Effective physical security / / Lawrence J. Fennelly
| Effective physical security / / Lawrence J. Fennelly |
| Autore | Fennelly Lawrence J. |
| Edizione | [Fifth edition.] |
| Pubbl/distr/stampa | Oxford, United Kingdom : , : Butterworth-Heinemann, , [2017] |
| Descrizione fisica | 1 online resource (xi, 446 pages) : illustrations (some color) |
| Disciplina | 621.3892 |
| Collana | Gale eBooks |
| Soggetto topico |
Burglary protection
Crime prevention and architectural design Crime prevention |
| ISBN | 0-12-804495-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
1.Encompassing Effective CPTED Solutions in 2017 and Beyond: Concepts and Strategies / Marianna A. Perry -- 2.Introduction to Vulnerability Assessment / Mary Lynn Garcia -- 3.Influence of Physical Design / Marianna A. Perry -- 4.Approaches to Physical Security / Ronald Jason -- 5.Security Lighting / James F. Broder -- 6.Electronics Elements: A Detailed Discussion / Thomas L. Norman -- 7.Use of Locks in Physical Crime Prevention / John E. Hunter -- 8.Internal Threats and Countermeasures / Philip P. Purpura -- 9.External Threats and Countermeasures / Philip P. Purpura -- 10.Biometrics in the Criminal Justice System and Society Today / Dr. Thomas J. Rzemyk -- 11.Access Control Systems and Identification Badges / Dr. Joshua Sinai -- 12.Chain-Link Fence Standards / Chain-Link Fence Manufacturers Institute -- 13.Doors, Door Frames, and Signage / Marianna A. Perry -- 14.Glass and Windows / Marianna A. Perry --
Note continued: 15.The Legalization of Marijuana and the Security Industry / Lawrence J. Fennelly -- 16.Designing Security and Working With Architects / Ron Hurley -- 17.Standards, Regulations, and Guidelines Compliance and Your Security Program, Including Global Resources / Roderick Draper -- 18.Information Technology Systems Infrastructure / Thomas Norman -- 19.Security Officers and Equipment Monitoring / Craig Mcquate -- 20.Video Technology Overview / Herman Kruegle -- 21.Understanding Layers of Protection Analysis / Mark Beaudry -- 22.Fire Development and Behavior / Inge Sebyan Black -- 23.Alarms Intrusion Detection Systems / Frank Davies. |
| Record Nr. | UNINA-9910583354403321 |
Fennelly Lawrence J.
|
||
| Oxford, United Kingdom : , : Butterworth-Heinemann, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Effective physical security [[electronic resource] /] / Lawrence J. Fennelly
| Effective physical security [[electronic resource] /] / Lawrence J. Fennelly |
| Autore | Fennelly Lawrence J. <1940-> |
| Edizione | [4th ed.] |
| Pubbl/distr/stampa | Waltham, Mass., : Butterworth-Heinemann, 2013 |
| Descrizione fisica | 1 online resource (379 p.) |
| Disciplina | 658.4/7 |
| Soggetto topico |
Burglary protection
Crime prevention and architectural design Crime prevention |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-12-415981-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Effective PhysicalSecurity; Copyright; Dedication; Acknowledgments; Foreword; Chapter 1 - Influence of Physical Design; INTRODUCTION; DEFENSIBLE SPACE; CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN; CONCLUSION; REFERENCES; Chapter 2 - Introduction to Vulnerability Assessment*; RISK MANAGEMENT AND VULNERABILITY ASSESSMENT; RISK ASSESSMENT AND THE VULNERABILITY ASSESSMENT PROCESS; STATISTICS AND QUANTITATIVE ANALYSIS; VULNERABILITY ASSESSMENT PROCESS OVERVIEW; REPORTING AND USING THE VULNERABILITY ASSESSMENT; SYSTEMS ENGINEERING AND VULNERABILITY ASSESSMENT; SUMMARY; REFERENCES
