Norman | Integrated Security Systems Design | E-Book | sack.de
E-Book

E-Book, Englisch, 400 Seiten

Norman Integrated Security Systems Design

A Complete Reference for Building Enterprise-Wide Digital Security Systems
2. Auflage 2014
ISBN: 978-0-12-800193-6
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

A Complete Reference for Building Enterprise-Wide Digital Security Systems

E-Book, Englisch, 400 Seiten

ISBN: 978-0-12-800193-6
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits. - Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design. - Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies. - Demonstrates how to maximize safety while reducing liability and operating costs.

Thomas L. Norman, CPP, PSP, CSC, is an internationally acclaimed security risk management and enterprise-class security system design consultant with experience in the United States, the Middle East, Europe, Africa, and Asia. Mr. Norman has experience in security designs for critical infrastructure including oil and gas terminals, lines, and distribution centers; mass transit and vehicle transportation systems including air security, rail, and marine facilities and systems; long-span suspension and truss bridges; and central banking, utility and financial facilities. Mr. Norman's extended experience includes a large number of chemical, petrochemical, banking, government, corporate facilities, hospitality, healthcare, venues, and museums. Mr. Norman's unique processes focus on identifying and securing the underlying causes of building system vulnerabilities, that is, business processes, technologies, and cultures that encourage the development of vulnerabilities to the detriment of the organization. As the author of the industry reference manual on integrated security system design, and with more than 35 years of experience in design, construction management and commissioning, Mr. Norman is considered one of the industry's leading design consultants, worldwide, having contributed many industry design firsts including Video Pursuit and REAPs design concepts, among others. Mr. Norman has developed formulas and detailed processes that are used by the entire security industry to calculate the effectiveness of security programs and security program elements and also overall security program cost-effectiveness. Mr. Norman has authored four books: for the American Institute of Architects, 'Security Planning and Design - A Guide for Architects and Building Owners'; 'Integrated Security Systems Design' (Elsevier); 'Risk Analysis and Security Countermeasures Selection' (CRC Press); and 'Electronic Access Control' (Elsevier). His works have been quoted and referenced by organizations such as the Cato Institute, NBC, and Security Management.

Norman Integrated Security Systems Design jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Integrated Security Systems Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems;4
3;Copyright;5
4;About the Author;6
5;Table of Contents;8
6;Dedication;16
7;Preface;18
8;Section I: Introduction to Integrated Security Systems;20
8.1;Chapter 1: Introduction and Organization of the Book;22
8.1.1;Who Should Read This Book;23
8.1.2;A Brief Background;23
8.1.3;A Framework for Understanding the Design Process;24
8.1.4;Goals of the Book;24
8.1.5;Arrangement of the Book;26
8.1.6;Questions and Answers;27
8.2;Chapter 2: Integrated Security System Design Benefits and Philosophy;30
8.2.1;Introduction;30
8.2.2;Why Integrate Systems?;30
8.2.2.1;Why a Strategic Approach to Security Design is Necessary;30
8.2.2.2;Uniform Application of Security Policies;31
8.2.2.3;Force Multipliers;31
8.2.2.4;Multiple Systems;31
8.2.2.5;Multiple Buildings;32
8.2.2.6;Multiple Sites;32
8.2.2.7;Multiple Business Units;32
8.2.2.8;Improved System Performance;32
8.2.2.9;Improved Monitoring;32
8.2.2.10;Reduced Training;33
8.2.2.11;Better Communications;33
8.2.3;Cost Benefits;33
8.2.3.1;Improved Labor Efficiency;33
8.2.3.2;Reduced Maintenance Costs;33
8.2.3.3;Improved System Longevity;34
8.2.4;How Integration Is Achieved;34
8.2.5;Summary;34
8.2.6;Questions and Answers;35
8.3;Chapter 3: History of Electronic Security;38
8.3.1;Introduction;38
8.3.2;The History of Integrated Security Systems;38
8.3.3;The First Generation;38
8.3.4;The Second Generation;40
8.3.5;The Third Generation;41
8.3.6;The Fourth Generation;42
8.3.6.1;Stalled Progress;44
8.3.7;Fifth-Generation Technology;45
8.3.8;Avoiding Obsolescence;47
8.3.8.1;Planned Obsolescence;47
8.3.8.2;Unplanned Obsolescence;47
8.3.9;Summary;48
8.3.10;Questions and Answers;48
9;Section II: Security System Design;50
9.1;Chapter 4: Security System Design Elements;52
9.1.1;Introduction;52
9.1.2;The Tools;52
9.1.2.1;Drawings;52
9.1.2.2;Specifications;53
9.1.2.3;Product Selection;54
9.1.2.4;Interdiscipline Coordination;54
9.1.2.5;Project Management;55
9.1.2.6;Tips on Schedule Management;56
9.1.2.7;Client Management;57
9.1.2.7.1;Tips on Relationship Management;57
9.1.3;The Place of Electronics in the Overall Security Process;58
9.1.3.1;The Security Program;58
9.1.4;Establish Electronic Security Program Objectives;58
9.1.4.1;Security Policy: The Foundation of All Countermeasures;58
9.1.5;Types of Design Efforts;61
9.1.5.1;New Construction;61
9.1.5.2;Renovation or Retrofit;61
9.1.5.3;Government-Driven Projects;61
9.1.5.4;Commercial Projects;62
9.1.5.5;Facilities-Driven Projects;62
9.1.5.6;User-Driven Projects;62
