LEADER 05291nam 22006134a 450 001 9910457069003321 005 20200520144314.0 010 $a1-281-05212-4 010 $a9786611052126 010 $a0-08-048167-1 035 $a(CKB)1000000000349947 035 $a(EBL)294440 035 $a(OCoLC)476058602 035 $a(SSID)ssj0000268584 035 $a(PQKBManifestationID)11240942 035 $a(PQKBTitleCode)TC0000268584 035 $a(PQKBWorkID)10236070 035 $a(PQKB)11018101 035 $a(MiAaPQ)EBC294440 035 $a(Au-PeEL)EBL294440 035 $a(CaPaEBR)ebr10186120 035 $a(CaONFJC)MIL105212 035 $a(EXLCZ)991000000000349947 100 $a20050714d2006 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aVulnerability assessment of physical protection systems$b[electronic resource] /$fMary Lynn Garcia 210 $aAmsterdam ;$aBoston $cElsevier Butterworth-Heinemann$dc2006 215 $a1 online resource (399 p.) 300 $aDescription based upon print version of record. 311 $a0-7506-7788-0 320 $aIncludes bibliographical references and index. 327 $aFront cover; Title page; Copyright page; Table of contents; Preface; CHAPTER 1 Introduction to Vulnerability Assessment; Risk Management and Vulnerability Assessment; Risk Assessment and the Vulnerability Assessment Process; Statistics and Quantitative Analysis; Vulnerability Assessment Process Overview; Planning the Vulnerability Assessment; Project Management; Establish the Vulnerability Assessment Team; Project Kick-Off Meetings; Protection Objectives; Facility Characterization; Data Collection-Detection; Intrusion Sensors; Alarm Assessment; Entry Control; Alarm Communication and Display 327 $aData Collection-Delay Data Collection-Response; Analysis; Reporting and Using the Vulnerability Assessment; Systems Engineering and Vulnerability Assessment; System Requirements; System Design and Analysis; System Installation and Test; System Replacement; Summary; References; CHAPTER 2 Physical Protection Systems Principles and Concepts; Physical Protection Systems Overview; Physical Protection System Design; PPS Functions; Detection; Delay; Response; Relationship of PPS Functions; Characteristics of an Effective PPS; Protection-in-Depth; Minimum Consequence of Component Failure 327 $aBalanced Protection Design and Evaluation Criteria; Additional Design Elements; Summary; Reference; CHAPTER 3 Getting Started; Project Management; Phase One-Project Planning; Initial Customer Contact; Define the Project; Phase Two-Managing the Project; Project Status and Reporting; Recovery Plans; Project Management Tools; Project Closeout; Project Management Summary; Establish a Vulnerability Assessment Team; Vulnerability Assessment Project Leader; Systems Engineer; Security System Engineer; SME-Intrusion Sensing Subsystem; SME-Alarm Assessment Subsystem 327 $aSME-Alarm Communication & Display (AC&D) Subsystem SME-Entry Control Subsystem; SME-Delay Subsystem; SME-Response Subsystem; SME-Communications Subsystem; SME-Analyst; Special Note for Response Force Simulations; Participation of On-Site Personnel; Kick-Off Meetings for Project Team and Customer; Project Team Kick-Off Meeting; VA Team Guide; Site Information; Customer Kick-Off Meeting; Summary; References; CHAPTER 4 VA Process Inputs - Establish Protection Objectives; Defining the Threat; Listing Information Needed; Collecting Information; Organizing Information; Threat Definition Methods 327 $aInsider Threat Other Notes on Threat Definition; Estimating Likelihood of Attack; Asset Identification; Asset Identification Methods; Manual Listing; Logic Diagrams; Criteria; Threat/Asset Matrix; Facility Characterization; Characterization Tools; Facility States; Security Checklists; Summary; References; CHAPTER 5 Data Collection - Intrusion Detection Subsystem; Sensor Overview; Exterior Intrusion Sensor Technologies and Evaluation; Freestanding Sensors; Exterior Microwave Sensors; Electric-field Sensors; Freestanding Sensors Summary; Buried-Line Sensors; Ported Coaxial Sensors 327 $aBuried-Line Sensors Summary 330 $aVulnerability Assessment of Physical Protection Systems will describe the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. The text will draw heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allow readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The book will address the full spectrum of a VA, including negotiating tasks with the customer, 606 $aSecurity systems$xEvaluation 608 $aElectronic books. 615 0$aSecurity systems$xEvaluation. 676 $a658.4/73 700 $aGarcia$b Mary Lynn$0888552 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457069003321 996 $aVulnerability assessment of physical protection systems$91985048 997 $aUNINA