TITLE

Vital Assignment - Keeping the Essentials Going

AUTHOR(S)
Zalud, Bill
PUB. DATE
January 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2011, Vol. 48 Issue 1, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses how to improve the security systems of critical infrastructure organizations. According to Marquis Laude, head of Integrated Security Solutions, an integrated approach to improve the security of critical infrastructure sector is a centralized command and intuitive graphical user interfaces. Moreover, it mentions the important role cameras and videos as a crucial tool in protecting critical infrastructures.
ACCESSION #
57669552

 

Related Articles

  • Focus on the Front End. Farnham, J. Mike // Security: Solutions for Enterprise Security Leaders;Mar2004, Vol. 41 Issue 3, p37 

    Focuses on the role of specifics of the front end load in the application by San Francisco, California-based credit card provider Providian Financial Corp. of new security technology. Problem faced by the company concerning the card access system; Selection by Providian of Picture Perfect...

  • Trend Micro OfficeScan Available as Beta Version for Microsoft's Windows Vista RTM.  // Software World;Nov2006, Vol. 37 Issue 6, p23 

    The article presents the web posting of Trend Micro's OfficeScan 7.8 beta, Trend Micro Incorporated's corporate desktop security solution. It provides antivirus protection for Windows Vista as soon as this operating system becomes available. OfficeScan is capable of protecting the company's...

  • Intrusion prevention. Stephenson, Peter // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p50 

    The article evaluates several intrusion prevention system (IPS) appliances. BeadWindow! 100 has a very defined procedure for installation that must be carefully followed. The user interface is not a full graphical user interface (GUI), but graphically arranged text. The administration console is...

  • Model driven design and aspect weaving. Jézéquel, Jean-Marc // Software & Systems Modeling;May2008, Vol. 7 Issue 2, p209 

    A model is a simplified representation of an aspect of the world for a specific purpose. In complex systems, many aspects are to be handled, from architectural aspects to dynamic behavior, functionalities, user-interface, and extra-functional concerns (such as security, reliability, timeliness,...

  • Research on User Permission Isolation for Multi-Users Service-Oriented Program. Li Yu; Jiang Wei; Lin Li; Zhan Jing; Liang Peng; Yingxu Lai; Shupo Bu // International Journal of Communications, Network & System Scienc;Feb2012, Vol. 5 Issue 2, p105 

    For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among...

  • Don't Just Kick the Tires, Look Under the Hood. Doffing, Dennis J. // Journal of Offender Monitoring;2010, Vol. 22 Issue 2, p13 

    The article discusses the basic principles in selecting an electronic monitoring (EM) vendor and monitoring system. It suggests looking at the specifications, reading reports and asking for references. The basic principles to consider include the performance, security and data as well as...

  • Dell Expands Security Portfolio for Small Business with Trend Micro Partnership.  // Channel Insider;9/2/2010, p1 

    The article reports on the partnership of Dell Computer Inc. with Trend Micro Inc. for the enhancement of its security and data protection offerings for small and medium-size businesses. The companies have developed a customized user interface to modify the endpoint security management process...

  • The pc-based graphic-user interface of the power management system on the security robot. Ching-Kuo Wang; Han-Pang Huang; Sheng Chen // International Journal of Advanced Manufacturing Technology;Nov2007, Vol. 35 Issue 3/4, p416 

    Security robots are becoming widespread in the applications of intelligent buildings and modern factories. However, the cruising scope of the mobile robot is conspicuously restrained by the heavy weight and the discharge capacity of the battery pack. In general, battery capacity and the...

  • Leading Manufacturers Share Data & Intelligence Using PSIA Specifications.  // SDM: Security Distributing & Marketing;Nov2012, Vol. 42 Issue 11, p126 

    The article reports on the newest specification, called Area Control version 1.0, from the Physical Security Interoperability Alliance (PSIA) which allows manufacturers to harmonize and share data and intelligence. The specification demonstrates interoperability among users for optimized...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics