Mapping the organizational relations within physical security's body of knowledge: a management heuristic of sound theory and best practice
暂无分享,去创建一个
[1] J. Talbot,et al. Security Risk Management Body of Knowledge , 2009 .
[2] Mark T. Keane,et al. Cognitive Psychology: A Student's Handbook , 1990 .
[3] Jd Williams. Design Considerations for High-Security Interior Intrusion Detection Systems , 1981 .
[4] Suleiman K. Kassicieh,et al. Proposed design of a DSS for the justification of advanced manufacturing technologies , 1993 .
[5] Mary Lynn Garcia,et al. The Design and Evaluation of Physical Protection Systems , 2001 .
[6] Mohammed Ketel. IT security risk management , 2008, ACM-SE 46.
[7] Ronald V. Clarke,et al. “Situational” Crime Prevention: Theory and Practice , 1980 .
[8] Lawrence J. Fennelly. Effective Physical Security , 2004 .
[9] D. Bao. Technical management notes , 1986, IEEE Transactions on Engineering Management.
[10] D. Schoen,et al. The Reflective Practitioner: How Professionals Think in Action , 1985 .
[11] Mark T. Keane,et al. Cognitive psychology: A student's handbook, 7th ed. , 2015 .
[12] Ira S. Winkler,et al. What is Security , 2007 .
[13] R. J. Bogumil,et al. The reflective practitioner: How professionals think in action , 1985, Proceedings of the IEEE.
[14] Harold L. Wilensky,et al. The Professionalization of Everyone? , 1964, American Journal of Sociology.
[15] Geoff Craighead,et al. High Rise Security and Fire Life Safety , 1995 .
[16] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[17] P. Marsh. Security in buildings , 1985 .
[18] Michelene T.H. Chi,et al. EXPERTISE , 2009, Palliative and Supportive Care.
[19] J. Novak,et al. Educational Psychology: A Cognitive View , 1969 .
[20] L. Wood,et al. Graduate Skills in Business Learning , 2011 .
[21] Charles A. Sennewald,et al. Effective Security Management , 1978 .
[22] Karen Little,et al. Security, ID Systems and Locks: The Book on Electronic Access Control , 1997 .
[23] E. Borodzicz,et al. Corporate Security Education: Towards Meeting the Challenge , 2006 .
[24] Edward P. Halibozek,et al. Introduction to Security , 1975 .
[25] Bm Cohn. Reconciling Fire Safety and Security Requirements for Buildings , 1981 .
[26] Pinata Winoto. Controlling malevolent behavior in open multi-agent systems by means of deterrence theory , 2003, IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003..
[27] Robert N. Lussier,et al. Management Fundamentals: Concepts, Applications, Skill Development , 2002 .
[28] David J Brooks,et al. What is security: Definition through knowledge categorization , 2010 .
[29] E. Yalow. Educational psychology: A cognitive view. 2nd ed. , 1978 .
[30] Russell L. Bintliff. The complete manual of corporate and industrial security , 1992 .
[31] Mahesh K. Nalla,et al. Assessing the Scope of Corporate Security: Common Practices and Relationships with Other Business Functions , 2002 .