Chapter 3 - Security Surveys and the AuditTHE BEST TIME TO CONDUCT THE SURVEY; WHY CONDUCT A SECURITY REVIEW; CLASSIFICATION OF SURVEY RECOMMENDATIONS; DEVELOPING SECURITY POINTS; NINE POINTS OF SECURITY CONCERN; PERSONALITY OF THE COMPLEX; POSITIVE AND NEGATIVE ASPECTS OF MAKING RECOMMENDATIONS; CRIME ANALYSIS; KEY CONTROL; DIGITAL CLOSED-CIRCUIT TELEVISION; INTRUSION ALARMS; LIGHTING AND SECURITY; OTHER SECURITY ASPECTS; SECURITY SURVEY FOLLOW-UP; RESIDENTIAL SECURITY; HOME SECURITY CHECKLIST; TOP TEN SECURITY THREATS; THE AUDIT; REFERENCES EXTERIOR PHYSICAL CHARACTERISTICS: PERIMETER GROUNDSAPPENDIX 3.E. OFFICE SECURITY CHECKLIST; EXTERIOR; DOORS; WINDOWS; GENERAL HOME SECURITY; MISCELLANEOUS; APPENDIX 3.G. FIRE SAFETY INSPECTION; ADMINISTRATIVE AND PLANNING PHASE; SUMMARY; BULLET-RESISTANT FIBERGLASS WALL PANELS; BULLET-RESISTANT DOORS; BULLET-RESISTANT WINDOWS; APPENDIX 3.I. WINDOW FILM; Chapter 4 - Approaches to Physical Security*; LEVELS OF PHYSICAL SECURITY; THE VALUE OF PLANNING; PHYSICAL BARRIERS; THE SECURITY PLAN; SUMMARY; REFERENCES; Chapter 5 - Protective Barriers; OVERVIEW; PERIMETER ENTRANCES; BARRIER PLANNING FENCE STANDARDSTYPES OF SECURITY FENCES; SUMMARY; REFERENCES; Chapter 6 - Physical Barriers*; DOORS; ROOFS; FLOORS; FENCES; WALLS AND MOATS; REFERENCES; Chapter 7 - Use of Locks in Physical Crime Prevention*; KEY-OPERATED MECHANISMS; COMBINATION LOCKS; LOCK BODIES; DOOR LOCK TYPES; STRIKES; ATTACKS AND COUNTERMEASURES; LOCKS AND THE SYSTEMS APPROACH TO SECURITY; NEW STANDARD SET FOR EXIT DEVICES, LOCKS, AND ALARMS [1]; REFERENCE; APPENDIX 7.B. KEY CONTROL AND LOCK SECURITY CHECKLIST*; APPENDIX 7.C. TERMS AND DEFINITIONS FOR DOOR AND WINDOW SECURITY*; Chapter 8 - Safes, Vaults, and Accessories CHOOSE THE RIGHT CONTAINERUL-RATED COMBINATION LOCKS; RELOCKING DEVICES; LOCKING DIALS; LOCKABLE HANDLES; TIME LOCKS; TIME-DELAY COMBINATION LOCKS; ALARMED COMBINATION LOCKS; VISION-RESTRICTING AND SHIELDED DIALS; COMBINATION CHANGING; SAFE BURGLARIES; HIDDEN COMBINATIONS; OVERCOMING SAFE-OPENING PROBLEMS; FILES; SAFES; RATINGS; Chapter 9 - Security Lighting; INTRODUCTION; ILLUMINATION [3]; TYPES OF LAMPS [4]; TWENTY-FIVE THINGS YOU NEED TO KNOW ABOUT LIGHTING [7]; ENERGY MANAGEMENT; LIGHTING DEFINITIONS; REFERENCES; WEB SITES; APPENDIX 9.A. LIGHTING DESCRIPTIONUNCITED Chapter 10 - Alarms: Intrusion Detection Systems* |
| Record Nr. | UNINA-9910461768503321 |
Fennelly Lawrence J. <1940->
|
||
| Waltham, Mass., : Butterworth-Heinemann, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Effective physical security [[electronic resource] /] / Lawrence J. Fennelly
| Effective physical security [[electronic resource] /] / Lawrence J. Fennelly |
| Autore | Fennelly Lawrence J. <1940-> |
| Edizione | [4th ed.] |
| Pubbl/distr/stampa | Waltham, Mass., : Butterworth-Heinemann, 2013 |
| Descrizione fisica | 1 online resource (379 p.) |
| Disciplina | 658.4/7 |
| Altri autori (Persone) | FennellyLawrence J. <1940-> |
| Soggetto topico |
Burglary protection
Crime prevention and architectural design Crime prevention |