9.1.6;Project Drivers;63
9.1.6.1;Construction Effort;63
9.1.6.2;Regulation Compliance;63
9.1.6.3;Event Driven;63
9.1.6.4;Insurance Driven;63
9.1.6.5;Hidden Agendas;63
9.1.7;Summary;64
9.1.8;Questions and Answers;64
9.2;Chapter 5: Electronics Elements (High-Level Discussion);68
9.2.1;Introduction;68
9.2.2;Security Functions;68
9.2.3;Access Control Elements;68
9.2.4;Detection Elements;69
9.2.4.1;Alarm Sensors;69
9.2.4.2;Alarm Processors;70
9.2.4.3;Alarm Transmission;70
9.2.4.4;Alarm Reporting;70
9.2.4.5;Follow-on Action Response;70
9.2.5;Assessment and Verification Elements;71
9.2.6;Reaction Elements;71
9.2.7;Evidence Gathering;72
9.2.8;Added Bonus;72
9.2.9;Summary;72
9.2.10;Questions and Answers;73
9.3;Chapter 6: Electronics Elements (Detailed Discussion);76
9.3.1;Introduction;76
9.3.2;Alarm/Access Control Systems;76
9.3.2.1;Identification Devices;76
9.3.2.1.1;Magnetic Stripe Cards;79
9.3.2.1.1.1;Wiegand Cards/Keys;80
9.3.2.1.1.2;Barcode Cards;80
9.3.2.1.1.3;Barium Ferrite Cards;80
9.3.2.1.1.4;Hollerith;81
9.3.2.1.1.5;Rare-Earth Magnets;81
9.3.2.2;Photo Identification Elements;81
9.3.2.3;Multi-technology Cards;82
9.3.2.3.1;Card Readers;82
9.3.2.3.2;TWIC Cards;85
9.3.2.3.3;Other Field Devices;87
9.3.2.3.3.1;Electrified Strikes;87
9.3.2.3.3.2;Electrified Mortise Locks;87
9.3.2.3.3.3;Magnetic Locks;87
9.3.2.3.3.4;Electrified Panic Hardware;88
9.3.2.3.3.5;Specialty Locks;88
9.3.2.3.3.6;Switches;88
9.3.2.3.3.7;Duress Switches;90
9.3.2.3.3.8;Request-to-Exit (REX) Sensors;90
9.3.2.4;Door and Gate Operators;90
9.3.2.4.1;Revolving Doors and Electronic Turnstiles;91
9.3.2.5;Electronic Processing Components;92
9.3.3;Server (and Business Continuity Server);94
9.3.4;Workstations;94
9.3.4.1;Data Infrastructure Basics;95
9.3.4.2;Interfaces to Other Building Systems;95
9.3.5;Advanced Elements;96
9.3.5.1;Legacy Systems Integration;96
9.3.5.2;Data versus Hardware Interfaces;97
9.3.6;CCTV and Digital Video Systems;98
9.3.6.1;Evolution of Analog Video Systems;98
9.3.6.1.1;The Bookends of Time;98
9.3.6.1.2;How Analog Video Works;98
9.3.6.1.3;The Branch;98
9.3.6.1.4;Videotape;99
9.3.7;How Digital Video Differs from Analog;100
9.3.7.1;Capturing and Displaying Analog Video;100
9.3.7.2;Capturing and Displaying Digital Video;100
9.3.7.3;Archiving Analog and Digital Video;101
9.3.7.4;Digital Transmission Systems;102
9.3.7.4.1;Digital Basics;102
9.3.8;Wireless Digital Video;106
9.3.8.1;Wireless Approaches and Frequencies;106
9.3.8.2;Analog;107
9.3.8.3;Digital;108
9.3.8.3.1;TCP/UDP;109
9.3.8.3.1.1;Frequencies;109
9.3.8.3.1.2;Latency Problems;109
9.3.8.3.2;Satellite;109
9.3.8.3.2.1;Satellite Dish;110
9.3.8.3.2.2;Satellite Phone;110
9.3.8.3.2.3;Latency Problems;110
9.3.8.3.3;Wireless Architectures;110
9.3.8.3.3.1;Point-to-Point;110
9.3.8.3.3.2;Point-to-Multipoint;111
9.3.8.3.3.3;Wireless Mesh;111
9.3.8.3.3.4;Full-Duplex Wireless Mesh;111
9.3.8.4;Video Analytics;112
9.3.8.5;Lenses and Lighting;113
9.3.8.5.1;Lighting Level;114
9.3.8.5.2;Lighting Contrast;114
9.3.8.5.3;Lighting Color Temperature;115
9.3.8.5.4;Other Lighting Issues;115
9.3.9;Security Communications;115
9.3.9.1;Two-Way Radios;115
9.3.9.2;Cell Phones;116
9.3.9.3;Intercoms;116
9.3.9.4;Emergency Phones;117
9.3.9.5;Paging Systems;117
9.3.10;Analog Versus Digital;117
9.3.10.1;Analog;117
9.3.10.2;Digital;117
9.3.10.3;Wireless Digital;118
9.3.10.4;Communication System Integration;118
9.3.11;Command/Control and Communications Consoles;119
9.3.11.1;Monitoring Consoles;119
9.3.11.1.1;Small Systems;119
9.3.11.1.2;Medium-Sized Systems;119
9.3.11.1.3;Enterprise-Class Systems;120
9.3.11.2;Workstation and Console Specifics;120
9.3.11.2.1;Command, Control, and Communications Consoles;120
9.3.11.2.2;C3 Console Use in Public Agency Settings;122
9.3.11.2.3;Lobby Desk Consoles;123
9.3.11.2.4;Dispatch Consoles;123
9.3.11.2.5;Administrative Workstations;123
9.3.11.2.6;Identification Badging Consoles;123
9.3.11.2.7;Identity Verification Workstations;124
9.3.12;Guard Console Functions;124
9.3.12.1;Vetting Alarms;125
9.3.12.2;Granting Access Remotely;125
9.3.12.2.1;Finished Visitor Lobby;125
9.3.12.2.2;Delivery Lobby;126
9.3.12.3;Video Surveillance;126
9.3.12.4;Video Guard Tours;127
9.3.12.5;Video Pursuit;127
9.3.13;Communications Systems;127
9.3.13.1;Security System Intercoms;127
9.3.13.2;Elevator and Parking System Intercoms;128
9.3.13.3;Emergency Call Stations;128
9.3.13.4;Direct Ring-Down Intercoms;128
9.3.13.5;Two-Way Radio;129
9.3.13.6;Pagers;129
9.3.13.7;Wireless Headsets;129
9.3.14;Summary;129
9.3.15;Questions and Answers;131
9.4;Chapter 7: Physical Security Elements;134
9.4.1;Introduction;134
9.4.2;Basic Physical Security;134
9.4.3;Basic Physical Security Skills: Knowledge of the Tools;135
9.4.4;Door Types;135
9.4.4.1;Hollow Metal Doors;136
9.4.4.2;Solid Core;136
9.4.4.3;Glass Storefront Doors;137
9.4.4.4;Herculite™ Doors;137
9.4.4.5;Specialty Doors;138
9.4.4.5.1;Revolving Doors;138
9.4.4.5.2;Total Doors™;140
9.4.4.5.3;Balanced Doors;141
9.4.4.5.4;Historical Doors;141
9.4.4.5.5;Security Doors;141
9.4.4.5.5.1;Blast Doors;142
9.4.4.5.5.2;Soundproof Doors;142
9.4.4.6;Door Hardware;142
9.4.4.6.1;Hinges and Pivots;142
9.4.4.6.2;Handles, Levers, Push Bars, and Paddles;143
9.4.4.6.3;Door Closers;143
9.4.4.6.4;Door Coordinators;143
9.4.4.6.5;Automatic Door Operators;143
9.4.4.6.6;Door Ventilators;144
9.4.4.7;Door Frames;144
9.4.4.7.1;Hollow Metal;144
9.4.4.7.2;Formed Aluminum Frame;144
9.4.4.7.3;Extruded Aluminum Frame;145
