Authoritative and thorough update of the book referred to as the "bible" of Physical Security!
Part OneChapter 1 - Design and Evaluation of Physical Protection SystemsIntroductionSafety vs. SecurityDeterrenceProcess OverviewPhysical Protection System DesignPPS FunctionsDesign GoalsDesign CriteriaAnalysisPhysical Protection System Design and the Relationship to RiskSummaryChapter 2 - Facility CharacterizationIntroductionPhysical ConditionsFacility OperationsFacility Policies and ProceduresRegulatory RequirementsSafety ConsiderationsLegal IssuesCorporate Goals and ObjectivesOther InformationSummarySecurity PrincipleChapter 3 - Threat Definition [extensively updated]IntroductionSteps for Threat Definition List Threat Information Collect Threat Information Organize Threat Information Example Threat StatementsChapter 4 - Target IdentificationIntroductionUndesirable ConsequencesConsequence AnalysisTargetsTechniques for Target IdentificationVital Area IdentificationSummarySecurity PrinciplePart TwoChapter 5 - Physical Protection System DesignIntroductionPhysical Protection System DesignPPS FunctionsRelationship of PPS FunctionsCharacteristics of an Effective PPSDesign CriteriaAdditional Design ElementsSummarySecurity PrinciplesChapter 6 Exterior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyPerimeter Sensor Systems--Design Concepts and GoalsEffects of Physical and Environmental ConditionsIntegration with Video Assessment SystemIntegration with Barrier Delay SystemExterior Sensor Subsystem CharacteristicsProceduresSummarySecurity PrinciplesChapter 7 Interior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyEffects of Environmental ConditionsSensor SelectionProceduresSystem IntegrationSummarySecurity PrinciplesChapter 8- Alarm AssessmentIntroductionAssessment vs. SurveillanceVideo Alarm Assessment SystemAlarm Assessment by Response ForceIntegration with Safety SystemsLegal issuesProceduresAcceptance TestingSummarySecurity PrinciplesChapter 9--Alarm Communication and DisplayIntroductionEvolution of Alarm Reporting SystemsAC&D AttributesAlarm Communication SubsystemAlarm Control and DisplayOffline SystemsAC&D System DesignSummarySecurity PrinciplesChapter 10-Entry ControlIntroductionPersonnel Entry ControlPersonnel Entry Control BypassContraband DetectionLocksSystem Integration and Installation IssuesProceduresAdministrative ProceduresSummarySecurity PrinciplesChapter 11- Access DelayIntroductionBarrier Types and PrinciplesSystem ConsiderationsAspects of PenetrationPerimeter BarriersStructural Barriers Dispensable BarriersProceduresSummarySecurity PrinciplesChapter 12 Response [extensively updated]IntroductionGeneral ConsiderationsContingency Planning Communication InterruptionProceduresSummarySecurity PrinciplesPart ThreeChapter 13 Analysis and EvaluationIntroductionAdversary PathsEffectiveness MeasuresQuantitative AnalysisCritical PathQualitative AnalysisSummarySecurity PrinciplesChapter 14 - EASI Computer Model for AnalysisIntroductionQuantitative Analysis Tools EASI Model Using the ModelAdversary Sequence DiagramsSummarySecurity PrincipleChapter 15 - Risk AssessmentIntroductionRisk Management ApproachesRisk EquationVulnerability Assessment ProcessRisk AssessmentPerformance TestingSummarySecurity PrincipleChapter 16-Transportation System application [New]Appendix A-Threat tablesAppendix B-EASI Model
Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.
"Personally, I consider the first edition of this book to be a classic. For anyone who really knows security, this book is the bible. It is just the way it has to be done."--Dennis Giever, PhD, Dept. of Criminology, University of Pennsylvania