Integrated security systems design : a complete reference for building enterprise-wide digital security systems
β Scribed by Thomas L Norman
- Publisher
- Elsevier Butterworth-Hein, Butterworth-Heinemann
- Year
- 2015
- Tongue
- English
- Leaves
- 372
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Integrated Security Systems Design,2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security programβs overall effectiveness while avoiding pitfalls and potential lawsuits.
- Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
- Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
- Demonstrates how to maximize safety while reducing liability and operating costs.
β¦ Table of Contents
Content:
Front Matter, Pages i-ii
Copyright, Page iv
About the Author, Page v
Dedication, Page xv
Preface, Page xvii
1 - Introduction and Organization of the Book, Pages 3-10
2 - Integrated Security System Design Benefits and Philosophy, Pages 11-17
3 - History of Electronic Security, Pages 19-30
4 - Security System Design Elements, Pages 33-47
5 - Electronics Elements (High-Level Discussion), Pages 49-55
6 - Electronics Elements (Detailed Discussion), Pages 57-113
7 - Physical Security Elements, Pages 115-146
8 - The Security Design Process, Pages 147-156
9 - Preliminary Design Process Steps, Pages 157-176
10 - Getting Down to the Actual Design, Pages 177-200
11 - Information Technology Systems Infrastructure, Pages 203-249
12 - Radio Frequency Systems, Pages 251-266
13 - Interfacing to Legacy Systems and Emerging Technologies, Pages 267-279
14 - Interfacing to Related Systems, Pages 281-292
15 - Delaying Technologies and Response Technologies, Pages 293-310
16 - Alarm Detection and Emerging Video Technologies, Pages 311-325
17 - Design Standards Development, Pages 327-334
18 - Finalizing the Installation, Pages 335-355
19 - System Implementation, Pages 357-365
Index, Pages 367-381
π SIMILAR VOLUMES
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies uponβor should be employingβin order to make r
<span>Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies uponβor should be employingβin order to
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this b
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this b
Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. Designing Secure Systems takes a theory-based approach to concepts underlying