1 Overview2 Physical Security Threats3 Physical Security Prevention and Mitigation Measures4 Recovery from Physical Security Breaches5 Threat Assessment, Planning, and Plan Implementation6 Example: A Corporate Physical Security Policy7 Integration of Physical and Logical Security8 Physical Security Checklist9 SummaryChapter Review Questions/ExercisesExercise