Integrated security systems design : concepts, specifications, and implementation /

Norman, Thomas L.

Integrated security systems design : concepts, specifications, and implementation / Thomas Norman. - Amsterdam ; Boston : Elsevier Butterworth-Heinemann, ©2007. - 1 online resource (xii, 458 pages) : illustrations

Includes bibliographical references and index.

SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS -- 1 Introduction and Organization of the Book -- 2 Integrated Security System Design Benefits and Philosophy -- 3 History of Electronic Security -- SECTION TWO SECURITY SYSTEM DESIGN -- 4 Security System Design Elements -- 5 Electronics Elements (High Level Discussion) -- 6 Electronics Elements (Detailed Discussion) -- 7 Physical Security Elements -- 8 The Security Design Process -- 9 Preliminary Steps in the Design Process -- 10 Getting Down to the Actual Design -- SECTION THREE -- SPECIAL DESIGN SECTIONS -- 11 Information Technology Systems Infrastructure -- 12 Radio Frequency Systems -- 13 Interfacing to Legacy Systems and Emerging Technologies -- 14 Interfacing to Related Systems -- 15 Delaying Technologies and Response Technologies -- 16 Alarm Detection and Emerging Video Technologies -- 17 Design Standards Development -- 18 System Finalization and Commissioning Steps -- 19 System Implementation.

Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs.


English.

9780750679091 0750679093 9780080471440 (electronic bk.) 0080471447 (electronic bk.) 1280962356 9781280962356 9786610962358 6610962359

111510:111594 Elsevier Science & Technology http://www.sciencedirect.com

GBA708374 bnb

013655854 Uk


Computer networks--Security measures.
Information storage and retrieval systems--Security measures.
Computers--Access control.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer networks--Security measures.
Computers--Access control.
Information storage and retrieval systems--Security measures.


Electronic books.

TK5105.59 / .N45 2007eb

005.8

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library