Cover image for Physical Security Systems Handbook : The Design and Implementation of Electronic Security Systems.
Physical Security Systems Handbook : The Design and Implementation of Electronic Security Systems.
Title:
Physical Security Systems Handbook : The Design and Implementation of Electronic Security Systems.
Author:
Khairallah, Michael.
ISBN:
9780080480008
Personal Author:
Physical Description:
1 online resource (305 pages)
Contents:
front cover -- copyright -- table of contents -- front matter -- Acknowledgments -- body -- 1 Introduction -- WHAT IS THIS BOOK ABOUT? -- WHEN IS THIS BOOK MOST USEFUL? -- WHY IS THIS BOOK IMPORTANT TO YOU? -- WHO SHOULD USE THIS BOOK? -- BEING A CONSULTANT -- OVERVIEW OF THE SECURITY AUDIT PROCESS -- CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT -- CHAPTER 3, THE VULNERABILITY STUDY -- CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN -- CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN -- CHAPTER 6, PRESENTING THE SOLUTIONS -- CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS -- CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLAN -- CHAPTER 9, SYSTEM IMPLEMENTATION -- 2 The Physical Threat Assessment -- 2 INTRODUCTION -- THE SCOPE OF WORK -- POLICY REVIEW -- GATHER PRELIMINARY DATA -- THE GOAL SETTING AND POLICY REVIEW MEETING -- IDENTIFY ASSETS -- CONDUCT THE PHYSICAL THREAT ASSESSMENT -- 3 Conducting the Vulnerability Study to Identify Physical Security Requirements -- 3 INTRODUCTION -- PREPARE TO CONDUCT THE SURVEY -- MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY -- PREPARE FOR THE SURVEY -- IDENTIFY THE CONTROL PERIMETERS -- SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY -- ESTABLISH THE COMMAND CENTER -- EQUIPMENT LOCATION -- CONDUCT THE PHYSICAL SURVEY -- DOCUMENT THE FINDINGS -- KEY MANAGEMENT -- CONSEQUENCES OF LOSS -- CONCLUDING THE SURVEY -- 4 Creating the Preliminary System Design -- 4 INTRODUCTION -- PRELIMINARY SYSTEM DESIGN -- 5 Documenting the Preliminary System Design -- 5 INTRODUCTION -- COMPLETE THE SYSTEM DESIGN DOCUMENTATION -- PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS -- PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM -- FORECAST EXPENSE BUDGETS -- HUMAN RESOURCE REQUIREMENTS -- COST ANALYSIS -- LEGAL ISSUES -- 6 Presenting the Solutions -- 6 INTRODUCTION.

WHAT MANAGEMENT WANTS TO KNOW -- METHODS OF PRESENTING THE RECOMMENDATION -- DELIVERING THE PRESENTATION -- 7 System Acquisition - Part 1, Technical Specifications -- 7 INTRODUCTION -- CHOOSE THE BID TYPE -- PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS -- THE SINGLE PHASE RFP -- THE TWO PHASE RFP -- ORGANIZE THE RFP -- PREPARE THE PHASE ONE RFP -- GET APPROVAL FOR THE SPECIFICATIONS -- SOLICIT BIDDERS -- THE PRE-BID MEETING -- BID ACCEPTANCE AND BID OPENING -- TECHNICAL EVALUATION -- VENDOR PRESENTATIONS -- FINAL EVALUATION AND RECOMMENDATION -- 8 System Acquisition - Part 2, The Business Plan -- 8 INTRODUCTION -- THE PHASE TWO BID -- SECTION 1 - INVITATION TO BID -- SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS -- SECTION 3 - BID REQUIREMENTS -- SECTION 4 - PRICING REQUIREMENTS -- SECTION 5 - EXECUTION OF CONTRACT -- SECTION 7 - POST INSTALLATION SUPPORT -- SECTION 8 - SUBMITTALS -- GET APPROVAL FOR THE SPECIFICATIONS -- SOLICIT BIDDERS -- THE PRE-BID MEETING -- BID ACCEPTANCE AND BID OPENING -- BUSINESS PLAN EVALUATION -- 9 System Implementation -- 9 INTRODUCTION -- AWARDING THE CONTRACT -- GET STARTED -- MILESTONE REVIEWS -- FINAL INSPECTION -- POST INSTALLATION SUBMITTALS -- SECURITY SYSTEM PERSONNEL -- CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT -- IDENTIFY THE AUTHORIZED POPULATION -- SYSTEM MANAGEMENT PROCEDURES -- SYSTEM TURN ON -- EVALUATE THE IMPLEMENTATION -- FOLLOW-UP EVALUATION AND TRAINING -- THE LAST WORD -- back matter -- Appendix -- index.
Abstract:
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To” for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant. * Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system. * Builds upon well-known, widely adopted concepts prevalent among security professionals. * Offers seasoned advice on the competitive bidding process as well as on legal issues involved in the selection of applied products.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: