Security systems
Case History: Threat and Vulnerability Assessments for a Proposed Hotel, Conference Center, and Office Complex (From Proceedings, 1988 Carnahan Conference on Security Technology: Electronic Crime Countermeasures, P 35-38, 1988, R. William De Vore, ed., -- See NCJ-117849)
NCJ Number
117856
Date Published
1988
Carnahan Conference on Security Technology: Electronic Crime Countermeasures
NCJ Number
118105
Date Published
1987
Safety First: A Guide to Courthouse Security
NCJ Number
119961
Journal
Judges' Journal
Date Published
1989
Body Alarm Systems: Enhancing Security Through Instant Communication
NCJ Number
118627
Journal
Corrections Today
Date Published
1989
Riot Aftermath: New Mexico's Experience Teaches Valuable Lessons
NCJ Number
118628
Journal
Corrections Today
Date Published
1989
Winning the 'Not-in-my-Neighborhood' Game
NCJ Number
118636
Journal
Corrections Today
Date Published
1989
Contested Order: The Struggle Over British Security Policy in Northern Ireland
NCJ Number
116543
Journal
Comparative Politics
Date Published
1987
Computer Use and Abuse
NCJ Number
115933
Journal
Security Management
Date Published
1989
Effective Perimeter Security: A Challenge for Security Designers
NCJ Number
116793
Journal
Corrections Today
Date Published
1989
Training Top Security
NCJ Number
115882
Journal
Security
Date Published
1989
Modern Security and Loss Prevention Management
NCJ Number
116114
Date Published
1989
Lloyd's: A Premium on Security
NCJ Number
115391
Journal
Security Management
Date Published
1989
Contested Order: The Struggle Over British Security Policy in Northern Ireland
NCJ Number
115649
Journal
Comparative Politics
Date Published
1988