Книга: Shailendra Bajpai and J. P. Gupta «Site Security»
Производитель: "LAP Lambert Academic Publishing" Chemical process industries such as oil refineries, fertiliser plants, petrochemical plants, etc., which handle hazardous chemicals, are potential targets for deliberate actions by terrorists, criminals and disgruntled employees. Security risks arising out of these threats are real and must be assessed to determine whether the security measures employed within the facility are adequate or need enhancement. The essential components of security management programme include security risk assessment, security countermeasures, and emergency response. Security risk assessment can be carried out qualitatively by threat analysis, vulnerability analysis and developing Security Risk Factor Table. It is recognised that many of the conventional safety and security measures have to be modified in light of enhanced nature of threat. Two case studies: one of a fertiliser plant and the other on a refinery has been presented in this work to show the application of ideas. This work will be useful to... ISBN:9783845477855 Издательство: "LAP Lambert Academic Publishing" (2011)
ISBN: 9783845477855 |
Другие книги схожей тематики:
Автор | Книга | Описание | Год | Цена | Тип книги |
---|---|---|---|---|---|
Eric Greenberg | Mission-Critical Security Planner. When Hackers Won't Take No for an Answer | Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 3577.17 | электронная книга | |
Steve Clines | Active Directory For Dummies | Whether you’re new to Active Directory (AD) or a savvy system administrator looking to brush up on your skills, Active Directory for Dummies, 2nd Edition will steer you in the right direction… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 2496.87 | электронная книга | |
Peter Davis T. | Wireless Networks For Dummies | You’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 1950.53 | электронная книга | |
Greg Knaddison | Cracking Drupal. A Drop in the Bucket | The first book to reveal the vulnerabilities and security issues that exist in the sites that have been built with Drupal?and how to prevent them from continuing Drupal is an open source framework… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 2601.58 | электронная книга | |
Karen Fredricks S. | Microsoft Office Live For Dummies | Microsoft Office Live is a service that allows individuals, small businesses, and organizations to create Web sites, share documents, and have a shared storage area on the Web Explains how to create… — John Wiley&Sons Limited (USD), электронная книга Подробнее... | 1950.53 | электронная книга | |
Russell Lopez P. | The Built Environment and Public Health | The Built Environment and Public Health The Built Environment and Public Health explores the impact on our health of the environments we build for ourselves, and how public health and urban planning… — John Wiley&Sons Limited, электронная книга Подробнее... | 6243.79 | электронная книга | |
Klaus Hinkelmann | Design and Analysis of Experiments, Volume 3. Special Designs and Applications | Provides timely applications, modifications, and extensions of experimental designs for a variety of disciplines Design and Analysis of Experiments, Volume 3: Special Designs and Applications… — John Wiley&Sons Limited, электронная книга Подробнее... | 11316.87 | электронная книга | |
Nelson Demille | By the Rivers of Babylon | They were forced to meet by the rivers of Babylon... In Israel, two Concorde jets take off for a UN conference that will finally bring peace to the Middle East. Covered by F-14 fighters, accompanied… — Little, Brown and Company, - Подробнее... | 2008 | 558 | бумажная книга |
Bernhardt William | Capitol Conspiracy | Oklahoma defense attorney Ben Kincaid has found himself smack in the middle of more than a few controversies and deadly predicaments-and the unexpected leap from his modest Tulsa law offices to… — Random House, Inc., - Подробнее... | 2008 | 592 | бумажная книга |
Predator Omnibus Volume 2 | Trophy hunters from another world, hiding in plain site, drawn to heat and conflict. A historical scourge, lethal specters, powerful, savage, merciless. Utilizing their feral instincts and… — Dark Horse, Подробнее... | 2008 | 2799 | бумажная книга |
См. также в других словарях:
Site Security Handbook — The Site Security Handbook, RFC 2196, is a guide on setting computer security policies and procedures for sites that have systems on the Internet (however, the information provided should also be useful to sites not yet connected to the Internet) … Wikipedia
Security guard — Private factory guard Occupation Activity sectors Security Description A security guard (or security officer) is a person who is paid to protect pro … Wikipedia
Security theater — consists of security countermeasures intended to provide the feeling of improved security while doing little or nothing to actually improve security. [cite book last = Schneier first = Bruce authorlink = Bruce Schneier title = Beyond Fear:… … Wikipedia
Security Administrator Tool for Analyzing Networks — Entwickler Dan Farmer, Wietse Venema Aktuelle Version 1.1.1[1] (1995) Betriebssystem unixähnliche Systeme … Deutsch Wikipedia
Site Finder — was a wildcard DNS record for all .com and .net unregistered domain names, run by .com and .net top level domain operator VeriSign between 15 September 2003 and 4 October 2003.ite FinderAll Internet users who accessed any unregistered domains in… … Wikipedia
Security level management — (SLM) comprises a quality assurance system for electronic information security. The aim of SLM is to display the IT security status transparently across a company at any time, and to make IT security a measurable quantity. Transparency and… … Wikipedia