ABSTRACT

Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. Emphasizing the marriage of technology and physical hardware, this volume covers intrusion detection, access control, and video surveillance systems-including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.

chapter 1|10 pages

- Physical Security Planning

chapter 2|14 pages

- Vulnerability Assessments

chapter 3|18 pages

- Security Design and Planning

chapter 4|16 pages

- Security Construction Projects

chapter 5|20 pages

- Protection in Depth

chapter 6|18 pages

- Perimeter Protection

chapter 7|12 pages

- Access Control

chapter 8|14 pages

- Physical Protection Systems

chapter 10|10 pages

- Keys, Locks, and Safes

chapter 11|26 pages

- Biometrics

chapter 12|18 pages

- Security Guard Force

chapter 13|8 pages

- Central Station Design

chapter 14|20 pages

- Government Security

chapter 15|12 pages

- Financial Institutions and Banks

chapter 16|10 pages

- Data Center Protection

chapter 17|10 pages

- Total System Cost

chapter 18|14 pages

- Security Master Plan

chapter 19|12 pages

- Security Foresight

chapter 20|20 pages

- Security Leadership