20%
101.90
CHF81.50
Download est disponible immédiatement
Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. Emphasizing the marriage of technology and physical hardware, this volume covers intrusion detection, access control, and video surveillance systems, including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations. Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.
Auteur
Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.
Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2 Guide to the CISSP CBK, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.
Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)-both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives. Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultu
Résumé
To adequately protect an organization, physical security must go beyond the "e;gates, guns, and guards"e; mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility-people, building, and location-and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems-including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.The authors of this book have nearly 50 years combined experience in the security industry-including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.
Contenu
Physical Security Planning. Vulnerability Assessments. Security Design and Planning. Security Construction Projects. Protection in Depth. Perimeter Protection. Access Control. Physical Protection Systems. CCTV and IP Video. Keys, Locks, and Safes. Biometrics. Security Guard Force. Central Station Design. Government Security. Financial Institutions and Banks. Data Center Protection. Total System Cost. Security Master Plan. Security Foresight. Security Leadership. Index.