1.

Record Nr.

UNINA9910784365303321

Autore

Norman Thomas L

Titolo

Integrated security systems design [[electronic resource] ] : concepts, specifications, and implementation / / Thomas Norman

Pubbl/distr/stampa

Amsterdam ; ; London, : Elsevier/Butterworth-Heinemann, c2007

ISBN

1-280-96235-6

9786610962358

0-08-047144-7

Edizione

[2nd edition]

Descrizione fisica

1 online resource (471 p.)

Disciplina

005.8

Soggetti

Computer networks - Security measures

Computers - Access control

Information storage and retrieval systems - Security measures

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front cover; Title page; Copyright page; Dedication; Table of contents; Preface; Acknowledgments; Section 1: Introduction to Integrated Security Systems; Chapter 1. Introduction and Organization of the Book; WHO SHOULD READ THIS BOOK; A BRIEF BACKGROUND; A FRAMEWORK FOR UNDERSTANDING THE DESIGN PROCESS; GOALS OF THE BOOK; ARRANGEMENT OF THE BOOK; Chapter 2. Integrated Security System Design Benefits and Philosophy; WHY INTEGRATE SYSTEMS?; COST BENEFITS; HOW INTEGRATION IS ACHIEVED; SUMMARY; Chapter 3. History of Electronic Security; THE HISTORY OF INTEGRATED SECURITY SYSTEMS

THE FIRST GENERATIONTHE SECOND GENERATION; THE THIRD GENERATION; THE FOURTH GENERATION; FIFTH-GENERATION TECHNOLOGY; AVOIDING OBSOLESCENCE; SUMMARY; CHAPTER NOTES; Section 2: Security System Design; Chapter 4. Security System Design Elements; THE TOOLS; THE PLACE OF ELECTRONICS IN THE OVERALL SECURITY PROCESS; ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES; TYPES OF DESIGN EFFORTS; PROJECT DRIVERS; SUMMARY; CHAPTER NOTES; Chapter 5. Electronics Elements (High-Level Discussion); ACCESS CONTROL ELEMENTS; DETECTION ELEMENTS;



ASSESSMENT AND VERIFICATION ELEMENTS; REACTION ELEMENTS; SUMMARY

CHAPTER NOTESChapter 6. Electronics Elements (Detailed Discussion); ALARM/ACCESS CONTROL SYSTEMS; SERVER (AND BUSINESS CONTINUITY SERVER); WORKSTATIONS; ADVANCED ELEMENTS; CCTV SYSTEMS; HOW DIGITAL VIDEO DIFFERS FROM ANALOG; WIRELESS DIGITAL VIDEO; SECURITY COMMUNICATIONS; ANALOG VS. DIGITAL; COMMAND/COMMUNICATIONS CONSOLES; GUARD CONSOLE FUNCTIONS; COMMUNICATIONS SYSTEMS; SUMMARY; CHAPTER NOTES; Chapter 7. Physical Security Elements; BASIC PHYSICAL SECURITY; BASIC PHYSICAL SECURITY SKILLS: KNOWLEDGE OF THE TOOLS; DOOR TYPES; ELECTRIFIED LOCKS; CONCERNS ABOUT SPECIAL KNOWLEDGE; SUMMARY

CHAPTER NOTESChapter 8. The Security Design Process; ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES; DEFINE COUNTERMEASURES; ESTABLISH SECURITY POLICIES RELATED TO ELECTRONIC SYSTEMS; ESTABLISH THE BUDGET; PHASES OF THE DESIGN AND CONSTRUCTION PROJECT; SUMMARY; CHAPTER NOTE; Chapter 9. Preliminary Design Process Steps; BASIS FOR DESIGN; RESEARCH; DEVELOPING DRAWING AND SPECIFICATION RESOURCES; COORDINATING INTERFACES TO OTHER SYSTEMS; LAYOUT DEVICES IN RESPONSE TO ELECTRONIC SECURITY SYSTEM OBJECTIVES AND BUDGET; SELECT REQUIRED DEVICES; ANALOG VS. DIGITAL VIDEO AND AUDIO SYSTEMS

CHAPTER NOTESChapter 10. Getting Down to the Actual Design; MACROLEVEL DESIGN: THE PIECES OF THE BIG PICTURE; MICROLEVEL DESIGN: THE THREADS THAT KNIT TOGETHER THE PIECES OF THE BIG PICTURE; SUMMARY; CHAPTER NOTE; Section 3: Special Design Sections; Chapter 11. Information Technology Systems Infrastructure; INTRODUCTION; BASICS OF TCP/IP AND SIGNAL COMMUNICATIONS; NETWORKING DEVICES; NETWORK INFRASTRUCTURE DEVICES; SERVERS; NETWORK ARCHITECTURE; NETWORK CONFIGURATIONS; CREATING NETWORK EFFICIENCIES; DIGITAL VIDEO; DIGITAL RESOLUTION; FRAME RATES; DISPLAY ISSUES

MANAGING DATA SYSTEMS THROUGHPUT

Sommario/riassunto

Integrated Security Systems Design  is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, t