Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. Emphasizing the marriage of technology and physical hardware, this volume covers intrusion detection, access control, and video surveillance systems, including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations. Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.
Physical Security Planning. Vulnerability Assessments. Security Design and Planning. Security Construction Projects. Protection in Depth. Perimeter Protection. Access Control. Physical Protection Systems. CCTV and IP Video. Keys, Locks, and Safes. Biometrics. Security Guard Force. Central Station Design. Government Security. Financial Institutions and Banks. Data Center Protection. Total System Cost. Security Master Plan. Security Foresight. Security Leadership. Index.