TITLE

Editor's letter

AUTHOR(S)
Ross, D.
PUB. DATE
September 2011
SOURCE
Engineering & Technology (17509637);Sep2011, Vol. 6 Issue 8, p4
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Ten years on from 9/11 and another wave of change is about to sweep over the defence and security industries.
ACCESSION #
65503981

 

Related Articles

  • 'Prepare for the Future' Warns ISC Keynote Speaker.  // SDM: Security Distributing & Marketing;May2004, Vol. 34 Issue 5, p15 

    Discusses Bernard Kerik's keynote address at ISC Expo/West held on March 31, 2004 in Las Vegas in relation to the terrorist attack that struck New York in 2001. Emphasis on the importance of protecting the country's landmarks and public places; Presentation of a hypothetical example of a suicide...

  • Network Fusion: Information and Intelligence Sharing for a Networked World. Pfeifer, Joseph W. // Homeland Security Affairs;Oct2012, Vol. 8, p1 

    An innovative design for sharing information and intelligence is found in the form of network fusion, which encourages collaboration across multiple disciplines by leveraging technology to connect the unconnected at classified and unclassified levels. As terrorists move to new methods of attack,...

  • SECURING AMERICA: LESSONS LEARNED.  // SDM: Security Distributing & Marketing;Sep2002, Vol. 32 Issue 9, p50 

    Comments on the lessons learned by the security systems industry following the September 11, 2001 terrorist attacks in the United States. Growth of importance of video security; Strategies to boost access and identification.

  • Cashing in on in security. Subramanian, Anusha // Business Today;2/8/2009, Vol. 18 Issue 3, p39 

    The article discusses the impact of the terrorist attacks in Mumbai, India to the security systems industry. Indian companies in the security space are moving with high-tech products and services and specialized solutions to secure cities, states, businesses and organisations. Moreover, it cites...

  • Musician Turned Counter- Terrorist Seeks Synergies. Engebretson, Joan // SDM: Security Distributing & Marketing;Sep2010, Vol. 40 Issue 9, p176 

    An interview with musician Jeff Baxter is presented. He notes that the Los Angeles Police Department (LAPD) recruited him, then he becomes a reserve officer in counter terrorism. He shares that counter terrorism involves improper forms of analysis, which uses intelligence as a basis to determine...

  • THE BIG BUSINESS IN KEEPING SAFE. Subrananian, Anusha // Business Today;12/28/2008, Vol. 17 Issue 26, p61 

    The article reports on the growing market demand for security equipment in India in 2008. The terrorist attack in the nation results into the strengthening economic condition of the security systems industry with the increasing demand for products and services that could possibly prevent the...

  • GUNS, GUARDS AND GATES. Wilson, Katherine // Overland;Spring2007, Issue 188, p14 

    The article describes a visit that the author made to the 2006 Canberra National Security Summit and Expo in Australia to look at technological innovations in security. Representatives of several security firms were reluctant to discuss their products on the record or at all. Heng Jiang Cheng of...

  • Disaster Dividends. Perry, Joellen; Pethokoukis, James M.; Sherrid, Pamela; Streisand, Betsy // U.S. News & World Report;12/3/2001, Vol. 131 Issue 23, p32 

    Focuses on the so-called antiterror industry that has emerged as a result of terrorism in the United States. Mention of surges in business for firms in the communications technology, biotechnology and security equipment industries; Products which are in demand, including metal detectors,...

  • Security Risk Analysis.  // Israel Defence & Security Report;Q1 2009, p14 

    The article provides information on the security risk in the defence and security industry in Israel. It notes that the data will be based on three areas such as inter-state conflict, terrorism and physical safety for expatriate workers. It also presents a chart depicting the regional security...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics