Book description
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in goverment and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money.Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how it’s done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book.
* Centralize monitoring of security, of business processes and of adherence to policy
* Learn the what-not-to-do's of security design from an experienced practitioner
* Maximize your organization's safety while reducing liability and operating costs
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- Preface
- Acknowledgments
- Table of Contents
- Section One: Introduction to Intregrated Security Systems
-
Section Two: Security System Design
- Chapter 4: Security System Design Elements
- Chapter 5: Electronics Elements (High-Level Discussion)
-
Chapter 6: Electronics Elements (Detailed Discussion)
- ALARM/ACCESS CONTROL SYSTEMS
- SERVER (AND BUSINESS CONTINUITY SERVER)
- WORKSTATIONS
- ADVANCED ELEMENTS
- CCTV SYSTEMS
- HOW DIGITAL VIDEO DIFFERS FROM ANALOG
- WIRELESS DIGITAL VIDEO
- SECURITY COMMUNICATIONS
- ANALOG VS. DIGITAL
- COMMAND/COMMUNICATIONS CONSOLES
- GUARD CONSOLE FUNCTIONS
- COMMUNICATIONS SYSTEMS
- SUMMARY
- CHAPTER NOTES
- Chapter 7: Physical Security Elements
- Chapter 8: The Security Design Process
- Chapter 9: Preliminary Design Process Steps
- Chapter 10: Getting Down to the Actual Design
-
Section Three: Special Design Sections
-
Chapter 11: Information Technology Systems Infrastructure
- INTRODUCTION
- BASICS OF TCP/IP AND SIGNAL COMMUNICATIONS
- NETWORKING DEVICES
- NETWORK INFRASTRUCTURE DEVICES
- SERVERS
- NETWORK ARCHITECTURE
- NETWORK CONFIGURATIONS
- CREATING NETWORK EFFICIENCIES
- DIGITAL VIDEO
- DIGITAL RESOLUTION
- FRAME RATES
- DISPLAY ISSUES
- MANAGING DATA SYSTEMS THROUGHPUT
- SYSTEM ARCHITECTURE
- INTERFACING TO OTHER ENTERPRISE INFORMATION TECHNOLOGY SYSTEMS
- SUMMARY
- CHAPTER NOTES
- Chapter 12: Radio Frequency Systems
- Chapter 13: Interfacing to Legacy Systems and Emerging Technologies
- Chapter 14: Interfacing to Related Systems
- Chapter 15: Delaying Technologies and Response Technologies
- Chapter 16: Alarm Detection and Emerging Video Technologies
- Chapter 17: Design Standards Development
- Chapter 18: Finalizing the Installation
- Chapter 19: System Implementation
-
Chapter 11: Information Technology Systems Infrastructure
- Index
Product information
- Title: Integrated Security Systems Design
- Author(s):
- Release date: January 2007
- Publisher(s): Elsevier Science
- ISBN: 9780080471440
You might also like
book
Integrated Security Systems Design, 2nd Edition
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of …
book
Asset Protection through Security Awareness
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection …
book
Bluetooth™: Connect Without Cables
The first complete guide to the new Bluetooth 1.1 wireless specification! The Bluetooth specification has been …
book
Hacking Exposed Wireless, Second Edition, 2nd Edition
The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security …