Cena s DPH / bez DPH
Hlavní stránka>PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology
Sponsored link
sklademVydáno: 2014-04-30
PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology

PD CEN/TR 16705:2014

Perimeter protection. Performance classification methodology

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
9734 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
973.40 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2920.20 Kč
Anglicky Tisk
Skladem
9734 Kč
Označení normy:PD CEN/TR 16705:2014
Počet stran:114
Vydáno:2014-04-30
ISBN:978 0 580 85061 5
Status:Standard
Popis

PD CEN/TR 16705:2014


This standard PD CEN/TR 16705:2014 Perimeter protection. Performance classification methodology is classified in these ICS categories:
  • 13.310 Protection against crime

This Technical Report aims at providing information to be used for the design of the future activities for making a 'perimeter protection standard'.

This CEN Technical Report describes a performance classification methodology for the identification of the desired systems performance for perimeter protection systems. It also gives a conceptual framework for matching the desired performance and the capabilities of a possible solution.

Furthermore this CEN Technical Report presents the results of inventories that have been made on current systems and (generic type) products, relevant member states regulations, relevant documents from CEN, CEN/TC 325, ISO and other sources. It should be noted that these inventories cannot be considered complete and any values given should be considered indicative values.

The following subjects are not covered by this Technical Report:

  • threats approaching from the sea side;

  • threats approaching through the air.

It is recognized that with regard to vital infrastructure and very high risk objects the generic system approach indicated in this Technical Report may not suffice and additional checklists and risk assessment tools may be required.