Locking in hotel security. (electronic locks): An article from: Security Management
Book Details
Author(s)Mark H. Beaudry, Richard Juliano
ISBN / ASINB00096OGPK
ISBN-13978B00096OGP9
MarketplaceFrance 🇫🇷
Description
This digital document is an article from Security Management, published by American Society for Industrial Security on November 1, 1996. The length of the article is 3574 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.
From the supplier: Hotel security managers should make several considerations when choosing an electronic lock system to ensure better security and save the department money and time over the years. Managers should carefully decide on the card's functions, the lock's memory and the training programs of vendors. In addition, two interrogators should be purchased to prepare against breakdowns. Hotel security managers should also consult other references, negotiate a purchase agreement and seek fast installation.
Citation Details
Title: Locking in hotel security. (electronic locks)
Author: Mark H. Beaudry
Publication:Security Management (Refereed)
Date: November 1, 1996
Publisher: American Society for Industrial Security
Volume: v40 Issue: n11 Page: p37(6)
Distributed by Thomson Gale
From the supplier: Hotel security managers should make several considerations when choosing an electronic lock system to ensure better security and save the department money and time over the years. Managers should carefully decide on the card's functions, the lock's memory and the training programs of vendors. In addition, two interrogators should be purchased to prepare against breakdowns. Hotel security managers should also consult other references, negotiate a purchase agreement and seek fast installation.
Citation Details
Title: Locking in hotel security. (electronic locks)
Author: Mark H. Beaudry
Publication:Security Management (Refereed)
Date: November 1, 1996
Publisher: American Society for Industrial Security
Volume: v40 Issue: n11 Page: p37(6)
Distributed by Thomson Gale