| ISBN | 0-12-415981-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Effective PhysicalSecurity; Copyright; Dedication; Acknowledgments; Foreword; Chapter 1 - Influence of Physical Design; INTRODUCTION; DEFENSIBLE SPACE; CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN; CONCLUSION; REFERENCES; Chapter 2 - Introduction to Vulnerability Assessment*; RISK MANAGEMENT AND VULNERABILITY ASSESSMENT; RISK ASSESSMENT AND THE VULNERABILITY ASSESSMENT PROCESS; STATISTICS AND QUANTITATIVE ANALYSIS; VULNERABILITY ASSESSMENT PROCESS OVERVIEW; REPORTING AND USING THE VULNERABILITY ASSESSMENT; SYSTEMS ENGINEERING AND VULNERABILITY ASSESSMENT; SUMMARY; REFERENCES
Chapter 3 - Security Surveys and the AuditTHE BEST TIME TO CONDUCT THE SURVEY; WHY CONDUCT A SECURITY REVIEW; CLASSIFICATION OF SURVEY RECOMMENDATIONS; DEVELOPING SECURITY POINTS; NINE POINTS OF SECURITY CONCERN; PERSONALITY OF THE COMPLEX; POSITIVE AND NEGATIVE ASPECTS OF MAKING RECOMMENDATIONS; CRIME ANALYSIS; KEY CONTROL; DIGITAL CLOSED-CIRCUIT TELEVISION; INTRUSION ALARMS; LIGHTING AND SECURITY; OTHER SECURITY ASPECTS; SECURITY SURVEY FOLLOW-UP; RESIDENTIAL SECURITY; HOME SECURITY CHECKLIST; TOP TEN SECURITY THREATS; THE AUDIT; REFERENCES EXTERIOR PHYSICAL CHARACTERISTICS: PERIMETER GROUNDSAPPENDIX 3.E. OFFICE SECURITY CHECKLIST; EXTERIOR; DOORS; WINDOWS; GENERAL HOME SECURITY; MISCELLANEOUS; APPENDIX 3.G. FIRE SAFETY INSPECTION; ADMINISTRATIVE AND PLANNING PHASE; SUMMARY; BULLET-RESISTANT FIBERGLASS WALL PANELS; BULLET-RESISTANT DOORS; BULLET-RESISTANT WINDOWS; APPENDIX 3.I. WINDOW FILM; Chapter 4 - Approaches to Physical Security*; LEVELS OF PHYSICAL SECURITY; THE VALUE OF PLANNING; PHYSICAL BARRIERS; THE SECURITY PLAN; SUMMARY; REFERENCES; Chapter 5 - Protective Barriers; OVERVIEW; PERIMETER ENTRANCES; BARRIER PLANNING FENCE STANDARDSTYPES OF SECURITY FENCES; SUMMARY; REFERENCES; Chapter 6 - Physical Barriers*; DOORS; ROOFS; FLOORS; FENCES; WALLS AND MOATS; REFERENCES; Chapter 7 - Use of Locks in Physical Crime Prevention*; KEY-OPERATED MECHANISMS; COMBINATION LOCKS; LOCK BODIES; DOOR LOCK TYPES; STRIKES; ATTACKS AND COUNTERMEASURES; LOCKS AND THE SYSTEMS APPROACH TO SECURITY; NEW STANDARD SET FOR EXIT DEVICES, LOCKS, AND ALARMS [1]; REFERENCE; APPENDIX 7.B. KEY CONTROL AND LOCK SECURITY CHECKLIST*; APPENDIX 7.C. TERMS AND DEFINITIONS FOR DOOR AND WINDOW SECURITY*; Chapter 8 - Safes, Vaults, and Accessories CHOOSE THE RIGHT CONTAINERUL-RATED COMBINATION LOCKS; RELOCKING DEVICES; LOCKING DIALS; LOCKABLE HANDLES; TIME LOCKS; TIME-DELAY COMBINATION LOCKS; ALARMED COMBINATION LOCKS; VISION-RESTRICTING AND SHIELDED DIALS; COMBINATION CHANGING; SAFE BURGLARIES; HIDDEN COMBINATIONS; OVERCOMING SAFE-OPENING PROBLEMS; FILES; SAFES; RATINGS; Chapter 9 - Security Lighting; INTRODUCTION; ILLUMINATION [3]; TYPES OF LAMPS [4]; TWENTY-FIVE THINGS YOU NEED TO KNOW ABOUT LIGHTING [7]; ENERGY MANAGEMENT; LIGHTING DEFINITIONS; REFERENCES; WEB SITES; APPENDIX 9.A. LIGHTING DESCRIPTIONUNCITED Chapter 10 - Alarms: Intrusion Detection Systems* |
| Record Nr. | UNINA-9910785961703321 |
Fennelly Lawrence J. <1940->
|
||
| Waltham, Mass., : Butterworth-Heinemann, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor]
| Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor] |
| Edizione | [5th ed.] |
| Pubbl/distr/stampa | Waltham, Mass., : Elsevier, 2012 |
| Descrizione fisica | 1 online resource (626 p.) |
| Disciplina | 364.4 |
| Altri autori (Persone) | FennellyLawrence J. <1940-> |
| Soggetto topico |
Private security services