9.4.4.7.4;Wood Frame;145
9.4.4.7.5;Frameless Glass Opening;145
9.4.4.7.6;High-Security Frames;145
9.4.4.7.7;Blast Frames;145
9.4.4.7.8;Soundproof Frames;145
9.4.4.8;Pedestrian Gates;145
9.4.4.8.1;Chain-Link Gate;146
9.4.4.8.2;Estate-Type Gate;146
9.4.4.8.3;Reinforced Frame Gate;146
9.4.4.9;Occupancy Ratings;146
9.4.5;Electrified Locks;147
9.4.5.1;Common Electrified Locks;147
9.4.5.1.1;Electrified Mortise Locks;147
9.4.5.1.2;Magnetic Locks;147
9.4.5.1.3;Electrified Cylinder Locks;149
9.4.5.1.3.1;Rex Infrared Sensor;149
9.4.5.1.3.2;Push-to-Exit Button;149
9.4.5.1.3.3;Panic bar;150
9.4.5.1.3.4;Delayed Egress Hardware;150
9.4.5.1.4;Fire Authority Approval;151
9.4.5.1.5;Fire Alarm Interface;152
9.4.5.1.6;Man-Trap Door Assemblies;152
9.4.5.1.7;Electrified Strikes;154
9.4.5.1.8;Electrified Panic Hardware;154
9.4.5.1.8.1;Electrified Rim Lock;154
9.4.5.1.8.2;Electrified Mortise Lock;154
9.4.5.1.8.3;Solenoid-Released Vertical Rods;155
9.4.5.1.8.4;Magnetic Lock;155
9.4.5.2;Specialty Door Hardware;156
9.4.5.2.1;Monitor Strikes;156
9.4.5.2.2;Blumcraft Hardware;158
9.4.5.2.3;Hi-Tower Locks;159
9.4.5.2.4;High-Security Locks;159
9.4.5.2.5;High-Abuse Tolerant Locks;159
9.4.5.2.6;Electrified Dead Bolts;159
9.4.5.2.7;Multi-Point Locks;160
9.4.5.3;Locks to Avoid;161
9.4.5.3.1;Electrified Cylinder Locks;161
9.4.5.3.2;Lightweight Strikes;161
9.4.6;Concerns About Special Knowledge;162
9.4.7;Summary;162
9.4.8;Questions and Answers;163
9.5;Chapter 8: The Security Design Process;166
9.5.1;Introduction;166
9.5.2;Establishing Electronic Security Program Objectives;166
9.5.3;Defining Countermeasures;166
9.5.4;Establishing Security Policies Related to Electronic Systems;167
9.5.5;Establishing the Budget;167
9.5.5.1;Countermeasures Determination;167
9.5.5.2;Prioritization;168
9.5.5.2.1;Countermeasure Effectiveness;168
9.5.5.3;Phasing;169
9.5.6;Phases of the Design and Construction Project;169
9.5.6.1;The Predesign Phase;170
9.5.6.2;Schematic Phase;170
9.5.6.3;Design Development Phase;170
9.5.6.4;Contract Documents Phase;170
9.5.6.5;Bidding/Negotiation Phase;171
9.5.6.5.1;Reply to Request for Information Form;172
9.5.6.5.2;Reference Checking Form;172
9.5.6.5.3;Bid Analysis Form;172
9.5.6.5.4;A Note on Bid Analysis;173
9.5.6.6;Construction Review Phase;173
9.5.7;Summary;174
9.5.8;Questions and Answers;174
9.6;Chapter 9: Preliminary Design Process Steps;176
9.6.1;Introduction;176
9.6.2;Basis for Design;176
9.6.3;Research;176
9.6.4;Drawing and Specification Resources;177
9.6.4.1;Surveys;177
9.6.4.1.1;Camera Placements and Fields of View;177
9.6.4.1.2;Access Control and Alarm Placements;177
9.6.4.1.2.1;Vehicular Access Control;177
9.6.4.1.2.2;Public Access to the Buildings;178
9.6.4.1.2.3;Access Beyond the Public Lobby;178
9.6.4.1.2.4;Access Within Semipublic Spaces;178
9.6.4.1.2.5;Access to High-Security Areas;179
9.6.4.1.2.6;Emergency Egress;179
9.6.4.1.2.7;Positive Access Control;179
9.6.4.1.2.8;Lighting;180
9.6.4.2;Environment;180
9.6.4.2.1;Physical Environment;180
9.6.4.2.2;Operational Environment;180
9.6.4.2.3;Security Environment;180
9.6.4.2.4;Door Survey;180
9.6.4.3;Codes and Regulations;181
9.6.4.3.1;Safety;181
9.6.4.3.2;Power Locations;181
9.6.4.3.3;Gathering Resources;181
9.6.5;Coordinating Interfaces to Other Systems;181
9.6.5.1;Building Shell and Core and Interiors Architects;182
9.6.5.2;Specifications Consultant;182
9.6.5.3;Door Hardware Consultant/Contractor;182
9.6.5.4;Electrical Consultant/Contractor;182
9.6.5.5;HVAC/Building Automation Consultant/Contractor;183
9.6.5.6;Landscape Architect/Contractor;183
9.6.5.7;Parking Consultant/Contractor;183
9.6.5.8;Elevator/Escalator Consultant/Contractors;183
9.6.5.8.1;Elevator Video Cameras;185
9.6.5.8.2;Elevator Alarms;186
9.6.5.8.3;Remote Elevator Control;187
9.6.5.9;Telecommunications Consultant/Contractor;187
9.6.5.10;Information Technology Consultant/Contractor/Information Technology Department Director/Manager;187
9.6.6;Layout Devices in Response to Electronic Security System Objectives and Budget;188
9.6.6.1;Access Control System Placements;188
9.6.6.2;Camera Placements;189
9.6.6.3;Intercom Field Station Placements;190
9.6.7;Select Required Devices;191
9.6.7.1;Define Functional Needs;191
9.6.7.2;Define Environmental Needs;191
9.6.7.3;Define Communications Means;191
9.6.8;Analog Versus Digital Video and Audio Systems;192
9.6.8.1;The Decision Tree;192
9.6.8.1.1;Scalability;192
9.6.8.1.2;Longevity;192
9.6.8.1.3;Cost;193
9.6.8.1.4;Functions;193
9.6.9;Questions and Answers;194
9.7;Chapter 10: Getting Down to the Actual Design;196
9.7.1;Introduction;196
9.7.2;Macro-Level Design: The Pieces of the Big Picture;196
9.7.2.1;The Big Picture and the Fabric;196
9.7.2.1.1;Plans;196
9.7.2.1.2;Risers;198
9.7.2.1.3;Radio Frequency Communications Paths;199
9.7.2.1.4;Single-Line Diagrams;199
9.7.2.1.5;Title Sheet;200
9.7.2.1.6;Title Block;200
9.7.2.2;Specifications Overview;200
9.7.2.3;Specification Sections;201
9.7.2.4;Specifications Section 1: Description of the Work;203
9.7.2.4.1;Introduction;203
9.7.2.4.2;Scope of Work;203
9.7.2.4.2.1;Systems;203
9.7.2.4.3;Submittals;204
9.7.2.4.3.1;Bid Submittal;204
9.7.2.4.4;Services;204
9.7.2.4.4.1;Interdiscipline Coordination;204
9.7.2.4.4.2;Project Engineering and Provisioning;205
9.7.2.4.4.3;Project Planning and Management;206
9.7.2.4.4.4;Time Management;206
9.7.2.4.4.5;Training;207
9.7.2.4.4.6;Testing;207
9.7.2.4.4.7;Warranty;208
9.7.2.4.5;Precedence;208
9.7.2.4.6;System Descriptions;208
9.7.2.4.6.1;Purpose;208
9.7.2.4.6.2;Environment;208
9.7.2.4.6.3;Functions;209
9.7.2.4.6.4;Attributes;209
9.7.2.5;Systems may Include the Following;209
9.7.2.5.1;Integrated Security System Overview;209
9.7.2.5.1.1;Monitoring and Control System;209
9.7.2.5.1.2;Alarm/Access Control System;209
9.7.2.5.1.3;Digital or Analog Video System;210
9.7.2.5.1.4;Security Intercom System;210
9.7.2.5.1.5;Interfaces Between Subsystems;210
9.7.2.5.1.6;Interfaces to Systems by Other Contractors;210
9.7.2.5.1.7;System Infrastructure;211
9.7.2.5.2;Submittals;211
9.7.2.5.2.1;Bid Submittal;211
9.7.2.5.2.2;Shop and Field Submittal;211
9.7.2.6;Specifications Section 2;211
9.7.2.6.1;System Infrastructure;212
9.7.2.6.2;Monitoring and Control System;212
9.7.2.6.3;Digital Video System;212
9.7.2.6.4;Voice Communications System;212
9.7.2.6.5;Alarm/Access Control System;212
9.7.2.7;Specifications Section 3;213
9.7.2.7.1;Wire and Cable Installation Practices;213
9.7.2.7.2;Commissioning: System Setup and Configurations;214
9.7.2.7.3;System Testing: Testing Overview;214
9.7.2.7.4;Acceptance Testing;214
9.7.2.7.5;Project Completion;214
9.7.3;Microlevel Design: The Threads That Knit Together the Pieces of the Big Picture;214
9.7.3.1;Schedules;214
9.7.3.2;Construction Drawings: Device Schedules by System;215
9.7.3.2.1;System Infrastructure;215
9.7.3.2.2;Control and Monitoring System;215
9.7.3.2.3;Alarm/Access Control System;215
9.7.3.2.4;Digital or Analog Video System;215
9.7.3.2.5;Security Intercom System;215
9.7.3.2.6;System Interfaces;216
9.7.3.2.7;Power;216
9.7.3.2.8;Cable;216
9.7.3.2.9;Conduit and Fill;216
9.7.3.2.10;General Network Device Configuration Schedules;216
9.7.3.2.11;Shop and Field Drawings;216
9.7.3.2.12;Device Wiring Schedules;217
9.7.3.2.13;Configuration Schedules;217
9.7.3.2.14;Physical Details;217
9.7.3.2.15;System Interfacing Details;217
9.7.3.2.16;Revised Construction Budget;217
9.7.3.2.17;Complete Specification;217
9.7.3.2.18;Review Drawings, Specifications, and Prioritized Budgets;217
9.7.3.2.19;Revise after Review;218
9.7.4;Summary;218
9.7.5;Questions and Answers;218
10;Section III: Special Design Sections;220
10.1;Chapter 11: Information Technology Systems Infrastructure;222
10.1.1;Introduction;222
10.1.2;Basics of TCP/IP and Signal Communications;222
10.1.2.1;How TCP/IP Works;222
10.1.2.2;TCP/IP Operates on OSI Levels 3 (IP) and 4 (TCP);223
10.1.3;TCP/UDP/RTP;225
10.1.4;UDP;226
10.1.4.1;TCP/IP Address Schemes;226
10.1.5;Networking Devices;227
10.1.5.1;Edge Devices;227
10.1.5.2;Communications Media;227
10.1.6;Network Infrastructure Devices;231
10.1.6.1;Hubs;231
10.1.6.2;Switches;231
10.1.6.3;Routers;231
10.1.6.4;Firewalls;232
10.1.6.5;Intrusion Detection Systems;232
10.1.7;Servers;232
10.1.7.1;Directory Service Server;232
10.1.7.2;Archive Service;232
10.1.7.3;Program Service;233
10.1.7.4;FTP or HTTP Service;233
10.1.7.5;Email Service;233
10.1.7.6;Broadcast Service;233
10.1.7.7;Workstations;233
10.1.7.8;Printers;233
10.1.7.9;Mass Storage;233
10.1.8;Network Architecture;234
10.1.8.1;Simple Networks;234
10.1.8.2;Advanced Network Architecture;234
10.1.8.2.1;Backhaul Networks;234
10.1.8.2.2;Ring Architecture;235
10.1.8.2.3;Subnets;238
10.1.8.2.3.1;Subnets to Limit Network Traffic;238
10.1.8.2.3.2;Subnets to Segregate Network Traffic;238
10.1.8.2.3.3;Blending Security and Business networks: VLANS;239
10.1.9;Network Configurations;240
10.1.9.1;Peer-to-Peer;240
10.1.9.2;Client/Server Configuration;241
10.1.10;Creating Network Efficiencies;242
10.1.11;Digital Video;244
10.1.11.1;Cameras and Codecs;244
10.1.11.1.1;Advantages and Disadvantages;245
10.1.12;Digital Resolution;246
10.1.13;Frame Rates;246
10.1.14;Display Issues;248
10.1.14.1;Display Parity;248
10.1.14.2;Storage Issues;249
10.1.15;Managing Data Systems Throughput;249
10.1.16;System Architecture;250
10.1.16.1;Servers;250
10.1.16.2;Directory Service;250
10.1.16.3;Archiving Data;250
10.1.16.4;Remote Access Services;250
10.1.16.4.1;Web Access;250
10.1.16.4.2;Email and Pager Notification Service;250
10.1.16.5;Hardware Configurations;251
10.1.16.5.1;CPUs;251
10.1.16.5.2;Memory;251
10.1.16.6;Disk Storage;251
10.1.16.6.1;Operating Systems and Programs;251
10.1.16.6.2;Tape or Disk;251
10.1.16.6.3;Network Attached Storage;251
10.1.16.6.4;Storage Area Network;251
10.1.16.7;Workstations;252
10.1.16.7.1;Security Monitoring (Command) Workstations;252
10.1.16.7.2;Guard or Lobby Desk Workstations;252
10.1.16.7.3;Administrative Workstations;252
10.1.16.7.4;Photo ID Workstations;252
10.1.16.7.5;Access Verification Workstations;252
10.1.16.8;Edge Devices;253
10.1.16.9;Infrastructure Devices;253
10.1.16.10;Switches;253
10.1.16.11;Routers;254
10.1.16.12;Firewalls;254
10.1.16.13;Wireless Nodes;254
10.1.16.14;Network Communications Speeds;254
10.1.16.15;Cabling;254
10.1.16.15.1;Wired Cabling;254
10.1.16.15.2;Fiber Optic;254
10.1.16.15.3;Multi-Mode;255
10.1.16.15.4;Single Mode;255
10.1.16.16;Scaling Designs;255
10.1.17;Interfacing to Other Enterprise Information Technology Systems;255
10.1.17.1;Enterprise LAN or Wide Area Network;255
10.1.17.2;Process Control Networks;255
10.1.17.2.1;Building Automation Systems;256
10.1.17.2.2;Elevators/Lifts;256
10.1.17.2.3;Access Control Interfaces;256
10.1.17.2.4;Private Automatic Branch Exchange Interfaces;256
10.1.17.2.5;Voice over IP Systems;257
10.1.17.2.6;Fire Alarm Systems;258
10.1.17.2.7;Public Address Systems;258
10.1.17.2.8;Parking Control Systems;258
