Book description
Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library.
* Provides a well-written and concise overview of electronic security systems and their functions
* Takes a holistic approach by focusing on the integration of different aspects of electronic security systems
* Includes a collection of practical experiences, solutions, and an approach to solving technical problems
Table of contents
- Front Cover
- Electronic Security Systems: A Manager’s Guide to Evaluating and Selecting System Solutions
- Copyright Page
- Table of Contents
- Preface
- Acknowledgments
- Chapter 1. Electronic Access Control (1/4)
- Chapter 1. Electronic Access Control (2/4)
- Chapter 1. Electronic Access Control (3/4)
- Chapter 1. Electronic Access Control (4/4)
- Chapter 2. Badge Making (1/4)
- Chapter 2. Badge Making (2/4)
- Chapter 2. Badge Making (3/4)
- Chapter 2. Badge Making (4/4)
- Chapter 3. Biometrics (1/4)
- Chapter 3. Biometrics (2/4)
- Chapter 3. Biometrics (3/4)
- Chapter 3. Biometrics (4/4)
- Chapter 4. Electronic Alarm Systems (1/4)
- Chapter 4. Electronic Alarm Systems (2/4)
- Chapter 4. Electronic Alarm Systems (3/4)
- Chapter 4. Electronic Alarm Systems (4/4)
- Chapter 5. Fire Systems (1/5)
- Chapter 5. Fire Systems (2/5)
- Chapter 5. Fire Systems (3/5)
- Chapter 5. Fire Systems (4/5)
- Chapter 5. Fire Systems (5/5)
- Chapter 6. Exterior and Interior Security Sensors (1/4)
- Chapter 6. Exterior and Interior Security Sensors (2/4)
- Chapter 6. Exterior and Interior Security Sensors (3/4)
- Chapter 6. Exterior and Interior Security Sensors (4/4)
- Chapter 7. Closed Circuit Television (1/5)
- Chapter 7. Closed Circuit Television (2/5)
- Chapter 7. Closed Circuit Television (3/5)
- Chapter 7. Closed Circuit Television (4/5)
- Chapter 7. Closed Circuit Television (5/5)
- Chapter 8. Wireless (1/4)
- Chapter 8. Wireless (2/4)
- Chapter 8. Wireless (3/4)
- Chapter 8. Wireless (4/4)
- Chapter 9. Intercoms and Controls (1/3)
- Chapter 9. Intercoms and Controls (2/3)
- Chapter 9. Intercoms and Controls (3/3)
- Chapter 10. Security Control Center (1/4)
- Chapter 10. Security Control Center (2/4)
- Chapter 10. Security Control Center (3/4)
- Chapter 10. Security Control Center (4/4)
- Chapter 11. Database Management (1/3)
- Chapter 11. Database Management (2/3)
- Chapter 11. Database Management (3/3)
- Chapter 12. System Configuration Control (1/4)
- Chapter 12. System Configuration Control (2/4)
- Chapter 12. System Configuration Control (3/4)
- Chapter 12. System Configuration Control (4/4)
- Chapter 13. Process Automation (1/3)
- Chapter 13. Process Automation (2/3)
- Chapter 13. Process Automation (3/3)
- Chapter 14. Building Automation (1/3)
- Chapter 14. Building Automation (2/3)
- Chapter 14. Building Automation (3/3)
- Chapter 15. Integration (1/4)
- Chapter 15. Integration (2/4)
- Chapter 15. Integration (3/4)
- Chapter 15. Integration (4/4)
- Chapter 16. Consolidation (1/3)
- Chapter 16. Consolidation (2/3)
- Chapter 16. Consolidation (3/3)
- Chapter 17. Maintenance and Testing (1/3)
- Chapter 17. Maintenance and Testing (2/3)
- Chapter 17. Maintenance and Testing (3/3)
- Chapter 18. Security Design Process (1/3)
- Chapter 18. Security Design Process (2/3)
- Chapter 18. Security Design Process (3/3)
- Chapter 19. Special Compliance (1/3)
- Chapter 19. Special Compliance (2/3)
- Chapter 19. Special Compliance (3/3)
- Chapter 20. Trends (1/2)
- Chapter 20. Trends (2/2)
- Appendix A. Pros and Cons of a Consolidated Database (1/2)
- Appendix A. Pros and Cons of a Consolidated Database (2/2)
- Appendix B. Security Audit (1/2)
- Appendix B. Security Audit (2/2)
- Appendix C. Integration Tips (1/2)
- Appendix C. Integration Tips (2/2)
- Appendix D. Technical Security Job Grades (1/2)
- Appendix D. Technical Security Job Grades (2/2)
- Appendix E. Interviewing (1/2)
- Appendix E. Interviewing (2/2)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- About the Author
Product information
- Title: Electronic Security Systems
- Author(s):
- Release date: November 2006
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780080494708
You might also like
book
Integrated Security Systems Design, 2nd Edition
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of …
book
Security Electronics Circuits Manual
Security Electronics Circuits Manual is an invaluable guide for engineers and technicians in the security industry. …
book
Hardware Security
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security …
book
Integrated Security Systems Design
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers …