TITLE

The Camera Detail Schedule

AUTHOR(S)
Khairallah, Michael
PUB. DATE
June 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information about camera detail schedule, an identifier when discussing camera views. It suggests the inspection of areas that require video observation in order to identify physical security requirements, as well as recording information about the location of each camera. According to the author, understanding the locations of the cameras and light will allow for the best decision of which cameras will be used.
ACCESSION #
26543491

 

Related Articles

  • BAE Systems introduces handheld thermal imagers for law enforcement. McHale, John // Military & Aerospace Electronics;Sep2004, Vol. 15 Issue 9, p7 

    Reports that military technology specialist BAE Systems Information & Electronic Warfare Systems has introduced the HHC100 Series handheld thermal imager designed specifically for law enforcement and first responder applications. Features of the electronic security system; Variants of the...

  • 5 Five-Minute: TECH QUIZ. Nelson, Ron // SDM: Security Distributing & Marketing;Aug2006, Vol. 36 Issue 8, p33 

    A quiz concerning electronic security systems is presented.

  • ON THE MARKET.  // Security: Solutions for Enterprise Security Leaders;Jan1999, Vol. 36 Issue 1, p52 

    Features several electronic security systems in the United States. Details of SWM Series Spectra Compact Wall Mount from Pelco; Functionality of Alligro LTC 4300 Series phoneline video transmission system from Philips Communication & Security Systems; Description of SWC40 surveillance system...

  • CCTV traps McVeigh: Multi-media surveillance advances, succeeds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p23 

    Focuses on advances in multi-media surveillance technology. Use of closed-circuit television in security applications; Computer-based surveillance technology; Use of Object Linking and Embedding; Security software; Products by different manufacturers.

  • Super Bowl Spurs Face Recognition Technology.  // Security: Solutions for Enterprise Security Leaders;Mar2001, Vol. 38 Issue 3, p13 

    Focuses on the use of facial recognition technology for surveillance, crime detection and counter-terrorism operations in the United States. Software technology and video surveillance systems used during the Super Bowl event; Companies offering the facial recognition technology; Concern over...

  • Five Minute Tech Quiz. Nelson, Ron // SDM: Security Distributing & Marketing;Feb2009, Vol. 39 Issue 2, p67 

    A quiz concerning control panel and monitoring technology of security systems is presented.

  • Jump for Joysticks.  // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p50 

    The article evaluates the joystick, a primary interface between a security user and a system.

  • Security Surveillance & Other Audio-Visual Electronic Products. Chen Yu-ting // TIER Industry Report - Security Surveillance & Other Audio-Visua;8/14/2014, p1 

    The article discusses the state of Taiwan's security surveillance and audio-visual electronic products industry in the first five months of 2014. Topics addressed include a year-on-year rise in the industry's production and sales values, a decline in sales of camera surveillance systems, and...

  • Novel Quantum Deterministic Key Distribution Protocols with Entangled States. Nan-Run Zhou; Li-Jun Wang; Jie Ding; Li-Hua Gong; Xiang-Wu Zuo // International Journal of Theoretical Physics;Sep2010, Vol. 49 Issue 9, p2035 

    By utilizing Bell states and GHZ states, two quantum deterministic key distribution (QDKD) protocols are presented to hand over the previously deterministic key to the intended receiver. The proposed QDKD protocols have two-way authentications, and then the eavesdropping and impersonation can be...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics