|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn891396744 |
003 |
OCoLC |
005 |
20231120111722.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140919t20142014enkao ob 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d UIU
|d UKMGB
|d YDXCP
|d REB
|d COO
|d OCLCF
|d EBLCP
|d N$T
|d VRC
|d SFB
|d DEBSZ
|d B24X7
|d OCLCQ
|d LIV
|d MERUC
|d U3W
|d D6H
|d UAB
|d OCLCQ
|d CEF
|d OCLCQ
|d ABC
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 016886718
|2 Uk
|
019 |
|
|
|a 890530939
|a 957596751
|a 959872112
|a 963742574
|a 1126416958
|a 1144344795
|
020 |
|
|
|a 9780128001936
|q (e-book)
|
020 |
|
|
|a 0128001933
|q (e-book)
|
020 |
|
|
|a 0128000228
|
020 |
|
|
|a 9780128000229
|
020 |
|
|
|z 9780128000229
|
035 |
|
|
|a (OCoLC)891396744
|z (OCoLC)890530939
|z (OCoLC)957596751
|z (OCoLC)959872112
|z (OCoLC)963742574
|z (OCoLC)1126416958
|z (OCoLC)1144344795
|
050 |
|
4 |
|a TK5105.59
|b .N676 2014eb
|
072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Norman, Thomas L.,
|e author.
|
245 |
1 |
0 |
|a Integrated security systems design :
|b a complete reference for building enterprise-wide digital security systems /
|c Thomas L. Norman.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Oxford [England] ;
|a Waltham, Massachusetts :
|b Butterworth-Heinemann,
|c 2014.
|
264 |
|
4 |
|c �2014
|
300 |
|
|
|a 1 online resource (400 pages) :
|b illustrations, photographs
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed September 18, 2014).
|
520 |
8 |
|
|a Annotation
|b Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits. Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design. Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies. Demonstrates how to maximize safety while reducing liability and operating costs.
|
505 |
0 |
|
|a Front Cover; Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems; Copyright; About the Author; Table of Contents; Dedication; Preface; Section I: Introduction to Integrated Security Systems; Chapter 1: Introduction and Organization of the Book; Who Should Read This Book; A Brief Background; A Framework for Understanding the Design Process; Goals of the Book; Arrangement of the Book; Questions and Answers; Chapter 2: Integrated Security System Design Benefits and Philosophy; Introduction; Why Integrate Systems?
|
505 |
8 |
|
|a Why a Strategic Approach to Security Design is NecessaryUniform Application of Security Policies; Force Multipliers; Multiple Systems; Multiple Buildings; Multiple Sites; Multiple Business Units; Improved System Performance; Improved Monitoring; Reduced Training; Better Communications; Cost Benefits; Improved Labor Efficiency; Reduced Maintenance Costs; Improved System Longevity; How Integration Is Achieved; Summary; Questions and Answers; Chapter 3: History of Electronic Security; Introduction; The History of Integrated Security Systems; The First Generation; The Second Generation.
|
505 |
8 |
|
|a The Third GenerationThe Fourth Generation; Stalled Progress; Fifth-Generation Technology; Avoiding Obsolescence; Planned Obsolescence; Unplanned Obsolescence; Summary; Questions and Answers; Section II: Security System Design; Chapter 4: Security System Design Elements; Introduction; The Tools; Drawings; Specifications; Product Selection; Interdiscipline Coordination; Project Management; Tips on Schedule Management; Client Management; Tips on Relationship Management; The Place of Electronics in the Overall Security Process; The Security Program.
|
505 |
8 |
|
|a Establish Electronic Security Program ObjectivesSecurity Policy: The Foundation of All Countermeasures; Types of Design Efforts; New Construction; Renovation or Retrofit; Government-Driven Projects; Commercial Projects; Facilities-Driven Projects; User-Driven Projects; Project Drivers; Construction Effort; Regulation Compliance; Event Driven; Insurance Driven; Hidden Agendas; Summary; Questions and Answers; Chapter 5: Electronics Elements (High-Level Discussion); Introduction; Security Functions; Access Control Elements; Detection Elements; Alarm Sensors; Alarm Processors; Alarm Transmission.
|
505 |
8 |
|
|a Alarm ReportingFollow-on Action Response; Assessment and Verification Elements; Reaction Elements; Evidence Gathering; Added Bonus; Summary; Questions and Answers; Chapter 6: Electronics Elements (Detailed Discussion); Introduction; Alarm/Access Control Systems; Identification Devices; Magnetic Stripe Cards; Wiegand Cards/Keys; Barcode Cards; Barium Ferrite Cards; Hollerith; Rare-Earth Magnets; Photo Identification Elements; Multi-technology Cards; Card Readers; TWIC Cards; Other Field Devices; Electrified Strikes; Electrified Mortise Locks; Magnetic Locks; Electrified Panic Hardware.
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information storage and retrieval systems
|x Security measures.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
6 |
|a Syst�emes d'information
|0 (CaQQLa)201-0015681
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Ordinateurs
|x Acc�es
|x Contr�ole.
|0 (CaQQLa)201-0056439
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|0 (OCoLC)fst00872779
|
650 |
|
7 |
|a Information storage and retrieval systems
|x Security measures
|2 fast
|0 (OCoLC)fst00973027
|
776 |
0 |
8 |
|i Print version:
|a Norman, Thomas.
|t Integrated security systems design : a complete reference for building enterprise-wide digital security systems.
|b Second edition.
|d Oxford, [England] ; Waltham, Massachusetts : Butterworth-Heinemann, �2014
|h xvii, 381 pages
|z 9780128000229
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128000229
|z Texto completo
|