Security systems Industries - Security measures Crime prevention and architectural design Burglary protection |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-78402-460-0
1-283-44791-6 9786613447913 0-12-385249-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Approaches to crime prevention & loss prevention -- Risk assessment / Mary Lynn Garcia -- Threats definition / Mary Lynn Garcia -- Designing security and working with architects / Lawrence J. Fennelly -- Designing crime risk management systems / Marianna Perry MS -- Approaches to physical security / Richard Gigliotti and Ronald Jason -- The security survey & the security audit / Lawrence J. Fennelly -- Crime prevention through environmental design in the twenty first century / Timothy Crowe -- Environment crime control / Glen Kitteringham -- Community policing/problem solving policing / Marianna Perry -- Neighborhood watch guidelines for the 21 st century / Marianna Perry -- Situational crime prevention and opportunity blocking / Severin L. Sorenson -- Design and evaluation / Mary Lynn Garcia -- Planning, management, and evaluation / Charles M. Girard -- Crime analysis and data collection / Lawrence J. Fennelly -- Standards, regulations & guidelines : compliance and your security program, including global resources / Rick Draper -- Security operations, tools, and technology -- Access control, access badges & biometrics characteristic / Joseph Nelson. |
| Record Nr. | UNINA-9910457191303321 |
| Waltham, Mass., : Elsevier, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor]
| Handbook of loss prevention and crime prevention [[electronic resource] /] / Lawrence J. Fennelly, [editor] |
| Edizione | [5th ed.] |
| Pubbl/distr/stampa | Waltham, Mass., : Elsevier, 2012 |
| Descrizione fisica | 1 online resource (626 p.) |
| Disciplina | 364.4 |
| Altri autori (Persone) | FennellyLawrence J. <1940-> |
| Soggetto topico |
Private security services
Security systems Industries - Security measures Crime prevention and architectural design Burglary protection |
| ISBN |
1-78402-460-0
1-283-44791-6 9786613447913 0-12-385249-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Approaches to crime prevention & loss prevention -- Risk assessment / Mary Lynn Garcia -- Threats definition / Mary Lynn Garcia -- Designing security and working with architects / Lawrence J. Fennelly -- Designing crime risk management systems / Marianna Perry MS -- Approaches to physical security / Richard Gigliotti and Ronald Jason -- The security survey & the security audit / Lawrence J. Fennelly -- Crime prevention through environmental design in the twenty first century / Timothy Crowe -- Environment crime control / Glen Kitteringham -- Community policing/problem solving policing / Marianna Perry -- Neighborhood watch guidelines for the 21 st century / Marianna Perry -- Situational crime prevention and opportunity blocking / Severin L. Sorenson -- Design and evaluation / Mary Lynn Garcia -- Planning, management, and evaluation / Charles M. Girard -- Crime analysis and data collection / Lawrence J. Fennelly -- Standards, regulations & guidelines : compliance and your security program, including global resources / Rick Draper -- Security operations, tools, and technology -- Access control, access badges & biometrics characteristic / Joseph Nelson. |
| Record Nr. | UNINA-9910778938103321 |
