Cargando…

Physical security systems handbook : the design and implementation of electronic security systems /

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to doc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Khairallah, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Oxford : Elsevier/Butterworth-Heinemann, 2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn179598657
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 071029s2006 ne a o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d IDEBK  |d E7B  |d OCLCQ  |d OCLCF  |d NLGGC  |d OCLCQ  |d LOA  |d JBG  |d COCUF  |d AGLDB  |d STF  |d MOR  |d PIFAG  |d OCLCQ  |d U3W  |d WRM  |d OCLCQ  |d VTS  |d INT  |d VT2  |d OCLCQ  |d M8D  |d HS0  |d UKCRE  |d VLY  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 171131383  |a 648300209  |a 961620066  |a 962623240  |a 966248221  |a 984805713  |a 988438726  |a 992032466  |a 1037782406  |a 1038678467  |a 1055340113  |a 1081189218  |a 1153541911  |a 1162072529  |a 1228541332  |a 1241809592  |a 1290080560  |a 1300572592 
020 |a 9780080480008  |q (electronic bk.) 
020 |a 0080480004  |q (electronic bk.) 
020 |a 9780750678506 
020 |a 075067850X 
020 |a 1281052515 
020 |a 9781281052513 
020 |a 9786611052515 
020 |a 6611052518 
020 |z 075067850X  |q (hbk.) 
029 1 |a AU@  |b 000043013444 
029 1 |a AU@  |b 000053003150 
029 1 |a DEBBG  |b BV043161396 
029 1 |a DEBSZ  |b 42219848X 
029 1 |a NZ1  |b 14540249 
035 |a (OCoLC)179598657  |z (OCoLC)171131383  |z (OCoLC)648300209  |z (OCoLC)961620066  |z (OCoLC)962623240  |z (OCoLC)966248221  |z (OCoLC)984805713  |z (OCoLC)988438726  |z (OCoLC)992032466  |z (OCoLC)1037782406  |z (OCoLC)1038678467  |z (OCoLC)1055340113  |z (OCoLC)1081189218  |z (OCoLC)1153541911  |z (OCoLC)1162072529  |z (OCoLC)1228541332  |z (OCoLC)1241809592  |z (OCoLC)1290080560  |z (OCoLC)1300572592 
050 4 |a TH9705  |b .K43 2006eb 
072 7 |a HOM  |x 021000  |2 bisacsh 
082 0 4 |a 643.16  |2 22 
049 |a UAMI 
100 1 |a Khairallah, Michael. 
245 1 0 |a Physical security systems handbook :  |b the design and implementation of electronic security systems /  |c Michael Khairallah. 
260 |a Amsterdam ;  |a Oxford :  |b Elsevier/Butterworth-Heinemann,  |c 2006. 
300 |a 1 online resource (viii, 296 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS 
505 8 |a CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY 
505 8 |a ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 
505 8 |a 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition -- Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition -- Part 2, The Business Plan; 8 INTRODUCTION 
505 8 |a THE PHASE TWO BIDSECTION 1 -- INVITATION TO BID; SECTION 2 -- ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 -- BID REQUIREMENTS; SECTION 4 -- PRICING REQUIREMENTS; SECTION 5 -- EXECUTION OF CONTRACT; SECTION 7 -- POST INSTALLATION SUPPORT; SECTION 8 -- SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL 
520 |a A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book a. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Security systems. 
650 6 |a Systèmes de sécurité. 
650 7 |a security systems.  |2 aat 
650 7 |a HOUSE & HOME  |x Security.  |2 bisacsh 
650 7 |a Security systems  |2 fast 
776 0 8 |i Print version:  |a Khairallah, Michael.  |t Physical security systems handbook.  |d Amsterdam ; Oxford : Elsevier/Butterworth-Heinemann, 2006  |z 075067850X  |z 9780750678506  |w (OCoLC)63185261 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=196417  |z Texto completo 
938 |a ebrary  |b EBRY  |n ebr10185983 
938 |a EBSCOhost  |b EBSC  |n 196417 
938 |a YBP Library Services  |b YANK  |n 2613342 
994 |a 92  |b IZTAP