05322nam 2200649Ia 450 991078436410332120230829004959.01-281-05251-597866110525150-08-048000-4(CKB)1000000000349908(EBL)294308(OCoLC)476057846(SSID)ssj0000221473(PQKBManifestationID)11186723(PQKBTitleCode)TC0000221473(PQKBWorkID)10161162(PQKB)10573388(MiAaPQ)EBC294308(Au-PeEL)EBL294308(CaPaEBR)ebr10185983(CaONFJC)MIL105251(OCoLC)437181507(EXLCZ)99100000000034990820050606d2006 uy 0engur|n|---|||||txtccrPhysical security systems handbook[electronic resource] the design and implementation of electronic security systems /Michael KhairallahAmsterdam Elsevier Butterworth-Heinemann20061 online resource (305 p.)Description based upon print version of record.1-4933-0309-0 0-7506-7850-X front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONUÌ‚PART 1, TECHNICAL SPECIFICATIONSCHAPTER 8, SYSTEM ACQUISITIONUÌ‚PART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEYESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTIONTHE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNELCREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENTA practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book aSecurity systemsBurglary protectionSecurity systems.Burglary protection.005.8643.16Khairallah Michael1498205MiAaPQMiAaPQMiAaPQBOOK9910784364103321Physical security systems handbook3723690UNINA