A platform for research: civil engineering, architecture and urbanism
13.56MHz (High Frequency) Contactless Smart CardsRFID Wireless Transmitter Systems; Multitechnology Cards; Mobile Phone Access Control; Capture Card Reader; Multitechnology Card Readers; Biometric Readers; Photo Identification; Chapter Summary; 5 Types of Access Controlled Portals; Chapter Overview; Portal Passage Concepts; Card entry/free exit; Card entry/card exit; Tailgate detection; Positive access control; 2-Man rule; Schedules; Antipassback; Pedestrian Portal Types; Standard doors; Automatic doors; Revolving doors; Turnstiles; Man-traps; Automated walls; Vehicle Portals
Chapter 20Chapter 21; Chapter 22; Chapter 23; Chapter 24; Chapter 25; Chapter 26; Chapter 27; Chapter Summary; 2 Foundational Security and Access Control Concepts; Chapter Overview; Understanding Risk; Types of organization assets; Types of users; Types of threat actors; Understanding criticalities and consequences; Understanding vulnerability; Understanding probability; What is risk?; Managing Risk; Methods of managing risk; How security and access control programs help manage risk; Security program elements; The importance of a qualified risk analysis
Front Cover; Electronic Access Control; Copyright Page; Contents; I. The Basics; 1 Introduction and Overview; Chapter Overview; Rules to Live By; Who Should Read This Book?; How Is Material Presented in This Book?; What Will You Learn, and How Will It Help Your Career?; What Is in This Book?; Part I: the basics; Chapter 2; Chapter 3; Part II: how things work; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Chapter 12; Chapter 13; Chapter 14; Chapter 15; Chapter 16; Chapter 17; Chapter 18; Part III: The things that make systems sing; Chapter 19
The importance of security policies and proceduresTypes of Countermeasures; Hi-tech; Lo-tech; No-tech; Mixing approaches; Layering security countermeasures; Access Control System Concepts; Types of users; Types of areas/groups; User schedules; Portal programming; Credential programming; Group and schedule programming; Chapter Summary; 3 How Electronic Access Control Systems Work; Chapter Overview; First, a Little History; The Basics; Authorized Users, User Groups, Access Zones, Schedules, and Access Groups; Authorized users; User groups; Access zones; Schedules; Access groups; Portals
Types of portalsCredential readers; Electrified locks; Safety systems; Alarm monitoring; Request-to-exit sensors; Credentials and Credential Readers; Credential authorization; Locks, Alarms, and Exit Devices; Electrified locks; Alarms; Exit Devices; Data, Data Retention, and Reports; Chapter Summary; II. How Things Work; 4 Access Control Credentials and Credential Readers; Chapter Overview; Access Credentialing Concepts; Keypads; Access Cards, Key Fobs, and Card Readers; Wiegand Wire Cards; 125K Passive Proximity Cards; 125KHz (Low Frequency) Active Proximity Cards
13.56MHz (High Frequency) Contactless Smart CardsRFID Wireless Transmitter Systems; Multitechnology Cards; Mobile Phone Access Control; Capture Card Reader; Multitechnology Card Readers; Biometric Readers; Photo Identification; Chapter Summary; 5 Types of Access Controlled Portals; Chapter Overview; Portal Passage Concepts; Card entry/free exit; Card entry/card exit; Tailgate detection; Positive access control; 2-Man rule; Schedules; Antipassback; Pedestrian Portal Types; Standard doors; Automatic doors; Revolving doors; Turnstiles; Man-traps; Automated walls; Vehicle Portals
Chapter 20Chapter 21; Chapter 22; Chapter 23; Chapter 24; Chapter 25; Chapter 26; Chapter 27; Chapter Summary; 2 Foundational Security and Access Control Concepts; Chapter Overview; Understanding Risk; Types of organization assets; Types of users; Types of threat actors; Understanding criticalities and consequences; Understanding vulnerability; Understanding probability; What is risk?; Managing Risk; Methods of managing risk; How security and access control programs help manage risk; Security program elements; The importance of a qualified risk analysis
Front Cover; Electronic Access Control; Copyright Page; Contents; I. The Basics; 1 Introduction and Overview; Chapter Overview; Rules to Live By; Who Should Read This Book?; How Is Material Presented in This Book?; What Will You Learn, and How Will It Help Your Career?; What Is in This Book?; Part I: the basics; Chapter 2; Chapter 3; Part II: how things work; Chapter 4; Chapter 5; Chapter 6; Chapter 7; Chapter 8; Chapter 9; Chapter 10; Chapter 11; Chapter 12; Chapter 13; Chapter 14; Chapter 15; Chapter 16; Chapter 17; Chapter 18; Part III: The things that make systems sing; Chapter 19
The importance of security policies and proceduresTypes of Countermeasures; Hi-tech; Lo-tech; No-tech; Mixing approaches; Layering security countermeasures; Access Control System Concepts; Types of users; Types of areas/groups; User schedules; Portal programming; Credential programming; Group and schedule programming; Chapter Summary; 3 How Electronic Access Control Systems Work; Chapter Overview; First, a Little History; The Basics; Authorized Users, User Groups, Access Zones, Schedules, and Access Groups; Authorized users; User groups; Access zones; Schedules; Access groups; Portals
Types of portalsCredential readers; Electrified locks; Safety systems; Alarm monitoring; Request-to-exit sensors; Credentials and Credential Readers; Credential authorization; Locks, Alarms, and Exit Devices; Electrified locks; Alarms; Exit Devices; Data, Data Retention, and Reports; Chapter Summary; II. How Things Work; 4 Access Control Credentials and Credential Readers; Chapter Overview; Access Credentialing Concepts; Keypads; Access Cards, Key Fobs, and Card Readers; Wiegand Wire Cards; 125K Passive Proximity Cards; 125KHz (Low Frequency) Active Proximity Cards
Electronic access control
Norman, Thomas L. (author)
2nd ed
2017
1 Online-Ressource (570 p)
Description based upon print version of record
Includes bibliographical references and index
Standard barrier gates
Book
Electronic Resource
English
DDC:
621.38928
UB Braunschweig | 2011
|ELECTRONIC ACCESS CONTROL DEVICE AND ACCESS CONTROL METHOD
European Patent Office | 2022
|KEYLESS ACCESS: ELECTRONIC ACCESS CONTROL HELPS MANAGE FACILITIES
British Library Online Contents | 2009