| Waltham, Mass., : Elsevier, 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
J.B. Elliott. February 20, 1926. -- Committed to the Committee of the Whole House and ordered to be printed
| J.B. Elliott. February 20, 1926. -- Committed to the Committee of the Whole House and ordered to be printed |
| Pubbl/distr/stampa | [Washington, D.C.] : , : [U.S. Government Printing Office], , 1926 |
| Descrizione fisica | 1 online resource (14 pages) |
| Altri autori (Persone) | MorrowJohn <1865-1935> (Democrat (NM)) |
| Collana |
House report / 69th Congress, 1st session. House
[United States congressional serial set ] |
| Soggetto topico |
Claims
Actions and defenses Post office buildings Postal service - Equipment and supplies Burglary protection Vaults (Strong rooms) Postal service - Employees |
| Soggetto genere / forma | Legislative materials. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910716224603321 |
| [Washington, D.C.] : , : [U.S. Government Printing Office], , 1926 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
J.B. Elliott. May 3 (calendar day, May 5), 1926. -- Ordered to be printed
| J.B. Elliott. May 3 (calendar day, May 5), 1926. -- Ordered to be printed |
| Pubbl/distr/stampa | [Washington, D.C.] : , : [U.S. Government Printing Office], , 1926 |
| Descrizione fisica | 1 online resource (14 pages) |
| Altri autori (Persone) | TysonLawrence Davis <1861-1929> (Democrat (TN)) |
| Collana |
Senate report / 69th Congress, 1st session. Senate
[United States congressional serial set ] |
| Soggetto topico |
Claims
Actions and defenses Burglary protection Vaults (Strong rooms) Postal service - Employees Maintenance Repairing |
| Soggetto genere / forma | Legislative materials. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | J.B. Elliott. May 3 |
| Record Nr. | UNINA-9910716357103321 |
| [Washington, D.C.] : , : [U.S. Government Printing Office], , 1926 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah
| Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah |
| Autore | Khairallah Michael |
| Pubbl/distr/stampa | Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 |
| Descrizione fisica | 1 online resource (305 p.) |
| Disciplina |
005.8
643.16 |
| Soggetto topico |
Security systems
Burglary protection |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-05251-5
9786611052515 0-08-048000-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION THE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT |
| Record Nr. | UNINA-9910457316703321 |
Khairallah Michael
|
||
| Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah
| Physical security systems handbook [[electronic resource] ] : the design and implementation of electronic security systems / / Michael Khairallah |
| Autore | Khairallah Michael |
| Pubbl/distr/stampa | Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 |
| Descrizione fisica | 1 online resource (305 p.) |
| Disciplina |
005.8
643.16 |
| Soggetto topico |
Security systems
Burglary protection |
| ISBN |
1-281-05251-5
9786611052515 0-08-048000-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
