Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
76,031 result(s) for "Electronic security systems."
Sort by:
Building a Home Security System with BeagleBone
Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress. Key Features * Build your own state-of-the-art security system * Monitor your system from anywhere you can receive e-mail * Add control of other systems such as sprinklers and gates * Save thousands on monitoring and rental fees Book Description One of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection system. Security companies make a fortune each year by charging exorbitant fees to their customers. You will learn how easy it is to make an alarm system with Beaglebone.A company-maintained-and-monitored alarm system has its place - your dear old mum is probably not going to be creating her own system any time soon. But if you are reading this book, you are probably a builder or a hobbyist with all the skills required to do it yourself. With Building a Home Security System with BeagleBone, you will learn everything you need to know to develop your own state-of-the-art security system, all for less than a year's worth of monitoring charges from your local alarm company!You will start by building and testing your hardware and open source software on an experimenter's prototype board before progressing to more complex systems. You will then learn how to test your new creations in a modular fashion and begin to utilize BeagleBone. Once your system is built and tested, you will install some of the professional-grade sensors used in modern alarm systems and learn how to use them. You will also discover how to extend your alarm system in a variety of different ways. The only limit will be your imagination. What you will learn * Understand the components of an alarm system * Build a basic zone 1 alarm system * Modify your alarm system to perform complex tasks * Build the actual hardware onto BeagleBone * Integrate home automation into your security system * Protect your network from intruders * Keep an eye on your system from anywhere in the world * Install and use a range of sensor equipment Who this book is for This book is for anyone who is interested in alarm systems and how they work; for hobbyists and basement tinkerers who love to build things. If you want to build the hardware described in this book, you will need some basic soldering skills, but all the parts are of the thru-hole variety and are very easy to put together. When it comes to software, you can just run it as-is, but if you want to modify the code, you will need knowledge of Java and IDEs. ]]>
Electronic Security Systems
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library. * Provides a well-written and concise overview of electronic security systems and their functions* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems* Includes a collection of practical experiences, solutions, and an approach to solving technical problems
Building a home security system with BeagleBone
One of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection system. Security companies make a fortune each year by charging exorbitant fees to their customers. You will learn how easy it is to make an alarm system with Beaglebone. A company-maintained-and-monitored alarm system has its place - your dear old mum is probably not going to be creating her own system any time soon. But if you are reading this book, you are probably a builder or a hobbyist with all the skills required to do it yourself. With Building a Home Security System with BeagleBone, you will learn everything you need to know to develop your own state-of-the-art security system, all for less than a year’s worth of monitoring charges from your local alarm company! You will start by building and testing your hardware and open source software on an experimenter’s prototype board before progressing to more complex systems. You will then learn how to test your new creations in a modular fashion and begin to utilize BeagleBone. Once your system is built and tested, you will install some of the professional-grade sensors used in modern alarm systems and learn how to use them. You will also discover how to extend your alarm system in a variety of different ways. The only limit will be your imagination.
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
Intentional insider misuse of information systems resources (i.e., IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50%–75% of security incidents originate from within an organization. Because of the large number of misuse incidents, it has become important to understand how to reduce such behavior. General deterrence theory suggests that certain controls can serve as deterrent mechanisms by increasing the perceived threat of punishment for IS misuse. This paper presents an extended deterrence theory model that combines work from criminology, social psychology, and information systems. The model posits that user awareness of security countermeasures directly influences the perceived certainty and severity of organizational sanctions associated with IS misuse, which leads to reduced IS misuse intention. The model is then tested on 269 computer users from eight different companies. The results suggest that three practices deter IS misuse: user awareness of security policies; security education, training, and awareness (SETA) programs; and computer monitoring. The results also suggest that perceived severity of sanctions is more effective in reducing IS misuse than certainty of sanctions. Further, there is evidence that the impact of sanction perceptions vary based on one's level of morality. Implications for the research and practice of IS security are discussed.
Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy
\"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. \"Thousands of people in Europe owe their lives to hundreds of our company employees,\" NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. \"If they've found a way to hack one iPhone,\" says Edward Snowden, \"they've found a way to hack all iPhones.\" Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech\"-- Provided by publisher.
Intent to purchase IoT home security devices: Fear vs privacy
The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection of smart devices to the Internet rather than on people. IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices. Consumers are often motivated to purchase smart home security devices to prevent burglaries, which they fear may lead to damage to their property or threats to their families. However, they also understand that IoT home security devices may be a threat to the privacy of their personal information. To determine the relative roles of fear and privacy concerns in the decision to purchase IoT home security devices, we conducted a survey of American consumers. We used the Theory of Reasoned Action as the theoretical basis for the study. We found that fear positively affected consumer attitudes toward purchasing smart home security devices, while concerns about privacy negatively affected attitudes. We found that attitudes toward purchase, the opinions of important others, and experience with burglaries all affected intent to purchase. We also found that the relationship between privacy concerns and intent to purchase is completely mediated by attitudes, while fear has both direct and indirect effects on intent.