|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn179598657 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
071029s2006 ne a o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d OCLCQ
|d IDEBK
|d E7B
|d OCLCQ
|d OCLCF
|d NLGGC
|d OCLCQ
|d LOA
|d JBG
|d COCUF
|d AGLDB
|d STF
|d MOR
|d PIFAG
|d OCLCQ
|d U3W
|d WRM
|d OCLCQ
|d VTS
|d INT
|d VT2
|d OCLCQ
|d M8D
|d HS0
|d UKCRE
|d VLY
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 171131383
|a 648300209
|a 961620066
|a 962623240
|a 966248221
|a 984805713
|a 988438726
|a 992032466
|a 1037782406
|a 1038678467
|a 1055340113
|a 1081189218
|a 1153541911
|a 1162072529
|a 1228541332
|a 1241809592
|a 1290080560
|a 1300572592
|
020 |
|
|
|a 9780080480008
|q (electronic bk.)
|
020 |
|
|
|a 0080480004
|q (electronic bk.)
|
020 |
|
|
|a 9780750678506
|
020 |
|
|
|a 075067850X
|
020 |
|
|
|a 1281052515
|
020 |
|
|
|a 9781281052513
|
020 |
|
|
|a 9786611052515
|
020 |
|
|
|a 6611052518
|
020 |
|
|
|z 075067850X
|q (hbk.)
|
029 |
1 |
|
|a AU@
|b 000043013444
|
029 |
1 |
|
|a AU@
|b 000053003150
|
029 |
1 |
|
|a DEBBG
|b BV043161396
|
029 |
1 |
|
|a DEBSZ
|b 42219848X
|
029 |
1 |
|
|a NZ1
|b 14540249
|
035 |
|
|
|a (OCoLC)179598657
|z (OCoLC)171131383
|z (OCoLC)648300209
|z (OCoLC)961620066
|z (OCoLC)962623240
|z (OCoLC)966248221
|z (OCoLC)984805713
|z (OCoLC)988438726
|z (OCoLC)992032466
|z (OCoLC)1037782406
|z (OCoLC)1038678467
|z (OCoLC)1055340113
|z (OCoLC)1081189218
|z (OCoLC)1153541911
|z (OCoLC)1162072529
|z (OCoLC)1228541332
|z (OCoLC)1241809592
|z (OCoLC)1290080560
|z (OCoLC)1300572592
|
050 |
|
4 |
|a TH9705
|b .K43 2006eb
|
072 |
|
7 |
|a HOM
|x 021000
|2 bisacsh
|
082 |
0 |
4 |
|a 643.16
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Khairallah, Michael.
|
245 |
1 |
0 |
|a Physical security systems handbook :
|b the design and implementation of electronic security systems /
|c Michael Khairallah.
|
260 |
|
|
|a Amsterdam ;
|a Oxford :
|b Elsevier/Butterworth-Heinemann,
|c 2006.
|
300 |
|
|
|a 1 online resource (viii, 296 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
|
505 |
8 |
|
|a CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY
|
505 |
8 |
|
|a ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions
|
505 |
8 |
|
|a 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition -- Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition -- Part 2, The Business Plan; 8 INTRODUCTION
|
505 |
8 |
|
|a THE PHASE TWO BIDSECTION 1 -- INVITATION TO BID; SECTION 2 -- ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 -- BID REQUIREMENTS; SECTION 4 -- PRICING REQUIREMENTS; SECTION 5 -- EXECUTION OF CONTRACT; SECTION 7 -- POST INSTALLATION SUPPORT; SECTION 8 -- SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL
|
520 |
|
|
|a A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book a.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Security systems.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a HOUSE & HOME
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Security systems
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Khairallah, Michael.
|t Physical security systems handbook.
|d Amsterdam ; Oxford : Elsevier/Butterworth-Heinemann, 2006
|z 075067850X
|z 9780750678506
|w (OCoLC)63185261
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196417
|z Texto completo
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10185983
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 196417
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2613342
|
994 |
|
|
|a 92
|b IZTAP
|