front cover; copyright; table of contents; front matter; Acknowledgments; body; 1 Introduction; WHAT IS THIS BOOK ABOUT?; WHEN IS THIS BOOK MOST USEFUL?; WHY IS THIS BOOK IMPORTANT TO YOU?; WHO SHOULD USE THIS BOOK?; BEING A CONSULTANT; OVERVIEW OF THE SECURITY AUDIT PROCESS; CHAPTER 2, THE PHYSICAL THREAT ASSESSMENT; CHAPTER 3, THE VULNERABILITY STUDY; CHAPTER 4, THE PRELIMINARY SYSTEM DESIGN; CHAPTER 5, DOCUMENTING THE PRELIMINARY SYSTEM DESIGN; CHAPTER 6, PRESENTING THE SOLUTIONS; CHAPTER 7, SYSTEM ACQUISITIONÛPART 1, TECHNICAL SPECIFICATIONS
CHAPTER 8, SYSTEM ACQUISITIONÛPART 2, THE BUSINESS PLANCHAPTER 9, SYSTEM IMPLEMENTATION; 2 The Physical Threat Assessment; 2 INTRODUCTION; THE SCOPE OF WORK; POLICY REVIEW; GATHER PRELIMINARY DATA; THE GOAL SETTING AND POLICY REVIEW MEETING; IDENTIFY ASSETS; CONDUCT THE PHYSICAL THREAT ASSESSMENT; 3 Conducting the Vulnerability Study to Identify Physical Security Requirements; 3 INTRODUCTION; PREPARE TO CONDUCT THE SURVEY; MEANS AND METHODS OF CONDUCTING A VULNERABILITY STUDY; PREPARE FOR THE SURVEY; IDENTIFY THE CONTROL PERIMETERS; SET THE VIDEO SYSTEM OBJECTIVES FOR THE SURVEY ESTABLISH THE COMMAND CENTEREQUIPMENT LOCATION; CONDUCT THE PHYSICAL SURVEY; DOCUMENT THE FINDINGS; KEY MANAGEMENT; CONSEQUENCES OF LOSS; CONCLUDING THE SURVEY; 4 Creating the Preliminary System Design; 4 INTRODUCTION; PRELIMINARY SYSTEM DESIGN; 5 Documenting the Preliminary System Design; 5 INTRODUCTION; COMPLETE THE SYSTEM DESIGN DOCUMENTATION; PREPARE A COST ESTIMATE OF THE ACCESS CONTROL AND ALARM MONITORING SYSTEMS; PREPARE A COST ESTIMATE FOR THE SURVEILLANCE SYSTEM; FORECAST EXPENSE BUDGETS; HUMAN RESOURCE REQUIREMENTS; COST ANALYSIS; LEGAL ISSUES; 6 Presenting the Solutions 6 INTRODUCTIONWHAT MANAGEMENT WANTS TO KNOW; METHODS OF PRESENTING THE RECOMMENDATION; DELIVERING THE PRESENTATION; 7 System Acquisition - Part 1, Technical Specifications; 7 INTRODUCTION; CHOOSE THE BID TYPE; PREPARE THE RFP WITH PERFORMANCE SPECIFICATIONS; THE SINGLE PHASE RFP; THE TWO PHASE RFP; ORGANIZE THE RFP; PREPARE THE PHASE ONE RFP; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; TECHNICAL EVALUATION; VENDOR PRESENTATIONS; FINAL EVALUATION AND RECOMMENDATION; 8 System Acquisition - Part 2, The Business Plan; 8 INTRODUCTION THE PHASE TWO BIDSECTION 1 - INVITATION TO BID; SECTION 2 - ADDITIONAL BIDDER QUALIFICATIONS; SECTION 3 - BID REQUIREMENTS; SECTION 4 - PRICING REQUIREMENTS; SECTION 5 - EXECUTION OF CONTRACT; SECTION 7 - POST INSTALLATION SUPPORT; SECTION 8 - SUBMITTALS; GET APPROVAL FOR THE SPECIFICATIONS; SOLICIT BIDDERS; THE PRE-BID MEETING; BID ACCEPTANCE AND BID OPENING; BUSINESS PLAN EVALUATION; 9 System Implementation; 9 INTRODUCTION; AWARDING THE CONTRACT; GET STARTED; MILESTONE REVIEWS; FINAL INSPECTION; POST INSTALLATION SUBMITTALS; SECURITY SYSTEM PERSONNEL CREATE USER DOCUMENTATION FOR SYSTEM MANAGEMENT |
| Record Nr. | UNINA-9910784364103321 |
Khairallah Michael
|
||
| Amsterdam, : Elsevier, : Butterworth-Heinemann, 2006 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Loss Prevention : An Introduction
| Security and Loss Prevention : An Introduction |
| Autore | Purpura Philip |
| Edizione | [5th ed.] |
| Pubbl/distr/stampa | Burlington, : Elsevier Science, 2007 |
| Descrizione fisica | 1 online resource (593 p.) |
| Disciplina |
658.4/73
658.4056 658.473 |
| Collana | OSHA factsheet |
| Soggetto topico |
Burglary protection
Employee theft - Prevention Employee theft -- Prevention Fire prevention Private security services Security systems Shoplifting - Prevention Shoplifting -- Prevention Private security services - Prevention Burglary protection - Prevention Employee theft Shoplifting Social Welfare & Social Work Social Sciences Criminology, Penology & Juvenile Delinquency |