10.1.17.2.9;Vending Access Management Systems;259
10.1.17.3;More Protocol Factors;259
10.1.17.4;Multicast Anomalies;260
10.1.18;Mass Storage Calculations;261
10.1.18.1;Storage Frame Rate;262
10.1.18.2;Image Size;262
10.1.18.3;Resolution (Image Density);262
10.1.18.4;Compression Ratio;263
10.1.18.5;Image Compression Tricks ``I-Frames and ``P-Frames´´;263
10.1.18.6;Configuring Multiple Image Streams;264
10.1.18.7;The Camera Calculation;264
10.1.18.8;The Whole System Calculation;265
10.1.19;Summary;265
10.1.20;Questions and Answers;266
10.2;Chapter 12: Radio Frequency Systems;270
10.2.1;Introduction;270
10.2.2;Basic Radio Frequency Theory;270
10.2.3;Frequencies and Transmission Schemes;270
10.2.3.1;Frequencies;270
10.2.3.1.1;Analog AM and FM Frequencies;270
10.2.3.1.2;Digital Frequencies;270
10.2.3.1.3;Range;270
10.2.3.1.4;Other Frequencies;270
10.2.3.2;Transmission Schemes;270
10.2.3.2.1;Analog;270
10.2.3.2.2;Digital;271
10.2.3.2.2.1;Spread Spectrum Systems;271
10.2.3.2.2.2;Wireless Security;271
10.2.4;Components;271
10.2.4.1;Antennas;273
10.2.4.1.1;Patterns;273
10.2.4.1.1.1;Omni Antennas;273
10.2.4.1.1.2;Antenna Gain;273
10.2.4.1.1.3;Bandwidth;276
10.2.4.1.1.4;Impedance and Coupling;276
10.2.4.1.1.5;Interference;276
10.2.4.1.1.6;Multipath;276
10.2.4.2;How RF Systems Differ from Cabled Systems;277
10.2.4.2.1;Circuiting;277
10.2.4.2.2;Weather Factors;277
10.2.5;Transmission Physics;277
10.2.5.1;Transmitter Power;277
10.2.5.2;Antenna Loss/Gain;278
10.2.5.2.1;Antenna Patterns;278
10.2.5.3;Transmission Losses;279
10.2.5.3.1;Line of Sight;279
10.2.5.3.2;Fresnel Zone;279
10.2.5.4;Multipath;279
10.2.5.5;Delay Losses;280
10.2.5.6;Cancellation Losses;281
10.2.5.7;Cascade Losses;281
10.2.5.8;Power Stability and Reliability;281
10.2.5.9;Grounding and Powering;282
10.2.5.10;System Resets and Restores;283
10.2.5.11;Special Power Problems;283
10.2.6;Summary;284
10.2.7;Questions and Answers;284
10.3;Chapter 13: Interfacing to Legacy Systems and Emerging Technologies;286
10.3.1;Introduction;286
10.3.2;The Challenge of Legacy Systems;286
10.3.3;Legacy Access Control Systems;287
10.3.3.1;Access Card Legacies;287
10.3.3.2;Interfacing Multiple Access Control Systems from Differing Manufacturers into a Single Comprehensive System;287
10.3.3.2.1;The Old-Fashioned (but Still Very Reliable) Way;287
10.3.3.2.2;Newer (Still Reliable) Way;288
10.3.3.2.3;Interfacing Old Wiring Schemes;288
10.3.4;Legacy Video Systems;288
10.3.4.1;Digital Video Recorder-Based Systems;289
10.3.4.2;Proprietary Hardware-Based Server-Type Configurations;290
10.3.4.3;Software-Based Server-Type Configurations;290
10.3.4.4;Analog Switcher Interfacing;291
10.3.4.5;Multiplexer Interfacing;292
10.3.5;Legacy Intercom Systems;292
10.3.5.1;Two-Wire Intercom Systems;292
10.3.5.2;Four-Wire Intercom Systems;292
10.3.6;Direct Ring-Down Intercom Systems;292
10.3.7;Switched Intercom Bus Systems;293
10.3.7.1;Intercom Matrix Switches;294
10.3.8;Emerging Technologies;294
10.3.8.1;New Alarm/Access Control System Technologies;294
10.3.8.2;New Digital Video Technologies;294
10.3.8.2.1;Mega-Pixel Cameras;294
10.3.8.2.2;Light Field Camera;295
10.3.8.2.3;Digital Signal Processing Cameras;296
10.3.8.2.4;Extreme Low Light Color Video Cameras;296
10.3.9;Summary;296
10.3.10;Questions and Answers;297
10.4;Chapter 14: Interfacing to Related Systems;300
10.4.1;Introduction;300
10.4.2;Building System Interfaces and System Control;300
10.4.2.1;Information Inputs;300
10.4.2.2;Control Outputs;300
10.4.2.3;Imagination;301
10.4.3;More on Building System Interfaces;301
10.4.3.1;Fire Alarm Systems;301
10.4.3.2;Fire/Life Safety Interfaces;301
10.4.4;Elevators and Escalators;302
10.4.4.1;Access Control;302
10.4.4.1.1;Hall Call Control;302
10.4.4.1.2;Floor-by-Floor Control;302
10.4.4.1.3;Scheduled Operation;302
10.4.4.1.4;Remote Operation from the Console;302
10.4.4.2;Emergency Operation;303
10.4.4.2.1;Elevators;303
10.4.4.2.2;Escalators;303
10.4.5;Building Automation Systems;303
10.4.5.1;HVAC;303
10.4.5.2;Lighting;303
10.4.5.3;Signage;304
10.4.6;Irrigation;304
10.4.7;Deluge Fire Sprinkler Control (Another Reaps Technology);304
10.4.8;PABX Interfaces;305
10.4.9;Voice Over IP Systems;305
10.4.10;Public Address Systems;306
10.4.11;Parking Control Systems;306
10.4.12;Fuel Management Systems;306
10.4.13;PSIM systems;306
10.4.14;Summary;309
10.4.15;Questions and Answers;309
10.5;Chapter 15: Delaying Technologies and Response Technologies;312
10.5.1;Introduction;312
10.5.2;Reactive Automated Protection Systems;312
10.5.3;Deterrence Technologies;312
10.5.3.1;Intercoms;312
10.5.3.2;Lighting Control and the Control of System Features;313
10.5.4;Deployable Barriers;313
10.5.4.1;Vehicle Barriers;313
10.5.4.1.1;Rising Bollards;314
10.5.4.1.2;Rising Wedges;314
10.5.4.1.3;Semaphore Parking Gates;314
10.5.4.1.4;Cable Beams;315
10.5.4.1.5;Box Beam Barriers;316
10.5.4.1.6;Net Systems (Grab barriers);316
10.5.4.1.7;Swing Gates;317
10.5.4.1.8;Rolling Doors and Gates;317
10.5.4.1.9;Sliding Gates;317
10.5.4.1.10;Air Bags;318
10.5.4.1.11;Inventive Systems;318
10.5.4.2;Marine Vessel Barriers;318
10.5.4.2.1;Anti-Boat Barriers;318
10.5.4.2.2;Water Monitors;318
10.5.4.3;Pedestrian Barriers;319
10.5.4.3.1;Intercoms;319
10.5.4.3.2;Lighting;319
10.5.4.3.3;Rolling Grilles and Operable Walls;319
10.5.4.3.4;Deployable Doors;319
10.5.4.3.5;Revolving Doors;320
10.5.4.3.6;Irrigation Systems;320
10.5.4.3.7;Fog Barriers;321
10.5.5;Prejudiced Barriers and Aggressive Systems;321
