Cargando…

Physical security systems handbook : the design and implementation of electronic security systems /

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to doc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Khairallah, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Oxford : Elsevier/Butterworth-Heinemann, 2006.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
  • CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY
  • ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions
  • 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition
  • Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition
  • Part 2, The Business Plan; 8 INTRODUCTION
  • THE PHASE TWO BIDSECTION 1
  • INVITATION TO BID; SECTION 2
  • ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3
  • BID REQUIREMENTS; SECTION 4
  • PRICING REQUIREMENTS; SECTION 5
  • EXECUTION OF CONTRACT; SECTION 7
  • POST INSTALLATION SUPPORT; SECTION 8
  • SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL