Effective Physical Security. için kapak resmi
Effective Physical Security.
Başlık:
Effective Physical Security.
Yazar:
Fennelly, Lawrence.
ISBN:
9780124159815
Yazar Ek Girişi:
Basım Bilgisi:
4th ed.
Fiziksel Tanımlama:
1 online resource (379 pages)
İçerik:
Front Cover -- Effective Physical Security -- Copyright -- Dedication -- Acknowledgments -- Foreword -- Chapter 1 - Influence of Physical Design -- INTRODUCTION -- DEFENSIBLE SPACE -- CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN -- CONCLUSION -- REFERENCES -- Chapter 2 - Introduction to Vulnerability Assessment* -- RISK MANAGEMENT AND VULNERABILITY ASSESSMENT -- RISK ASSESSMENT AND THE VULNERABILITY ASSESSMENT PROCESS -- STATISTICS AND QUANTITATIVE ANALYSIS -- VULNERABILITY ASSESSMENT PROCESS OVERVIEW -- REPORTING AND USING THE VULNERABILITY ASSESSMENT -- SYSTEMS ENGINEERING AND VULNERABILITY ASSESSMENT -- SUMMARY -- REFERENCES -- Chapter 3 - Security Surveys and the Audit -- THE BEST TIME TO CONDUCT THE SURVEY -- WHY CONDUCT A SECURITY REVIEW -- CLASSIFICATION OF SURVEY RECOMMENDATIONS -- DEVELOPING SECURITY POINTS -- NINE POINTS OF SECURITY CONCERN -- PERSONALITY OF THE COMPLEX -- POSITIVE AND NEGATIVE ASPECTS OF MAKING RECOMMENDATIONS -- CRIME ANALYSIS -- KEY CONTROL -- DIGITAL CLOSED-CIRCUIT TELEVISION -- INTRUSION ALARMS -- LIGHTING AND SECURITY -- OTHER SECURITY ASPECTS -- SECURITY SURVEY FOLLOW-UP -- RESIDENTIAL SECURITY -- HOME SECURITY CHECKLIST -- TOP TEN SECURITY THREATS -- THE AUDIT -- REFERENCES -- EXTERIOR PHYSICAL CHARACTERISTICS: PERIMETER GROUNDS -- APPENDIX 3.E. OFFICE SECURITY CHECKLIST -- EXTERIOR -- DOORS -- WINDOWS -- GENERAL HOME SECURITY -- MISCELLANEOUS -- APPENDIX 3.G. FIRE SAFETY INSPECTION -- ADMINISTRATIVE AND PLANNING PHASE -- SUMMARY -- BULLET-RESISTANT FIBERGLASS WALL PANELS -- BULLET-RESISTANT DOORS -- BULLET-RESISTANT WINDOWS -- APPENDIX 3.I. WINDOW FILM -- Chapter 4 - Approaches to Physical Security* -- LEVELS OF PHYSICAL SECURITY -- THE VALUE OF PLANNING -- PHYSICAL BARRIERS -- THE SECURITY PLAN -- SUMMARY -- REFERENCES -- Chapter 5 - Protective Barriers -- OVERVIEW -- PERIMETER ENTRANCES -- BARRIER PLANNING.

