Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Design and Evaluation of Physical Protection Systems [ISBN: 9780750683524] for the semester, quarter, and short term or search our site for other textbooks by Garcia. Renting a textbook can save you up to 90% from the cost of buying.
Part One | |
Design and Evaluation of Physical Protection Systems | |
Introduction | |
Safety vs. Security Deterrence Process | |
Overview Physical Protection System | |
Design PPS Functions | |
Design Goals | |
Design Criteria | |
Analysis | |
Physical Protection System | |
Design and the Relationship to Risk Summary | |
Facility Characterization | |
Introduction | |
Physical Conditions | |
Facility Operations | |
Facility Policies and Procedures | |
Regulatory Requirements | |
Safety Considerations | |
Legal Issues | |
Corporate Goals and Objectives | |
Other Information | |
Summary | |
Security Principle | |
Threat Definition [extensively updated] | |
Introduction | |
Steps for Threat | |
Definition List | |
Threat Information | |
Collect Threat Information | |
Organize Threat Information | |
Example Threat Statements | |
Target Identification | |
Introduction | |
Undesirable Consequences | |
Consequence Analysis Targets | |
Techniques for Target | |
Identification Vital Area | |
Identification | |
Summary | |
Security Principle | |
Part Two | |
Physical Protection System Design | |
Introduction | |
Physical Protection System | |
Design PPS Functions | |
Relationship of PPS Functions | |
Characteristics of an Effective PPS | |
Design Criteria | |
Additional Design Elements | |
Summary | |
Security Principles | |
Exterior Intrusion Sensors | |
Introduction | |
Performance Characteristics | |
Sensor Classification | |
Sensor Technology | |
Perimeter Sensor Systems | |
Design Concepts and Goals | |
Effects of Physical and Environmental Conditions | |
Integration with Video | |
Assessment System | |
Integration with Barrier Delay System | |
Exterior Sensor Subsystem | |
Characteristics Procedures | |
Summary | |
Security Principles | |
Interior Intrusion Sensors | |
Introduction | |
Performance Characteristics | |
Sensor Classification | |
Sensor Technology | |
Effects of Environmental Conditions | |
Sensor Selection | |
Procedures System Integration | |
Summary | |
Security Principles | |
Alarm Assessment | |
Introduction | |
Assessment vs. Surveillance | |
Video Alarm Assessment | |
System Alarm Assessment by Response Force | |
Integration with Safety Systems | |
Legal issues | |
Procedures Acceptance Testing | |
Summary Security | |
Principles | |
Alarm Communication and Display | |
Introduction | |
Evolution of Alarm Reporting Systems | |
AC&D Attributes Alarm Communication Subsystem | |
Alarm Control and Display Offline Systems | |
AC&D System Design | |
Summary | |
Security Principles | |
Entry Control | |
Introduction | |
Personnel Entry Control | |
Personnel Entry Control | |
Bypass Contraband Detection Locks System | |
Integration and Installation Issues | |
Procedures Administrative Procedures | |
Summary | |
Security Principles | |
Access Delay | |
Introduction | |
Barrier Types and Principles System | |
Considerations Aspects of Penetration | |
Perimeter Barriers Structural | |
Barriers Dispensable | |
Barriers Procedures | |
Summary | |
Security Principles | |
Response [extensively updated] | |
Introduction | |
General Considerations | |
Contingency Planning Communication | |
Interruption Procedures | |
Summary | |
Security Principles | |
Part Three | |
Analysis and Evaluation | |
Introduction | |
Adversary Paths | |
Effectiveness Measures | |
Quantitative Analysis | |
Critical Path Qualitative Analysis | |
Summary | |
Security Principles | |
EASI Computer Model for Analysis | |
Introduction | |
Quantitative Analysis Tools | |
EASI Model | |
Using the Model Adversary | |
Sequence Diagrams | |
Summary | |
Security Principle | |
Risk Assessment | |
Introduction | |
Risk Management Approaches | |
Risk Equation Vulnerability Assessment Process | |
Risk Assessment | |
Performance Testing | |
Summary | |
Security Principle | |
Transportation System application [New] | |
Threat ta | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.