| ISBN |
9786613837875
9781283525428 1283525429 9780080554006 0080554008 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Security and Loss Prevention: An Introduction; Copyright Page; Dedication; Table of Contents; About the Author; Preface; Acknowledgments; PART I: Introduction to Security and Loss Prevention; Chapter 1. The History of Security and Loss Prevention: A Critical Perspective; Objectives; Why Critical Thinking?; How Can We Think Critically?; Why Think Critically about the History of Security and Loss Prevention?; Security and Loss Prevention Defined; History; Early Civilizations; More Contemporary Times; Case Problems; References
Chapter 2. The Business, Careers, and Challenges of Security and Loss PreventionObjectives; Introduction; Metrics; The Security Industry; Careers: Loss Prevention Services and Specialists; The Limitations of the Criminal Justice System: Implications for Loss Prevention Practitioners; Challenges of the Security Industry; Case Problems; References; PART II: Reducing the Problem of Loss; Chapter 3. Foundations of Security and Loss Prevention; Objectives; The Security and Loss Prevention Profession; Methods for Protection Programs; Standards and Regulations; Evaluation of Loss Prevention Programs Proprietary SecurityCase Problems; References; Chapter 4. Law; Objectives; Introduction; Judicial Systems; Origins of Law; Tort Law and Controls Over Private Security; Legal Theory of Premises Security Claims; Contract Law; Civil Justice Procedures; Administrative Law; Criminal Justice Procedures; Case Problems; The Decision for "You Be the Judge"; References; Chapter 5. Internal and External Relations; Objectives; Internal and External Relations; Internal Relations; External Relations; Special Problems; Case Problems; References; Chapter 6. Applicant Screening and Employee Socialization ObjectivesIntroduction; Employment Law; Screening Methods; Employee Socialization; Case Problems; The Decision for "You Be the Judge"; References; Chapter 7. Internal Threats and Countermeasures; Objectives; Introduction; Internal Theft; Management Countermeasures; Physical Security Countermeasures; Case Problems; References; Chapter 8. External Threats and Countermeasures; Objectives; Introduction; Methods of Unauthorized Entry; Countermeasures; Case Problems; References; Chapter 9. Services and Systems: Methods Toward Wise Purchasing Decisions; Objectives; Introduction Pitfalls when Purchasing Security Services and SystemsPurchasing Security Services; Purchasing Security Systems; Outsourcing; Case Problem; The Decision for "You Be the Judge"; References; Chapter 10. Investigations; Objectives; Introduction; Types of Investigations; Law; Evidence; Interviewing and Interrogation; Information Sources; Identity Theft; Investigative Leads; Surveillance; Information Accuracy; Report Writing; Testimony; Case Problems; References; Chapter 11. Accounting, Accountability, and Auditing; Objectives; Introduction; Accounting; Accountability; Auditing; Fraud Governance, Risk Management, and Compliance |
| Record Nr. | UNINA-9910703128403321 |
Purpura Philip
|
||
| Burlington, : Elsevier Science, 2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||