FENCE STANDARDS -- TYPES OF SECURITY FENCES -- SUMMARY -- REFERENCES -- Chapter 6 - Physical Barriers* -- DOORS -- ROOFS -- FLOORS -- FENCES -- WALLS AND MOATS -- REFERENCES -- Chapter 7 - Use of Locks in Physical Crime Prevention* -- KEY-OPERATED MECHANISMS -- COMBINATION LOCKS -- LOCK BODIES -- DOOR LOCK TYPES -- STRIKES -- ATTACKS AND COUNTERMEASURES -- LOCKS AND THE SYSTEMS APPROACH TO SECURITY -- NEW STANDARD SET FOR EXIT DEVICES, LOCKS, AND ALARMS [1] -- REFERENCE -- APPENDIX 7.B. KEY CONTROL AND LOCK SECURITY CHECKLIST* -- APPENDIX 7.C. TERMS AND DEFINITIONS FOR DOOR AND WINDOW SECURITY* -- Chapter 8 - Safes, Vaults, and Accessories -- CHOOSE THE RIGHT CONTAINER -- UL-RATED COMBINATION LOCKS -- RELOCKING DEVICES -- LOCKING DIALS -- LOCKABLE HANDLES -- TIME LOCKS -- TIME-DELAY COMBINATION LOCKS -- ALARMED COMBINATION LOCKS -- VISION-RESTRICTING AND SHIELDED DIALS -- COMBINATION CHANGING -- SAFE BURGLARIES -- HIDDEN COMBINATIONS -- OVERCOMING SAFE-OPENING PROBLEMS -- FILES -- SAFES -- RATINGS -- Chapter 9 - Security Lighting -- INTRODUCTION -- ILLUMINATION [3] -- TYPES OF LAMPS [4] -- TWENTY-FIVE THINGS YOU NEED TO KNOW ABOUT LIGHTING [7] -- ENERGY MANAGEMENT -- LIGHTING DEFINITIONS -- REFERENCES -- WEB SITES -- APPENDIX 9.A. LIGHTING DESCRIPTIONUNCITED -- Chapter 10 - Alarms: Intrusion Detection Systems* -- COMPONENTS OF ALARM SYSTEMS -- APPLICATION -- ALARM EQUIPMENT OVERHAUL -- ADDITIONAL RESOURCES -- CONCLUSION -- APPENDIX 11.A SMOKE DETECTORS -- APPENDIX 11.B ALARM CERTIFICATE SERVICES GLOSSARY OF TERMS CERTIFICATE TYPES -- DEFINITIONS -- STANDARDS -- APPENDIX 11.C FIRE CLASSIFICATIONS -- USE OF FIRE EXTINGUISHERS -- Chapter 11 - Video Technology Overview* -- OVERVIEW -- VIDEO SYSTEM -- CAMERA FUNCTION -- SCENE ILLUMINATION -- SCENE CHARACTERISTICS -- LENSES -- CAMERAS -- TRANSMISSION -- SWITCHERS -- QUADS AND MULTIPLEXERS -- MONITORS.

RECORDERS -- HARD-COPY VIDEO PRINTERS -- ANCILLARY EQUIPMENT -- SUMMARY -- GLOSSARY FOR CCTV -- Chapter 12 - Biometrics Characteristics -- INTRODUCTION -- BIOMETRICS CHARACTERISTICS [1] -- REFERENCE -- Chapter 13 - Access Control and Badges -- ACCESS CONTROL -- DESIGNATED RESTRICTED AREAS -- DEGREE OF SECURITY -- CONSIDERATIONS -- EMPLOYEE SCREENING -- IDENTIFICATION SYSTEM -- ID METHODS -- MECHANIZED/AUTOMATED SYSTEMS -- CARD/BADGE SPECIFICATIONS -- VISITOR IDENTIFICATION AND CONTROL -- VISITORS -- ENFORCEMENT MEASURES -- SIGN/COUNTERSIGN AND CODE WORD -- DURESS CODE -- ACCESS CONTROL ROSTERS -- CONTROL METHODS -- SECURITY CONTROLS OF PACKAGES, PERSONAL PROPERTY, AND VEHICLES -- TACTICAL-ENVIRONMENT CONSIDERATIONS -- REFERENCE -- CHAPTER 14 - FENCE STANDARDS -- RECOMMENDATIONS -- SECURITY PLANNING -- MATERIAL SPECIFICATIONS -- DESIGN FEATURES AND CONSIDERATIONS -- TYPICAL DESIGN EXAMPLE -- Chapter 15 - Stages of Fire -- STAGES OF FIRE -- HOW FIRE SPREADS -- FOUR WAYS TO PUT OUT A FIRE -- CLASSIFYING FIRE -- UL STANDARD 217 -- WATER SUPPLY FOR SPRINKLERS AND TANKS [3] -- REFERENCES -- APPENDIX 16.A. FIRE SAFETY INSPECTION -- ADMINISTRATIVE AND PLANNING PHASE -- GENERAL PHYSICAL INSPECTION PHASE -- EXTINGUISHER INSPECTION PHASE -- STAND PIPE, FIRE HOSE, AND CONTROL VALVE INSPECTION PHASE -- SPRINKLER SYSTEM INSPECTION PHASE -- HAZARDOUS MATERIALS INSPECTION PHASE -- ALARM SYSTEM INSPECTION PHASE -- Chapter 16 - Standards, Regulations, and Guidelines: Compliance and Your Security Program, Including Global Resources -- INTRODUCTION -- STANDARDS -- REGULATIONS -- GUIDELINES -- MANAGING COMPLIANCE -- RESOURCES -- REFERENCES -- Chapter 17 - Information Technology Systems Infrastructure* -- INTRODUCTION -- BASICS OF TCP/IP AND SIGNAL COMMUNICATIONS -- TCP/UDP/RTP -- USER DATAGRAM PROTOCOL -- NETWORKING DEVICES -- NETWORK INFRASTRUCTURE DEVICES -- SERVERS.

