Technical protection of objects

Journal Title: Security Dimensions - Year 2012, Vol 7, Issue 7

Abstract

The paper examines the issue of technical protection of objects. It deals with outsourcing of various types of electronic means as entry control system, electric fire signalling, camera systems and alarm security systems.<br/><br/>

Authors and Affiliations

Petr Selinger

Keywords

Related Articles

The National Security Culture and the Power of the State. A Scientific Study

Article presents the form and perspectives for scientific research provided in the area of measurement of the power of state. Author sees the power of state as a part of security culture concept. Several ways of analysin...

Mutual Defence Clause of the Treaty of Lisbon versus Article 5 of the Washington Treaty

Article points out the conditions and legal foundations forming the mutual defence clauses enshrined in the North Atlantic Treaty and the Treaty of Lisbon. It also points out different philosophies in their wording and a...

Subculture of Stadium Hooligans – Pathology or Crime?

Aggressive behaviour of hooligans is not a new phenomenon, but has its roots in ancient times. From that era it developed and evolved, with particular dynamics at the turn of the 1950s/60s of the last century. In Poland...

Analysis of public security system and its relations with the elements of the state security system

According to the legally binding directives concerning strategy, public safety is one of the fields of the state’s activity that is subjected to dynamic transformation. That is the result of the changes that occur within...

Information Security Model for Crisis Management Simulations

Research activities of Crisis Management Center at Matej Bel University are focused at development and tuning of crisis scenarios for different critical events. Specialized tools are used for crisis management scenario w...

Download PDF file
  • EP ID EP376333
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

Petr Selinger (2012). Technical protection of objects. Security Dimensions, 7(7), 62-69. https://europub.co.uk/articles/-A-376333