05538nam 2200673Ia 450 991078436530332120200520144314.01-280-96235-697866109623580-08-047144-7(CKB)1000000000349879(EBL)287955(OCoLC)437176881(SSID)ssj0000180321(PQKBManifestationID)11923043(PQKBTitleCode)TC0000180321(PQKBWorkID)10149683(PQKB)11546433(Au-PeEL)EBL287955(CaPaEBR)ebr10167030(CaSebORM)9780750679091(MiAaPQ)EBC287955(PPN)118959395(EXLCZ)99100000000034987920070123d2007 uy 0engur|n|---|||||txtccrIntegrated security systems design[electronic resource] concepts, specifications, and implementation /Thomas Norman2nd editionAmsterdam ;London Elsevier/Butterworth-Heinemannc20071 online resource (471 p.)Includes index.0-7506-7909-3 Includes bibliographical references and index.Front cover; Title page; Copyright page; Dedication; Table of contents; Preface; Acknowledgments; Section 1: Introduction to Integrated Security Systems; Chapter 1. Introduction and Organization of the Book; WHO SHOULD READ THIS BOOK; A BRIEF BACKGROUND; A FRAMEWORK FOR UNDERSTANDING THE DESIGN PROCESS; GOALS OF THE BOOK; ARRANGEMENT OF THE BOOK; Chapter 2. Integrated Security System Design Benefits and Philosophy; WHY INTEGRATE SYSTEMS?; COST BENEFITS; HOW INTEGRATION IS ACHIEVED; SUMMARY; Chapter 3. History of Electronic Security; THE HISTORY OF INTEGRATED SECURITY SYSTEMSTHE FIRST GENERATIONTHE SECOND GENERATION; THE THIRD GENERATION; THE FOURTH GENERATION; FIFTH-GENERATION TECHNOLOGY; AVOIDING OBSOLESCENCE; SUMMARY; CHAPTER NOTES; Section 2: Security System Design; Chapter 4. Security System Design Elements; THE TOOLS; THE PLACE OF ELECTRONICS IN THE OVERALL SECURITY PROCESS; ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES; TYPES OF DESIGN EFFORTS; PROJECT DRIVERS; SUMMARY; CHAPTER NOTES; Chapter 5. Electronics Elements (High-Level Discussion); ACCESS CONTROL ELEMENTS; DETECTION ELEMENTS; ASSESSMENT AND VERIFICATION ELEMENTS; REACTION ELEMENTS; SUMMARYCHAPTER NOTESChapter 6. Electronics Elements (Detailed Discussion); ALARM/ACCESS CONTROL SYSTEMS; SERVER (AND BUSINESS CONTINUITY SERVER); WORKSTATIONS; ADVANCED ELEMENTS; CCTV SYSTEMS; HOW DIGITAL VIDEO DIFFERS FROM ANALOG; WIRELESS DIGITAL VIDEO; SECURITY COMMUNICATIONS; ANALOG VS. DIGITAL; COMMAND/COMMUNICATIONS CONSOLES; GUARD CONSOLE FUNCTIONS; COMMUNICATIONS SYSTEMS; SUMMARY; CHAPTER NOTES; Chapter 7. Physical Security Elements; BASIC PHYSICAL SECURITY; BASIC PHYSICAL SECURITY SKILLS: KNOWLEDGE OF THE TOOLS; DOOR TYPES; ELECTRIFIED LOCKS; CONCERNS ABOUT SPECIAL KNOWLEDGE; SUMMARYCHAPTER NOTESChapter 8. The Security Design Process; ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES; DEFINE COUNTERMEASURES; ESTABLISH SECURITY POLICIES RELATED TO ELECTRONIC SYSTEMS; ESTABLISH THE BUDGET; PHASES OF THE DESIGN AND CONSTRUCTION PROJECT; SUMMARY; CHAPTER NOTE; Chapter 9. Preliminary Design Process Steps; BASIS FOR DESIGN; RESEARCH; DEVELOPING DRAWING AND SPECIFICATION RESOURCES; COORDINATING INTERFACES TO OTHER SYSTEMS; LAYOUT DEVICES IN RESPONSE TO ELECTRONIC SECURITY SYSTEM OBJECTIVES AND BUDGET; SELECT REQUIRED DEVICES; ANALOG VS. DIGITAL VIDEO AND AUDIO SYSTEMSCHAPTER NOTESChapter 10. Getting Down to the Actual Design; MACROLEVEL DESIGN: THE PIECES OF THE BIG PICTURE; MICROLEVEL DESIGN: THE THREADS THAT KNIT TOGETHER THE PIECES OF THE BIG PICTURE; SUMMARY; CHAPTER NOTE; Section 3: Special Design Sections; Chapter 11. Information Technology Systems Infrastructure; INTRODUCTION; BASICS OF TCP/IP AND SIGNAL COMMUNICATIONS; NETWORKING DEVICES; NETWORK INFRASTRUCTURE DEVICES; SERVERS; NETWORK ARCHITECTURE; NETWORK CONFIGURATIONS; CREATING NETWORK EFFICIENCIES; DIGITAL VIDEO; DIGITAL RESOLUTION; FRAME RATES; DISPLAY ISSUESMANAGING DATA SYSTEMS THROUGHPUT Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, tComputer networksSecurity measuresComputersAccess controlInformation storage and retrieval systemsSecurity measuresComputer networksSecurity measures.ComputersAccess control.Information storage and retrieval systemsSecurity measures.005.8Norman Thomas L926026MiAaPQMiAaPQMiAaPQBOOK9910784365303321Integrated security systems design3723701UNINA