Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah |
Autore | Khairallah Michael |
Pubbl/distr/stampa | Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina |
005.8
643.16 |
Soggetto topico |
Security systems
Burglary protection |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05251-5
9786611052515 0-08-048000-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION THE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT |
Record Nr. | UNINA-9910457316703321 |
Khairallah Michael | ||
Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah |
Autore | Khairallah Michael |
Pubbl/distr/stampa | Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina |
005.8
643.16 |
Soggetto topico |
Security systems
Burglary protection |
ISBN |
1-281-05251-5
9786611052515 0-08-048000-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION THE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT |
Record Nr. | UNINA-9910784364103321 |
Khairallah Michael | ||
Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Physical security systems handbook : the design and implementation of electronic security systems / / Michael Khairallah |
Autore | Khairallah Michael |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina |
005.8
643.16 |
Soggetto topico |
Security systems
Burglary protection |
ISBN |
1-281-05251-5
9786611052515 0-08-048000-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION THE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT |
Record Nr. | UNINA-9910825032603321 |
Khairallah Michael | ||
Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|