NETWORK ARCHITECTURE -- NETWORK CONFIGURATIONS -- CREATING NETWORK EFFICIENCIES -- DIGITAL VIDEO -- DIGITAL RESOLUTION -- FRAME RATES -- DISPLAY ISSUES -- MANAGING DATA SYSTEMS THROUGHPUT -- SYSTEM ARCHITECTURE -- INTERFACING TO OTHER ENTERPRISE INFORMATION TECHNOLOGY SYSTEMS -- SUMMARY -- Chapter 18 - Security Officers and Equipment Monitoring -- INTRODUCTION -- COMMAND CENTER -- BEST LOCATIONS FOR CCTV -- INTRODUCTION TO ACCESS CONTROL AND BIOMETRICS -- DESIGNATED RESTRICTED AREAS -- SUMMARY -- Chapter 19 - Glass and Windows -- INTRODUCTION -- TYPES OF GLASS -- GLASS AND SECURITY -- WINDOW FILM -- REFERENCE -- ADDITIONAL WEB RESOURCES -- Chapter 20 - Doors -- INTRODUCTION -- RESIDENTIAL BUILDINGS -- THE FUNCTION OF A DOOR -- REFERENCES -- Chapter 21 - Physical Security* -- DEFINITION OF PHYSICAL SECURITY -- SECURITY IN LAYERS -- OUTER LAYERS OF PROTECTION -- INNER LAYERS -- ACCESS CONTROLS -- PHYSICAL SECURITY COSTS -- PHYSICAL RISK ASSESSMENTS -- PHYSICAL SECURITY FOR CLASSIFIED GOVERNMENT CONTRACTS -- SUMMARY -- REFERENCE -- Chapter 22 - Fiber Optics and Robots -- FIBER OPTICS -- ROBOTS AS SECURITY DEVICES -- SUMMARY -- REFERENCES -- INDEX.
Özet:
Effective Physical Security, Fourth Edition is a best-practices compendium that details the essential elements to physical security protection. The book contains completely updated sections that have been carefully selected from the authors' work that set the standard: Handbook of Loss Prevention and Crime Prevention, Fifth Edition. Designed for easy reference, Effective Physical Security contains important coverage of environmental design, security surveys, locks, lighting, and CCTV as well as new chapters covering the latest in the ISO standards for Risk Assessment and Risk Management, physical security planning, network systems infrastructure, and environmental design. This new edition continues to serve as a valuable reference for experienced security practitioners as well as students in undergraduate and graduate security programs. Required reading for the ASIS Physical Security Professional Certification (PSP) and recommended reading for the CPP certification Provides detailed coverage of Physical Security in an easily accessible reference format with content divided into three major parts: Design, Equipment, and Operations Each chapter is written by a recognized expert security specialist.
Notlar:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Elektronik Erişim:
Click to View
Ayırtma: Copies: