𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Integrated security systems design : a complete reference for building enterprise-wide digital security systems

✍ Scribed by Thomas L Norman


Publisher
Elsevier Butterworth-Hein, Butterworth-Heinemann
Year
2015
Tongue
English
Leaves
372
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Integrated Security Systems Design,2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.



  • Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
  • Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
  • Demonstrates how to maximize safety while reducing liability and operating costs.

✦ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
About the Author, Page v
Dedication, Page xv
Preface, Page xvii
1 - Introduction and Organization of the Book, Pages 3-10
2 - Integrated Security System Design Benefits and Philosophy, Pages 11-17
3 - History of Electronic Security, Pages 19-30
4 - Security System Design Elements, Pages 33-47
5 - Electronics Elements (High-Level Discussion), Pages 49-55
6 - Electronics Elements (Detailed Discussion), Pages 57-113
7 - Physical Security Elements, Pages 115-146
8 - The Security Design Process, Pages 147-156
9 - Preliminary Design Process Steps, Pages 157-176
10 - Getting Down to the Actual Design, Pages 177-200
11 - Information Technology Systems Infrastructure, Pages 203-249
12 - Radio Frequency Systems, Pages 251-266
13 - Interfacing to Legacy Systems and Emerging Technologies, Pages 267-279
14 - Interfacing to Related Systems, Pages 281-292
15 - Delaying Technologies and Response Technologies, Pages 293-310
16 - Alarm Detection and Emerging Video Technologies, Pages 311-325
17 - Design Standards Development, Pages 327-334
18 - Finalizing the Installation, Pages 335-355
19 - System Implementation, Pages 357-365
Index, Pages 367-381


πŸ“œ SIMILAR VOLUMES


Enterprise-Grade IT Security for Small a
✍ Denny Cherry πŸ“‚ Library πŸ“… 2022 πŸ› Apress 🌐 English

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r

Enterprise-Grade IT Security for Small a
✍ Denny Cherry πŸ“‚ Library πŸ“… 2022 πŸ› Apress 🌐 English

<span>Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to

Building Secure and Reliable Systems: Be
✍ Heather Adkins; Betsy Beyer; Paul Blankinship; Piotr Lewandowski; Ana Oprea; Ada πŸ“‚ Library πŸ“… 2020 πŸ› O'Reilly Media, Inc. 🌐 English

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this b

Building Secure and Reliable Systems: Be
✍ Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Ada πŸ“‚ Library πŸ“… 2020 πŸ› O'Reilly Media 🌐 English

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this b

Designing Secure Systems
✍ Michael Melone πŸ“‚ Library πŸ“… 2021 πŸ› CRC Press 🌐 English

Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. Designing Secure Systems takes a theory-based approach to concepts underlying