Archive



2005  ⏷

December 2005: Feature Articles

  • Securex 2005 in the spotlight at EXSA awards function
  • A new dimension in fire detection
  • A two-prong approach to prison safety and security
  • Combatting corruption and improving service delivery
  • Image generation: sensors and scanning - A guide to IP video, Part 3
  • Next-generation installer support for the IP world
  • Safe and secure
  • The acquisition, care and feeding of security consultants
  • The convergence of physical security and IT: integration lessons - what the private sector can learn from the CAC Project
  • Video surveillance in the retail sector - effectively combating crime


November 2005: Feature Articles

  • CBR 10 Most Influential - Wireless
  • Co-operation and systems integration: key to improved security for the banking industry
  • Eye spy with IP - an industry overview of what is in store for IP surveillance systems
  • From VCRs to IP-surveillance
  • Security solutions for the mid-size company
  • Setting the global pace from South Africa
  • The convergence of physical security and IT - integrating physical and IT security management (Part 2)
  • The evolution of video surveillance: a guide to IP video - Part 2
  • Why control rooms fail


October 2005: Feature Articles

  • Making the right connection for digital CCTV
  • Most influential access control
  • Moving towards broad-based BEE
  • Safety first
  • The convergence of physical security and IT - integrating physical and IT security management


Access & Identity Management Handbook 2005



September 2005: Feature Articles

  • Erratum
  • FREE surveillance incident management technologies and processes breakfast
  • Spoornet invites suppliers to participate in a request for information on railway vehicle tracking system
  • 2005 Top Security Brands: the selection process
  • CBR 10 Most Influential - Networking
  • CBR 10 Most Influential - Security
  • CBR 10 Most Influential - Storage
  • ESSA debuts in September 1995
  • Internet-connected security systems: just how safe are they?
  • Management vs security: how management undermines security effectiveness
  • Public areas and stadia: what is the point of a security system if you cannot identify the culprits?
  • The convergence of physical security and IT: bottom line
  • Top 10 security products of 1995
  • Top 10 tech news of the past 10 years


CCTV Handbook 2005



July 2005: Feature Articles

  • Do not be a dodo
  • How well do you know your partner?
  • Life on the safe side
  • The convergence of physical security and IT: internetworking
  • The key future trends in CCTV
  • Video over IP likely to play major role in future CCTV surveillance


August 2005: Feature Articles

  • Benchmarking CCTV performance through audits
  • Novel access control solution at RM
  • Terror in the city
  • The convergence of physical security and IT: internetworking - Part 2


June 2005: Feature Articles

  • Success in the security industry
  • Automation an essential component of effective mine security systems
  • Confessions of a CTO
  • Convenience vs security: How well do biometrics work?
  • Intelligent technology is in your CCTV systems' future
  • Nerd, techie, specialist, guru or expert ... which do you need?
  • Security a top priority at Mount Isa Mines
  • The convergence of physical security and IT: responsibilities
  • The seven deadly sins of real-world backups


April 2005: Feature Articles

  • Card games
  • Deciding on the extent of surveillance coverage
  • Effective risk management
  • Endpoint security end game
  • Park safe
  • Pentagon-like security and BMS at Hollard's new HO
  • Q&A


May 2005: Feature Articles

  • Success in the security industry
  • CCTV does not reduce crime
  • Facial recognition Q&A
  • Facing up to a new world order
  • New generation DVRs
  • Putting the 'I' back in ID
  • The evolving world of access control systems
  • The successful use of CCTV (or not) – lessons from UK research
  • Top five myths of outsourcing e-mail security


February 2005: Feature Articles

  • Success in the security industry
  • Picking your way through the legal minefield
  • SA's first security city
  • Security for systems in networked and standalone environments
  • Unified approach needed for secure content management











While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.