Integrated Security Systems Design, 2nd Edition

Book description

Integrated Security Systems Design,2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.

  • Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
  • Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
  • Demonstrates how to maximize safety while reducing liability and operating costs.

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Author
  6. Dedication
  7. Preface
  8. Section I: Introduction to Integrated Security Systems
    1. 1. Introduction and Organization of the Book
      1. Abstract
      2. Who Should Read This Book
      3. A Brief Background
      4. A Framework for Understanding the Design Process
      5. Goals of the Book
      6. Arrangement of the Book
      7. Questions and Answers
    2. 2. Integrated Security System Design Benefits and Philosophy
      1. Abstract
      2. Introduction
      3. Why Integrate Systems?
      4. Cost Benefits
      5. How Integration Is Achieved
      6. Summary
      7. Questions and Answers
    3. 3. History of Electronic Security
      1. Abstract
      2. Introduction
      3. The History of Integrated Security Systems
      4. The First Generation
      5. The Second Generation
      6. The Third Generation
      7. The Fourth Generation
      8. Fifth-Generation Technology
      9. Avoiding Obsolescence
      10. Summary
      11. Questions and Answers
  9. Section II: Security System Design
    1. 4. Security System Design Elements
      1. Abstract
      2. Introduction
      3. The Tools
      4. The Place of Electronics in the Overall Security Process
      5. Establish Electronic Security Program Objectives
      6. Types of Design Efforts
      7. Project Drivers
      8. Summary
      9. Questions and Answers
    2. 5. Electronics Elements (High-Level Discussion)
      1. Abstract
      2. Introduction
      3. Security Functions
      4. Access Control Elements
      5. Detection Elements
      6. Assessment and Verification Elements
      7. Reaction Elements
      8. Evidence Gathering
      9. Added Bonus
      10. Summary
      11. Questions and Answers
    3. 6. Electronics Elements (Detailed Discussion)
      1. Abstract
      2. Introduction
      3. Alarm/Access Control Systems
      4. Server (and Business Continuity Server)
      5. Workstations
      6. Advanced Elements
      7. CCTV and Digital Video Systems
      8. How Digital Video Differs from Analog
      9. Wireless Digital Video
      10. Security Communications
      11. Analog Versus Digital
      12. Command/Control and Communications Consoles
      13. Guard Console Functions
      14. Communications Systems
      15. Summary
      16. Questions and Answers
    4. 7. Physical Security Elements
      1. Abstract
      2. Introduction
      3. Basic Physical Security
      4. Basic Physical Security Skills: Knowledge of the Tools
      5. Door Types
      6. Electrified Locks
      7. Concerns About Special Knowledge
      8. Summary
      9. Questions and Answers
    5. 8. The Security Design Process
      1. Abstract
      2. Introduction
      3. Establishing Electronic Security Program Objectives
      4. Defining Countermeasures
      5. Establishing Security Policies Related to Electronic Systems
      6. Establishing the Budget
      7. Phases of the Design and Construction Project
      8. Summary
      9. Questions and Answers
    6. 9. Preliminary Design Process Steps
      1. Abstract
      2. Introduction
      3. Basis for Design
      4. Research
      5. Drawing and Specification Resources
      6. Coordinating Interfaces to Other Systems
      7. Layout Devices in Response to Electronic Security System Objectives and Budget
      8. Select Required Devices
      9. Analog Versus Digital Video and Audio Systems
      10. Questions and Answers
    7. 10. Getting Down to the Actual Design
      1. Abstract
      2. Introduction
      3. Macro-Level Design: The Pieces of the Big Picture
      4. Microlevel Design: The Threads That Knit Together the Pieces of the Big Picture
      5. Summary
      6. Questions and Answers
  10. Section III: Special Design Sections
    1. 11. Information Technology Systems Infrastructure
      1. Abstract
      2. Introduction
      3. Basics of TCP/IP and Signal Communications
      4. TCP/UDP/RTP
      5. UDP
      6. Networking Devices
      7. Network Infrastructure Devices
      8. Servers
      9. Network Architecture
      10. Network Configurations
      11. Creating Network Efficiencies
      12. Digital Video
      13. Digital Resolution
      14. Frame Rates
      15. Display Issues
      16. Managing Data Systems Throughput
      17. System Architecture
      18. Interfacing to Other Enterprise Information Technology Systems
      19. Mass Storage Calculations
      20. Summary
      21. Questions and Answers
    2. 12. Radio Frequency Systems
      1. Abstract
      2. Introduction
      3. Basic Radio Frequency Theory
      4. Frequencies and Transmission Schemes
      5. Components
      6. Transmission Physics
      7. Summary
      8. Questions and Answers
    3. 13. Interfacing to Legacy Systems and Emerging Technologies
      1. Abstract
      2. Introduction
      3. The Challenge of Legacy Systems
      4. Legacy Access Control Systems
      5. Legacy Video Systems
      6. Legacy Intercom Systems
      7. Direct Ring-Down Intercom Systems
      8. Switched Intercom Bus Systems
      9. Emerging Technologies
      10. Summary
      11. Questions and Answers
    4. 14. Interfacing to Related Systems
      1. Abstract
      2. Introduction
      3. Building System Interfaces and System Control
      4. More on Building System Interfaces
      5. Elevators and Escalators
      6. Building Automation Systems
      7. Irrigation
      8. Deluge Fire Sprinkler Control (Another Reaps Technology)
      9. PABX Interfaces
      10. Voice Over IP Systems
      11. Public Address Systems
      12. Parking Control Systems
      13. Fuel Management Systems
      14. PSIM systems
      15. Summary
      16. Questions and Answers
    5. 15. Delaying Technologies and Response Technologies
      1. Abstract
      2. Introduction
      3. Reactive Automated Protection Systems
      4. Deterrence Technologies
      5. Deployable Barriers
      6. Prejudiced Barriers and Aggressive Systems
      7. Integrating the Elements
      8. Summary
      9. Questions and Answers
    6. 16. Alarm Detection and Emerging Video Technologies
      1. Abstract
      2. Introduction
      3. Alarm Detection Technologies
      4. Emerging Video Technologies
      5. Summary
      6. Questions and Answers
    7. 17. Design Standards Development
      1. Abstract
      2. Introduction
      3. Environmental Issues
      4. Power Issues
      5. Wiring Practices
      6. Wire Dressing
      7. Mounting Devices
      8. Drawing Standards
      9. Summary
      10. Questions and Answers
    8. 18. Finalizing the Installation
      1. Abstract
      2. Introduction
      3. Finalization and Commissioning Checklist
      4. Special Implementations
      5. Custom System Reports Implementation
      6. Securing the Security System
      7. Archived Data Security
      8. Summary
      9. Questions and Answers
    9. 19. System Implementation
      1. Abstract
      2. Introduction
      3. System Maintenance and Management
      4. Management Approaches: Types of System Implementations
      5. Security Command Center Operational Implementations and Issues
      6. Closing Out the Project
      7. Dealing with Offenders Who Try to Circumvent the System
      8. Summary
      9. Questions and Answers
  11. Index

Product information

  • Title: Integrated Security Systems Design, 2nd Edition
  • Author(s): Thomas L. Norman
  • Release date: September 2014
  • Publisher(s): Butterworth-Heinemann
  • ISBN: 9780128001936