Buch, Englisch, 340 Seiten, Format (B × H): 156 mm x 234 mm
An Insider's Guide to Securing a Business
Buch, Englisch, 340 Seiten, Format (B × H): 156 mm x 234 mm
ISBN: 978-1-03-279077-0
Verlag: Taylor & Francis Ltd
The techniques outlined detail how to conduct a physical security assessment and identify ways to mitigate those identified threats. This includes recommendations for new security systems or, alternatively, system additions to improve security conditions. Chapters describe methods used in evaluating the survey data, proposing the recommended systems to company management, preparing a system bid, and managing the bid process. Coverage concludes with a description of project implementation and how to follow up afterwards to verify the proper application and use of the security systems and solutions. The book organizes the process and provides an overall structure for best practices in specifying system components and managing the acquisition and implementation process. It represents the culmination of the author’s 44 years of experience in the design, installation, and project management of security system solutions.
Physical Security Assessment Handbook, Second Edition is a valuable resource for security and managers, security consultants, and even experienced industry professionals will find this book helpful in organizing approaches to security assessment projects.
Zielgruppe
Professional Practice & Development and Professional Reference
Autoren/Hrsg.
Fachgebiete
- Rechtswissenschaften Strafrecht Rechtsmedizin, Forensik
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Sozialwissenschaften Politikwissenschaft Politische Gewalt Terrorismus, Religiöser Fundamentalismus
- Sozialwissenschaften Sport | Tourismus | Freizeit Heimwerken
Weitere Infos & Material
Introduction 1. The Process from 10,000 Feet 2. The Physical Threat Assessment 3. The Vulnerability Assessment 4. Analyzing the Data and System Design 5. Design, The Rest of the Story 6. Documenting the System Design 7. Presenting the Solutions 8. How to Buy Your New Security System 9. Prepare the Technical Specifications 10. Going Out for Bid 11. System Implementation