Skip to content

Security and Cyber-Security Technical Papers

Today, there are many different security inspection technologies available. These technologies may be combined in an attempt to achieve a better…
Dr. Paul Bjorkholm, Senior Scientist, Varian Medical Systems,…
Edition: Edition 27
With the threat of international terrorism still looming large, port security remains of paramount importance to Europe, not only due to…
Jenny Gyngell, project manager for SUPPORT, BMT Group…
Edition: Edition 54
The security industry has long been synonymous with the term Closed Circuit Television (CCTV), but in fact the CCTV industry has…
Tim Biddulph, IP Product Manager, Samsung Techwin Europe…
Edition: Edition 53
Over the years, there has been an evolution of identification and trust factors that today has resulted in the use of…
Jay Grant, Secretary General, International Association of Airport…
Edition: Edition 53
It begins with the capturing of honeybees, automatically loading them into bee holders, training them with explosives’ scents and finally using…
Ivan Hoo, chief executive officer, Inscentinel, Harpenden, UK
Edition: Edition 54
DebTech is the ISO 9001:2008 accredited technology business unit of De Beers, one of the top ranking diamond mining companies in…
DebTech, Johannesburg, South Africa
Edition: Edition 53
Fire can become one of the most destructive and unforgiving forces known to man, destroying everything in its path. With this…
Neil Primrose of Cooper Fulleon on behalf of…
Edition: Edition 52

Latest Journal

Cookie Policy. This website uses cookies to ensure you get the best experience on our website.