LEADER 05322nam 2200649Ia 450 001 9910825032603321 005 20230829004959.0 010 $a1-281-05251-5 010 $a9786611052515 010 $a0-08-048000-4 035 $a(CKB)1000000000349908 035 $a(EBL)294308 035 $a(OCoLC)476057846 035 $a(SSID)ssj0000221473 035 $a(PQKBManifestationID)11186723 035 $a(PQKBTitleCode)TC0000221473 035 $a(PQKBWorkID)10161162 035 $a(PQKB)10573388 035 $a(MiAaPQ)EBC294308 035 $a(Au-PeEL)EBL294308 035 $a(CaPaEBR)ebr10185983 035 $a(CaONFJC)MIL105251 035 $a(OCoLC)437181507 035 $a(EXLCZ)991000000000349908 100 $a20050606d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPhysical security systems handbook$b[electronic resource] $ethe design and implementation of electronic security systems /$fMichael Khairallah 210 $aAmsterdam $cElsevier $cButterworth-Heinemann$d2006 215 $a1 online resource (305 p.) 300 $aDescription based upon print version of record. 311 $a1-4933-0309-0 311 $a0-7506-7850-X 327 $afront cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONU?PART 1, TECHNICAL SPECIFICATIONS 327 $aCHAPTER 8, SYSTEM ACQUISITIONU?PART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY 327 $aESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 327 $a6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION 327 $aTHE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL 327 $aCREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT 330 $aA practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book a 606 $aSecurity systems 606 $aBurglary protection 615 0$aSecurity systems. 615 0$aBurglary protection. 676 $a005.8 676 $a643.16 700 $aKhairallah$b Michael$01649433 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825032603321 996 $aPhysical security systems handbook$93998170 997 $aUNINA