Personnel identification systems
SECURITY KERNEL VERIFICATION TECHNIQUES - ALGORITHMIC REPRESENTATION
NCJ Number
57869
Date Published
1978
COMPUTER SECURITY
NCJ Number
60987
Date Published
1979
LOOKING OUT FOR NUMBER ONE - EMPLOYEE THEFT
NCJ Number
58482
Journal
Security World
Date Published
1979
IDENTIFICATION TECHNOLOGIES - COMPUTER, OPTICAL, AND CHEMICAL AIDS TO PERSONAL ID
NCJ Number
60835
Date Published
1979
SECURITY AND INTEGRITY PROCEDURES
NCJ Number
57953
Date Published
1976
MODEL FOR MEASURING EFFECTIVENESS IN A SECURITY ORGANIZATION
NCJ Number
57736
Date Published
1976
PERSONNEL ACCESS CONTROL (FROM CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES - PROCEEDINGS, 1977, BY JOHN JACKSON - SEE NCJ-57737
NCJ Number
57739
Date Published
1977
CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES PROCEEDINGS, 1976
NCJ Number
57707
Date Published
1976
PRIVACY - HOW TO PROTECT WHAT'S LEFT OF IT
NCJ Number
54201
Date Published
1979
TEST RESULTS - ADVANCED DEVELOPMENT MODELS OF BISS (BASE AND INSTALLATION SECURITY SYSTEM) IDENTITY AND VERIFICATION EQUIPMENT, V 5 - MISCELLANEOUS
NCJ Number
57686
Date Published
1978
TEST RESULTS - ADVANCED DEVELOPMENT MODELS OF BISS (BASE AND INSTALLATION SECURITY SYSTEM) IDENTITY VERIFICATION EQUIPMENT, V 1 - EXECUTIVE SUMMARY
NCJ Number
57683
Date Published
1978
INTERNATIONAL CONFERENCE ON CRIME COUNTERMEASURES SCIENCE AND ENGINEERING, JULY 25-29, 1977 - PROCEEDINGS
NCJ Number
56184
Date Published
1977
UNIVERSITY RESPONSE TO THE CHALLENGE OF CRIME PREVENTION
NCJ Number
52994
Journal
Campus Law Enforcement Journal
Date Published
1978
CORPORATE HEADQUARTERS PRIVATE SECURITY
NCJ Number
48178
Journal
Police Chief
Date Published
1978
PRINCIPLES OF PHYSICAL SECURITY
NCJ Number
46884
Date Published
1978