Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O'Reilly Media Company.  (3)
  • Commerce  (2)
  • Computer security ; Management
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9780429251306 , 0429251300 , 9780511324840 , 0511324847 , 9781439869147 , 1439869146 , 9781466514157 , 1466514159 , 9781439869123
    Language: English
    Pages: 1 online resource (430 pages)
    Edition: 3rd edition
    Parallel Title: Erscheint auch als
    DDC: 363.25/968
    Keywords: Money laundering investigation ; Money laundering Prevention ; Business enterprises ; Finance ; Economics ; Commerce ; Electronic books ; local ; Blanchiment de l'argent ; Enquêtes ; États-Unis ; Money laundering investigation ; Money laundering ; Prevention ; United States
    Abstract: Many changes have occurred in the twenty-five years that have passed since the enactment of the Money Laundering Control Act of 1986. The law has been amended, new underlying crimes have been added, and court decisions have modified its scope. The Act remains an important tool in combating criminal activity. Now in its third edition, Money Laundering: A Guide for Criminal Investigators covers the basics of finding ill-gotten gains, linking them to the criminal, and seizing them. Providing a clear understanding of money laundering practices, it explains the investigative and legislative processes that are essential in detecting and circumventing this illegal and dangerous activity. Highlights of the Third Edition include Important court decisions and changes in federal law since the Second Edition New trends in crime and terrorism financing The rise of money laundering in connecting with major frauds, including the Bernie Madoff case Law and policy shifts related to terrorism and financing since the Obama administration New methods for financial intelligence and the filing of Suspicious Activity Reports How changes in technology have enabled launderers to move funds more easily and anonymously Knowledge of the techniques used to investigate these cases and a full understanding of the laws and regulations that serve as the government's weapons in this fight are essential for the criminal investigator. This volume arms those tasked with finding and tracing illegal proceeds with this critical knowledge, enabling them to thwart illegal profiteering by finding the paper trail.
    Note: Online resource; Title from title page (viewed December 19, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 0738495603
    Language: English
    Pages: 1 online resource (356 pages)
    Series Statement: IBM redbooks
    Parallel Title: Erscheint auch als
    Keywords: Business Forms ; Computer programs ; Forms management Computer programs ; IBM software ; Electronic books ; local ; Gestion des formulaires ; Logiciels ; Logiciels IBM ; Gestion des formulaires ; Logiciels ; Business ; Forms ; Computer programs ; Forms management ; Computer programs ; IBM software ; Commerce ; Business & Economics ; Local Commerce
    Abstract: This IBM Redbooks publication describes the features and functionality of Workplace Forms and each of its component products. After introducing the products and providing an overview of features and functionality, we discuss the underlying product architecture and address the concept of integration. To help potential users, architects, and developers better understand how to develop and implement a forms application, we introduce a specific scenario based on a "Sales Quotation Approval" application. Using this base scenario as a foundation, we describe in detail how to build an application that captures data in a form, then applies specific business logic and workflow to gain approval for a specific product sales quotation. Throughout the scenario, we build upon the complexity of the application and introduce increasing integration points with other data systems. Ultimately, we demonstrate how an IBM Workplace Forms application can integrate with WebSphere Portal, IBM DB2 Content Manager, and Lotus Domino. Note: The code used for building this sample scenario application is available for download. For specific information about how to download the sample code, please refer to Appendix A. Additional material". Please note that the additional material referenced in the text is not available from IBM.
    Note: Online resource; Title from title page (viewed July 12, 2006) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...