The Political Test in Projects

April 2006
Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p18
Trade Publication
The article examines government security projects in the United States. A security overhaul will be made to the Capitol's perimeter, comprising of a series of concrete planters, and security posts or bollards. The Skagway Police Department in Alaska has selected a Zebra P420i card printer to create identification badges on site and on demand. INSET: National Crime Prevention.


Related Articles

  • Easy to Wear IDs. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2004, Vol. 41 Issue 4, p49 

    Reports on developments in industrial identification cards (IDs) and badges. Design features of IDs that make them easier to use; Accessories that can help convince employees to wear their IDs; Companies that manufacture multifunctional IDs. INSET: Show It Off.

  • Add-on Security.  // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p87 

    The article focuses on the importance of knowing security options of customers when assessing their security needs for an identification badging progam in the U.S. Add-on security features are said to help dealers and integrators meet the needs of customers, while bringing in more revenues....

  • Getting the 411 on Biometrics.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p48 

    Provides information on biometrics technology, the reading of a unique human physical attribute as data which is then applied to actuating a system. Passwords and personal identification numbers; Fingerprinting; Retinal scans; Capabilities of the BioMetric Fingerprint BLP-100 Pressure Sensitive...

  • FORTUNES OF WAR. Helyar, John; Neering, Patricia // Fortune;7/26/2004, Vol. 150 Issue 2, p80 

    This article discusses the effect of the Iraq War on the market for security firms. Security contractors in Iraq, taking on the many military tasks outsourced by the Pentagon, have profited from a battle-zone gold rush: an instant billion-dollar industry with a 20,000-person workforce. But now...

  • NOTE: NOTWITHSTANDING THE REHABILITATION ACT. Mather, Sandi // Lincoln Law Review;Dec2008, Vol. 36, p91 

    The article examine the events that influenced the enactment of the Aviation and Transportation Security Act (ATSA) and recommends approach for analyzing the disability discrimination by the Transportation Security Agency (TSA) in the U.S. It states that ATSA has been enacted by the Congress...

  • Federated ID's Still in Search of an Identity. Sisk, Michael // Bank Technology News;Aug2010, Vol. 23 Issue 8, p12 

    The article discusses the draft paper that was released by the U.S. government which describes the importance of federated identity ecosystem in which people and companies can conduct online transactions securely and privately.

  • A Survey on Iris Recognition. Birgale, Lenina; Kokare, Manesh // IUP Journal of Electrical & Electronics Engineering;Oct2009, Vol. 2 Issue 4, p7 

    As the demand for security systems is increasing exponentially day by day, there has been a rigorous search for different verification and identification techniques. Facial features, voice patterns, hand geometry, retinal patterns, vein patterns, signature dynamics, voice verification, facial...

  • Biometrics Security Technology: The Future Now. Berger, Vic // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p60 

    The article discusses issues related to biometrics security technology in the U.S. It is stated that biometrics is the study of measurable biological characteristics. The paper also discourses the advantages and future of biometrics. The technology includes fingerprint recognition where...

  • Upgrading Existing Biometric Security Systems by Implementing the Concept of Cancelable Biometrics. Bača, Miroslav; Antonić, Marko; Franjo, Magusic // Central European Conference on Information & Intelligent Systems;2008, p518 

    Today's biometric security systems have a number of problems that emerge from the fact that the biometric data of a person is stored in the system. The problems arise when that data is compromised. Standard password based security systems have the ability to cancel the compromised password and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics