt. Ltd.
eBook (PDF): $1.23
Download immediately.
Get your copy of the latest issue of Electronics For You, to know about the latest technologies and solutions for security, self healing computers, manufacturing flexible lectronics, wireless... More > charging,...< Less
Electronics For You, March 2014 By EFY Enterprises Pvt. Ltd.
eBook (PDF): $1.00
Download immediately.
Being a special issue on Automotive Electronics, this issue of Electronics For You not only discusses all the new technologies, electronics components, Industry trend and career objectives in this... More > field but also guides us to select the right 3D printer. No CD available with the digital edition of the magazine.< Less
Conductive Electronic Weapons and their faults By Trevor Langevin
Paperback: List Price: $24.99 $22.49 | You Save: 10%
Ships in 3-5 business days
Conductive Electronic Weapons and their faults is a book based on a Human Factors research project on the problems of using stun guns on commercial aircraft. The Robert Dziekanski incident happened... More > at the Vancouver International Airport, and those findings were integrated into the research project. The author submitted all the results to the Braidwood Inquiry. The testimonies and other information revealed during the inquiry required multiple updates for unanswered questions and accusations to be addressed. The Braidwood Inquiry is not the only legal entity to find that the stun gun can cause death, it is the first where Taser International has not been able to change the final decision with legal action. The book centers around the authors submitted information to the inquiry, and has reached a new detailed hypothesis on how stun guns can cause death within seconds to days after a discharge. It also explains how the guns basic design can become faulty and output repeated arc phase levels of power.< Less
Israel Defense Industry Export-import Directory (Aviation, Aerospace, Automotive, Electronics, Security Equipment) By Int'l Business Publications USA
Paperback: $149.95
Ships in 3-5 business days
Israel Defense Industry Export-import Directory (Aviation, Aerospace, Automotive, Electronics, Security Equipment)
Israel Defense Industry Export-import Directory (Aviation, Aerospace, Automotive, Electronics, Security Equipment) By Int'l Business Publications USA
eBook (PDF): $99.95
Download immediately.
Israel Defense Industry Export-import Directory (Aviation, Aerospace, Automotive, Electronics, Security Equipment)
Email and IM Governance, Security & Archiving Developing, Monitoring, and Enforcing Email, IM & Electronic Communications Policy Successfully By Robert Smallwood, E-Records Institute
Paperback: $129.00
Ships in 3-5 business days
This updated and expanded report is current for Fall 2011. It is an email and IM policy, governance, security and archiving Management Guide. The Guide includes trends in email control including... More > using cloud services, email encryption, and also how to manage the security and compliance risks of using corporate IM. It covers Best Practices and methods for developing a comprehensive email policy supported and enforced by email monitoring/management software. The goal is to comply with regulations and governance policies while readying the organization for any potential litigation. The report even includes a review of preparations and processes needed for the Federal Rules of Civil Procedure. The author is Robert Smallwood, directs the E-Records Institute and is a Partner at IMERGE Consulting, and expert in enterprise content management (ECM) specializing in email archiving, e-records and e-discovery. He is the author of the book, "Taming the Email Tiger" and over 100 articles on related topics.< Less
Solving the Security Puzzle By Ed Morawski
Paperback: List Price: $36.70 $22.02 | You Save: 40%
Ships in 3-5 business days
An illustrated handbook about electronic security, fire alarms, card access, CCTV & digital video. How they work, what & how to buy. Everything you need to know about loss prevention and... More > electronic security systems.< Less
A Design Methodology for Computer Security Testing By Marco Ramilli
Hardcover: $35.00
Ships in 6-8 business days.
The book collects 3 years of researches in the penetration testing security field. It does not describe underground or fancy techniques, it is most focused on the state of the art in penetration... More > testing methodologies. In other words, if you need to test a system, how do you do ? What is the first step ? What tools can be used ? what is the path to follow in order to find flaws ? The book shows many real world examples on how the described methodology has been used. For example: penetration testing on electronic voting machines, how malware did use the describe methodology to bypass common security mechanisms and attacks to reputation systems.< Less