Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology
Sponsored link
sklademVydáno: 2014-04-30
PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology

PD CEN/TR 16705:2014

Perimeter protection. Performance classification methodology

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
383.91 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
38.39 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
115.17 €
Anglicky Hardcopy
In stock
383.91 €
Označení normy:PD CEN/TR 16705:2014
Počet stran:114
Vydáno:2014-04-30
ISBN:978 0 580 85061 5
Status:Standard
DESCRIPTION

PD CEN/TR 16705:2014


This standard PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology is classified in these ICS categories:
  • 13.310 Protection against crime

This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'.

This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution.

Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values.

The following subjects are not covered by this Technical Report:

  • threats approaching from the sea side;

  • threats approaching through the air.

It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.