10.5.5.1;Quick Setup Foam Barriers;321
10.5.5.2;Drop Chains;322
10.5.5.2.1;Aggressive Systems;322
10.5.5.2.2;Acoustic Weaponry;322
10.5.5.2.3;Usable Acoustic Security Devices;323
10.5.5.2.4;High-Voltage Weaponry;324
10.5.5.2.5;Remotely Operated Weaponry;324
10.5.5.2.6;Deluge Systems;325
10.5.6;Integrating the Elements;325
10.5.6.1;Appropriateness;325
10.5.6.2;Operationally;325
10.5.6.3;Safety Systems;326
10.5.6.3.1;Electronic Safety Systems;326
10.5.6.3.2;Mechanical Safety Systems;326
10.5.6.3.3;Procedural Safety Systems;327
10.5.7;Summary;327
10.5.8;Questions and Answers;327
10.6;Chapter 16: Alarm Detection and Emerging Video Technologies;330
10.6.1;Introduction;330
10.6.2;Alarm Detection Technologies;330
10.6.2.1;Point Detectors;330
10.6.2.1.1;Magnetic Switches;330
10.6.2.1.1.1;Simple Magnetic Switches;330
10.6.2.1.1.2;Balanced Bias Magnetic Switches;331
10.6.2.1.2;Duress Switches;331
10.6.2.1.2.1;Two-Finger Switches;331
10.6.2.1.2.2;Pull and Plunger Switches;331
10.6.2.1.2.3;Footswitches;332
10.6.2.1.2.4;Bill Traps;332
10.6.2.1.2.5;Resets;332
10.6.2.1.3;Elegant Duress Switch Implementations;332
10.6.2.2;Volumetric Detectors;333
10.6.2.2.1;Passive Infrared Field Detectors;333
10.6.2.2.2;Active Infrared Detectors;333
10.6.2.2.2.1;Reflection Detector;333
10.6.2.2.2.2;Beam Detectors;334
10.6.2.2.3;Microwave Detectors;334
10.6.2.2.3.1;Monostatic Detectors;334
10.6.2.2.3.2;Bistatic;335
10.6.2.2.4;Ultrasonic;335
10.6.2.2.5;Acoustic (Glass-Break) Detectors;335
10.6.2.3;Dual Technologies;336
10.6.3;Emerging Video Technologies;336
10.6.3.1;Volumetric Detectors;336
10.6.3.1.1;Video Motion Detectors;336
10.6.3.1.2;Intelligent Video Detectors;337
10.6.3.1.3;Triangulation Detectors;338
10.6.3.2;Perimeter Detection Systems;338
10.6.3.2.1;Line Detectors;338
10.6.3.2.1.1;Leaky Coax Detectors;338
10.6.3.2.1.2;Capacitance Detectors;339
10.6.3.2.1.3;Seismic Detectors;339
10.6.3.2.1.4;Fiber-Optic Detectors;340
10.6.3.2.1.5;Common-Mode Wire Detectors;340
10.6.3.2.1.6;Pneumatic Weight Detectors;341
10.6.3.2.1.7;Monostatic and Bistatic Perimeter Microwave Detectors;341
10.6.3.2.1.8;Perimeter Video Detectors;341
10.6.3.2.1.9;Thermal Video Cameras;341
10.6.3.2.1.10;Lidar;342
10.6.3.2.1.11;Ground and Short-Range Radar;342
10.6.3.2.1.12;Sonar;342
10.6.3.3;Miscellaneous Detectors;342
10.6.4;Summary;343
10.6.5;Questions and Answers;343
10.7;Chapter 17: Design Standards Development;346
10.7.1;Introduction;346
10.7.2;Environmental Issues;346
10.7.2.1;Temperature;346
10.7.2.2;National Electrical Manufacturers Association and Ingress Protection Environments;346
10.7.2.3;Explosive and Flammable Environments;347
10.7.2.3.1;Classes;347
10.7.2.3.2;Divisions;347
10.7.2.3.3;Zones;347
10.7.2.3.4;Equipment Classifications;347
10.7.3;Power Issues;348
10.7.3.1;Grounding and Powering;348
10.7.3.2;Power Phasing;348
10.7.3.3;Hospital Ground;348
10.7.3.4;Ground Isolation;349
10.7.3.5;Panels and Breakers;349
10.7.3.6;Uninterruptible Power Supplies;349
10.7.4;Wiring Practices;349
10.7.4.1;Classes of Wiring;349
10.7.5;Wire Dressing;350
10.7.6;Mounting Devices;350
10.7.6.1;Mechanical Strength;350
10.7.6.2;Aesthetics;351
10.7.6.3;Earthquake Considerations;351
10.7.6.4;Physical Details;351
10.7.7;Drawing Standards;351
10.7.8;Summary;352
10.7.9;Questions and Answers;352
10.8;Chapter 18: Finalizing the Installation;354
10.8.1;Introduction;354
10.8.2;Finalization and Commissioning Checklist;354
10.8.2.1;Set up the Security System Master Clock;355
10.8.2.2;Connect Each Field Device to Power and Its Digital Switch as Its Installation Is Completed in the Field;355
10.8.2.3;Load and Commission the Server and Workstation Operating Systems;355
10.8.2.4;Set Up the Security System Network Infrastructure;355
10.8.2.5;Load Alarm/Access Control System Primary Server and Workstation Software;356
10.8.2.6;Configure Alarm/Access System Field Connections;356
10.8.2.7;Load Digital Video System Primary Server and Workstation Software;356
10.8.2.8;Configure Connections to All of the Digital Video System Cameras and Intercoms;356
10.8.2.9;Commission the Alarm/Access Control System Field Devices;357
10.8.2.9.1;Set up Access Control Groups;357
10.8.2.9.2;Schedules and Time Zones;357
10.8.2.10;Set Up Higher System Functions (e.g., Video Guard Tours, Video Pursuit);357
10.8.2.10.1;Video Guard Tour Implementations;357
10.8.2.10.2;PSIM Software Implementation;358
10.8.2.11;Set up Alarm/Access Control System and Digital Video System Integration;358
10.8.2.12;Implement Homeland Security Threat Level System Policies and Rules;359
10.8.2.13;Implement the Organizations System Policies and Rules;359
10.8.2.14;Implement Backup Servers;360
10.8.2.15;Configure the System for Remote Monitoring;360
10.8.2.16;Secure the Security System;361
10.8.2.17;Integrate the System to the Information Technology System;361
10.8.2.18;Integrate the System to Other Building Systems;362
10.8.3;Special Implementations;363
10.8.3.1;System Maps;363
10.8.3.2;Boolean Algebra Logic Cell Implementation;363
10.8.3.2.1;``And´´ Gate Alarms;364
10.8.3.2.2;Local Alarms;364
10.8.3.2.3;Lighted Paths;365
10.8.3.2.4;Lights/HVAC After-Hours System Billing;365
10.8.4;Custom System Reports Implementation;365
10.8.4.1;Exclusion Reports;366
10.8.4.2;Nesting Reports;366
10.8.5;Securing the Security System;366
10.8.5.1;Device and Transmission Security;367
10.8.5.1.1;Architectural Security;367
10.8.5.2;Data Encryption;368
10.8.5.2.1;Encryption Basics5;368
