NCJ Number
102815
Editor(s)
J S Jackson
Date Published
1986
Length
265 pages
Annotation
Technological innovations in security management are discussed in 41 conference papers.
Abstract
Papers examining facility security cover threat assessment, security system design and evaluation, factors affecting security planning, and techniques for enhancing perimeter and internal security. Special considerations in security engineering for countering terrorist threats to executives, military and other sensitive installations, and nuclear facilities also are addressed. Security uses of computers considered include computer-aided dispatching; communications, command, and control; and security system coordination and monitoring. Areas of vulnerability of computers to fraud and crime and means for countering them also are discussed. Fixed-site and portable communications security are assessed, and measures for protecting against pulse sabotage, jamming, eavesdropping, and other forms of interference are described. Also covered are the contributions of technological advances in artificial intelligence, fiber optics, and robotics. Additional papers describe a variety of sensor and alarm devices and systems for intrusion detection. Cryptographic approaches to computer security also are described. Finally, techniques for automatic fingerprint and identity verification are examined. Tables, graphs, figures and references. (For individual papers, see NCJ 102816-102823).