SmartSellTM - The New Way to Sell Online

Shop over a million Toys in our Huge New Range

The Complete Guide to Physical Security
By

Rating

Product Description
Product Details

Table of Contents

Physical Security Planning
Setting the Stage
Site Planning
Reviewing the Physical Design
Vulnerability Assessments
The Security Survey
Vulnerability Assessment
Developing a Vulnerability Assessment
Understanding the Threats
Making Adjustments
Security Design and Planning
Security Planning and Evaluation
Security Design Concepts
Security Technologies
EASI Model
Adversary Sequence Diagram
Working with Architects
Working with Contractors
Construction Review
Security Construction Projects
New Construction
Initial Point of Access
Roadway Design
Parking
Loading Docks
Signage
Retrofitting
Protection in Depth
Protection-in-Depth Concepts
Protection Plans
Evacuation Drills
Incident Response
Penetration Tests
Access Control Violation Monitoring
Perimeter Protection
Crime Prevention through Environmental Design (CPTED)
Protecting with CPTED Concepts
Barriers
Lighting
Access Control
Access Control
Anti-Passback
Access Control Head End
Turnstiles and Mantraps
Physical Protection Systems
Doors
Windows
Interior Intrusion Detection Systems
Perimeter Intrusion Detection Systems
CCTV and IP Video
The Essential Guide to Video Surveillance
Video Surveillance Use Cases
Video Surveillance System Classifications
Image Capture Video Sources-Cameras
Lenses
Lighting
HDTV
Recording Systems
Video Management Systems
Video Control, Analysis, and Video Content Analysis Systems
Using a Step-by-Step Approach to System Selection and Deployment
Upgrade Path
Manpower and Video Surveillance
Privacy and Legal Considerations-Video Surveillance Checklist
The Future of Video Surveillance
Keys, Locks, and Safes
Keys, Locks, and Safes
Developing a Master Locking System
Safes
Vaults
Containers
Biometrics
What Is Biometrics?
Multibiometric Systems
Deploying Biometrics
Privacy
Biometric Metrics
Attacks on Biometric Systems and Their Remedies
Security Guard Force
Establishing a Security Guard Force
Mission and Duties of the Security Guard Force
Profile of the Facility to Be Protected
Proprietary Security Guard Force
Contract Security Guard Force
Hybrid Force
Security Guard Uniforms
Security Guard Identification
Security Guard as an Authority Figure
Security Guard Protective Equipment
Security Guard Training
Professional Security Certifications
Personnel Issues
Central Station Design
Developing an Operation
Design Requirements
Secondary Amenities for an Operations Control Center
Alarm Assessment
Government Security
SCIF
Location
Design
Sound Masking
TEMPEST
Shielding
Filtering
Access
Security Alarm Requirements
Open Storage
Closed Storage
Dealing with Contractors
Appendix A: Fixed Facility Checklist
Financial Institutions and Banks
Vaults
Safes
ATMs
Night Depositories
Teller Cash Recyclers
Dye Packs
Barriers
Ambush Features
Video Systems
Holdup Alarms
Bank Guards
Data Center Protection
Data Centers
Fire Protection
Fire Detection/Alerting
Fire Suppression
Total System Cost
Determining Total System Cost
System Design Cost
System Installation Cost
System Operational Cost
IT-Related Cost
Maintenance Cost
Replacement Cost
Cost-Benefit Analysis
Cost of Loss
Cost of Prevention
Return on Investment
Cost Factors
Security Master Plan
Security Master Plan Strategy
Engaging the Stakeholders
What Should Your Security Philosophies Be?
Technology Migration Strategy
Equipment Replacement Schedules
Security Foresight
Strategic Foresight
Foresight Techniques
Security Leadership
What Is Leadership?
Purpose of Leadership
Effective Leadership
Why Security Leaders Are Important
Understanding the Basics
Are Leaders Born or Made?
Good Leadership
Bad Leadership
Going from Bad to Good
Forging the Future
New Definitions for Leaders in the Twenty-First Century
Index


About the Author

Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation. Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2 (R) Guide to the CISSP (R) CBK (R), Second Edition and Official (ISC)2 Guide to the ISSAP CBK. Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)-both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives. Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.

Reviews

"There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program ... it is a good introduction to physical security concepts."
- ASIS Dynamics 'For manufacturing readers wondering how truly safe their operations are, or how safe they could be, this volume is a great starting point.' --Blue Heron Journal

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling The Complete Guide to Physical Security on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.
Back to top