10.8.5.3;Internet Protocol Security;369
10.8.5.4;Radio Frequency Security;369
10.8.5.4.1;Countermeasures;369
10.8.6;Archived Data Security;370
10.8.6.1;Archiving Principles;370
10.8.6.2;Backups and Recoveries;370
10.8.6.3;Business Continuity Management Servers;371
10.8.6.4;User Classes and Authorities;371
10.8.6.5;Login/Logout Security (Card Controls Operating System);371
10.8.6.6;Cutting-Edge System Security;372
10.8.6.7;System Cutover Day;372
10.8.7;Summary;372
10.8.8;Questions and Answers;373
10.9;Chapter 19: System Implementation;376
10.9.1;Introduction;376
10.9.2;System Maintenance and Management;376
10.9.2.1;Maintenance;376
10.9.2.2;Management;377
10.9.3;Management Approaches: Types of System Implementations;378
10.9.3.1;Monitored Systems;378
10.9.3.1.1;Full-Time System Monitoring;378
10.9.3.1.2;Part-Time System Monitoring;378
10.9.3.2;Unmonitored Systems;379
10.9.3.3;Hybrid Systems;379
10.9.4;Security Command Center Operational Implementations and Issues;379
10.9.4.1;Staffing Requirements;379
10.9.4.1.1;Skills;379
10.9.4.1.2;Hours;379
10.9.4.2;Supervision;380
10.9.4.3;Security/Safety Policy Compliance;380
10.9.4.3.1;Interfacing the Technology to the Overall Security Program;380
10.9.4.4;Skills of the Security Management Team;380
10.9.4.4.1;C-Level Executive;380
10.9.4.4.2;Security Command Center Manager;380
10.9.4.4.3;Shift Supervisors;381
10.9.5;Closing Out the Project;381
10.9.5.1;Measuring Success;381
10.9.5.2;Lessons Learned;381
10.9.6;Dealing with Offenders Who Try to Circumvent the System;382
10.9.6.1;Using the System for Surveillance;382
10.9.6.2;Using the Archive Video System to Detect Improper Behavior;382
10.9.7;Summary;383
10.9.8;Questions and Answers;383
11;Index;386


1 Introduction and Organization of the Book
Abstract
Chapter 1 introduces the concepts discussed in the book including the definition of IP-based integrated electronic security systems and what is meant by system integration, convergence-based systems, and enterprise integrated security systems. Although you may not need to design enterprise-class integrated security systems, understanding their design concepts will make you a better designer of any convergence-based integrated security system, so it is worthwhile to be attentive to the enterprise-class concepts when they are discussed herein. This book is designed for new and experienced system design consultants, designers, and project managers who build these complex systems and for the building owners, security directors, and facilities directors who operate them. This chapter includes background into the motivation for writing this book, including the vacuum of information on securing security systems and the fact that few designers knew how to make these systems perform the extraordinary functions they are capable of in the hands of a talented designer. This chapter includes a framework for understanding the design process including: • What assets are we trying to protect? • From whom are we protecting them? • And against what kinds of attack or misuse? • How can I use integration to improve the operations of my client and disrupt the operations of criminals and terrorists? After finishing this book, you will have a new command of the strategic issues, technical issues and tactical issues facing designers and security managers. This book is arranged to go from the strategic to the technical to the tactical. Strategic subjects are covered primarily in Chapters 2 and 3 and this chapter, technical subjects are covered primarily in Chapters 4–10, and tactical subjects are covered primarily in Chapters 11–19. The strategic section covers the “why” of design, including some important history that provides insight into how to stay in the path of industry development and not be sidetracked as it goes by, the technical section explains how it is done, and the tactical section provides the cultural knowledge that leads to project success. Keywords Access control Closed-circuit video Elevation Riser Site plan Specification Tactical issues TCP/IP Title sheet Two-Way voice communication Most integrated security systems installed today are designed to protect unknown vulnerabilities against unknown threats. They often use techniques and products that work well to the advantage of the vendor but not always so well to the advantage of the client, and they are often more expensive than is necessary. We can change that. This book is about designing IP-based integrated security systems and enterprise-integrated security systems (which are also IP-based). These are security systems that have three major defining attributes: • Integrated security systems comprise numerous subsystems together into one complete, highly coordinated, high-functioning system. Typical subsystems include alarm, access control, closed-circuit video, two-way voice communication, parking control, and other related systems. System integration is the basic concept for all that follows. • System integration involves both the integration of components and the integration of functions. High-level functions can be obtained by integrating components into a comprehensive working system, instead of individual disconnected subsystems. • Convergence-based integrated security systems are integrated security systems that utilize TCP/IP Ethernet infrastructure as the basic communications media. This is the result of a convergence of industries (the security technology industry and the information technology (IT) industry). Most new integrated security systems are convergence-based systems. • We will also discuss enterprise-integrated security systems concepts in depth. Enterprise-integrated security systems are those security systems that have been integrated with other systems, including elevators, private automatic branch exchanges, human relations programs, and security video and intercommunications systems, at the corporate-wide (the enterprise) level to perform a wide variety of automated security-related tasks in a manner consistent with corporate or agency policies and procedures and that do so uniformly across the entire enterprise. For example, when an employee is terminated, the act of pressing OK on the human resources software screen can cause the employee to also be terminated from the access control system and IT system and even shut down access to his or her business telephone and voice mail. Such integration can prevent a hostile terminated employee from gaining outside access to valuable data or leaving a forwarding or even antagonistic message on his or her voice mail. Virtually all but the very earliest enterprise integrated security systems are convergence based, and almost all of the earliest systems utilize some convergence concepts. Although you may not need to design enterprise-class integrated security systems, understanding their design concepts will make you a better designer of any convergence-based integrated security system, so it is worthwhile to be attentive to the enterprise-class concepts when they are discussed herein. Who Should Read This Book
This book is designed for new and experienced system design consultants, designers, and project managers who build these complex systems and for the building owners, security directors, and facilities directors who operate them. Each will benefit from the expansive array of issues covered. Many of these subjects have only rarely or perhaps have never been discussed before in any book to my knowledge. These include such aspects as how to make your security system virtually disappear on the IT system infrastructure, as though it were not there at all to anyone but the system administrator (Chapter 17); a complete discussion on how to use security technology to delay, confound, and take down aggressors in very high-security environments (Chapter 4); and secrets on system implementation that help ensure a stable, reliable, and high-functioning system (Chapters 9 and 18). There is some discussion about pitfalls out of which the potential for lawsuits has arisen for well-meaning but unsuspecting project participants. My goal is to help you gain command of every aspect of the process necessary to ensure your success, the success of the project team, and especially the success of your client. Designing enterprise integrated security systems seems daunting to most who have only designed systems for single buildings or for small campus environments. The challenge has become ever more important with the advent of terrorism and the move toward using electronic security systems to augment homeland security. The challenge of helping to protect our nation’s transportation, economic, and cultural infrastructure raises the importance of designing what used to be esoteric systems. Today, these systems are becoming more commonplace. However, many of them are being designed using old skillsets and outdated techniques, resulting in outmoded and therefore unsuitable results. A Brief Background
When I wrote the first edition of this book, the security technology industry had only just recently crested a hill. Behind us, in the rearview mirror, is yesterday’s technology. Ahead of us toward the horizon is the technology of tomorrow. It is different from the past. It is IT based. Many in the security industry are afraid of it. They will resist the change. They will lose. Those who resist IP-based security systems will condemn themselves to security industry irrelevance. In the 1990s, large corporate and government clients began to understand that they are better served by enterprise-class security systems. Enterprise systems differ from older approaches in that they permit the uniform application of security policies and procedures across the entire organization. They permit centralized monitoring of security, business processes, and adherence to policy. They reduce liability and operating costs. They permit a user from one facility to freely access any other if his or her access level permits. At the time the first edition of this book was written, nearly every manufacturer had embraced the enterprise security concept, but many were still trying to make it work in the context of older system architectures. Increasingly, at the time of the second edition, these are gradually being replaced by systems with pure IT infrastructures. By reading this book, you will be ahead of the game and be able to make design decisions that will save you and your clients tens of thousands of dollars and many headaches. These large-scale enterprise-level integration projects raise the bar, and we must all train well enough to jump over it. This book presents everything you will need to know to achieve success on these complex projects. A Framework for Understanding the Design...



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.