Free Worldwide Shipping

Shop over 1 Million Toys in our Huge New Range

Design and Evaluation of Physical Protection Systems, Second Edition
By

Rating
;
Product Description
Product Details

Promotional Information

Authoritative and thorough update of the book referred to as the "bible" of Physical Security!

Table of Contents

Part One Chapter 1 - Design and Evaluation of Physical Protection Systems Introduction Safety vs. Security Deterrence Process Overview Physical Protection System Design PPS Functions Design Goals Design Criteria Analysis Physical Protection System Design and the Relationship to Risk Summary Chapter 2 - Facility Characterization Introduction Physical Conditions Facility Operations Facility Policies and Procedures Regulatory Requirements Safety Considerations Legal Issues Corporate Goals and Objectives Other Information Summary Security Principle Chapter 3 - Threat Definition [extensively updated] Introduction Steps for Threat Definition List Threat Information Collect Threat Information Organize Threat Information Example Threat Statements Chapter 4 - Target Identification Introduction Undesirable Consequences Consequence Analysis Targets Techniques for Target Identification Vital Area Identification Summary Security Principle Part Two Chapter 5 - Physical Protection System Design Introduction Physical Protection System Design PPS Functions Relationship of PPS Functions Characteristics of an Effective PPS Design Criteria Additional Design Elements Summary Security Principles Chapter 6 Exterior Intrusion Sensors Introduction Performance Characteristics Sensor Classification Sensor Technology Perimeter Sensor Systems--Design Concepts and Goals Effects of Physical and Environmental Conditions Integration with Video Assessment System Integration with Barrier Delay System Exterior Sensor Subsystem Characteristics Procedures Summary Security Principles Chapter 7 Interior Intrusion Sensors Introduction Performance Characteristics Sensor Classification Sensor Technology Effects of Environmental Conditions Sensor Selection Procedures System Integration Summary Security Principles Chapter 8- Alarm Assessment Introduction Assessment vs. Surveillance Video Alarm Assessment System Alarm Assessment by Response Force Integration with Safety Systems Legal issues Procedures Acceptance Testing Summary Security Principles Chapter 9--Alarm Communication and Display Introduction Evolution of Alarm Reporting Systems AC&D Attributes Alarm Communication Subsystem Alarm Control and Display Offline Systems AC&D System Design Summary Security Principles Chapter 10-Entry Control Introduction Personnel Entry Control Personnel Entry Control Bypass Contraband Detection Locks System Integration and Installation Issues Procedures Administrative Procedures Summary Security Principles Chapter 11- Access Delay Introduction Barrier Types and Principles System Considerations Aspects of Penetration Perimeter Barriers Structural Barriers Dispensable Barriers Procedures Summary Security Principles Chapter 12 Response [extensively updated] Introduction General Considerations Contingency Planning Communication Interruption Procedures Summary Security Principles Part Three Chapter 13 Analysis and Evaluation Introduction Adversary Paths Effectiveness Measures Quantitative Analysis Critical Path Qualitative Analysis Summary Security Principles Chapter 14 - EASI Computer Model for Analysis Introduction Quantitative Analysis Tools EASI Model Using the Model Adversary Sequence Diagrams Summary Security Principle Chapter 15 - Risk Assessment Introduction Risk Management Approaches Risk Equation Vulnerability Assessment Process Risk Assessment Performance Testing Summary Security Principle Chapter 16-Transportation System application [New] Appendix A-Threat tables Appendix B-EASI Model

About the Author

Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.

Reviews

"Personally, I consider the first edition of this book to be a classic. For anyone who really knows security, this book is the bible. It is just the way it has to be done."--Dennis Giever, PhD, Dept. of Criminology, University of Pennsylvania

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Item ships from and is sold by Fishpond World Ltd.
Back to top