Free Worldwide Shipping

Shop over 1 Million Toys in our Huge New Range

Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter
Product Details

Promotional Information

Authoritative and thorough update of the book referred to as the "bible" of Physical Security!

Table of Contents

Part OneChapter 1 - Design and Evaluation of Physical Protection SystemsIntroductionSafety vs. SecurityDeterrenceProcess OverviewPhysical Protection System DesignPPS FunctionsDesign GoalsDesign CriteriaAnalysisPhysical Protection System Design and the Relationship to RiskSummaryChapter 2 - Facility CharacterizationIntroductionPhysical ConditionsFacility OperationsFacility Policies and ProceduresRegulatory RequirementsSafety ConsiderationsLegal IssuesCorporate Goals and ObjectivesOther InformationSummarySecurity PrincipleChapter 3 - Threat Definition [extensively updated]IntroductionSteps for Threat Definition List Threat Information Collect Threat Information Organize Threat Information Example Threat StatementsChapter 4 - Target IdentificationIntroductionUndesirable ConsequencesConsequence AnalysisTargetsTechniques for Target IdentificationVital Area IdentificationSummarySecurity PrinciplePart TwoChapter 5 - Physical Protection System DesignIntroductionPhysical Protection System DesignPPS FunctionsRelationship of PPS FunctionsCharacteristics of an Effective PPSDesign CriteriaAdditional Design ElementsSummarySecurity PrinciplesChapter 6 Exterior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyPerimeter Sensor Systems--Design Concepts and GoalsEffects of Physical and Environmental ConditionsIntegration with Video Assessment SystemIntegration with Barrier Delay SystemExterior Sensor Subsystem CharacteristicsProceduresSummarySecurity PrinciplesChapter 7 Interior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyEffects of Environmental ConditionsSensor SelectionProceduresSystem IntegrationSummarySecurity PrinciplesChapter 8- Alarm AssessmentIntroductionAssessment vs. SurveillanceVideo Alarm Assessment SystemAlarm Assessment by Response ForceIntegration with Safety SystemsLegal issuesProceduresAcceptance TestingSummarySecurity PrinciplesChapter 9--Alarm Communication and DisplayIntroductionEvolution of Alarm Reporting SystemsAC&D AttributesAlarm Communication SubsystemAlarm Control and DisplayOffline SystemsAC&D System DesignSummarySecurity PrinciplesChapter 10-Entry ControlIntroductionPersonnel Entry ControlPersonnel Entry Control BypassContraband DetectionLocksSystem Integration and Installation IssuesProceduresAdministrative ProceduresSummarySecurity PrinciplesChapter 11- Access DelayIntroductionBarrier Types and PrinciplesSystem ConsiderationsAspects of PenetrationPerimeter BarriersStructural Barriers Dispensable BarriersProceduresSummarySecurity PrinciplesChapter 12 Response [extensively updated]IntroductionGeneral ConsiderationsContingency Planning Communication InterruptionProceduresSummarySecurity PrinciplesPart ThreeChapter 13 Analysis and EvaluationIntroductionAdversary PathsEffectiveness MeasuresQuantitative AnalysisCritical PathQualitative AnalysisSummarySecurity PrinciplesChapter 14 - EASI Computer Model for AnalysisIntroductionQuantitative Analysis Tools EASI Model Using the ModelAdversary Sequence DiagramsSummarySecurity PrincipleChapter 15 - Risk AssessmentIntroductionRisk Management ApproachesRisk EquationVulnerability Assessment ProcessRisk AssessmentPerformance TestingSummarySecurity PrincipleChapter 16-Transportation System application [New]Appendix A-Threat tablesAppendix B-EASI Model

About the Author

Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.


"Personally, I consider the first edition of this book to be a classic. For anyone who really knows security, this book is the bible. It is just the way it has to be done."--Dennis Giever, PhD, Dept. of Criminology, University of Pennsylvania

Look for similar items by category
Item ships from and is sold by Fishpond World Ltd.
Back to top