Physical Security Planning Setting the Stage Site Planning Reviewing the Physical Design Vulnerability Assessments The Security Survey Vulnerability Assessment Developing a Vulnerability Assessment Understanding the Threats Making Adjustments Security Design and Planning Security Planning and Evaluation Security Design Concepts Security Technologies EASI Model Adversary Sequence Diagram Working with Architects Working with Contractors Construction Review Security Construction Projects New Construction Initial Point of Access Roadway Design Parking Loading Docks Signage Retrofitting Protection in Depth Protection-in-Depth Concepts Protection Plans Evacuation Drills Incident Response Penetration Tests Access Control Violation Monitoring Perimeter Protection Crime Prevention through Environmental Design (CPTED) Protecting with CPTED Concepts Barriers Lighting Access Control Access Control Anti-Passback Access Control Head End Turnstiles and Mantraps Physical Protection Systems Doors Windows Interior Intrusion Detection Systems Perimeter Intrusion Detection Systems CCTV and IP Video The Essential Guide to Video Surveillance Video Surveillance Use Cases Video Surveillance System Classifications Image Capture Video Sources--Cameras Lenses Lighting HDTV Recording Systems Video Management Systems Video Control, Analysis, and Video Content Analysis Systems Using a Step-by-Step Approach to System Selection and Deployment Upgrade Path Manpower and Video Surveillance Privacy and Legal Considerations--Video Surveillance Checklist The Future of Video Surveillance Keys, Locks, and Safes Keys, Locks, and Safes Developing a Master Locking System Safes Vaults Containers Biometrics What Is Biometrics? Multibiometric Systems Deploying Biometrics Privacy Biometric Metrics Attacks on Biometric Systems and Their Remedies Security Guard Force Establishing a Security Guard Force Mission and Duties of the Security Guard Force Profile of the Facility to Be Protected Proprietary Security Guard Force Contract Security Guard Force Hybrid Force Security Guard Uniforms Security Guard Identification Security Guard as an Authority Figure Security Guard Protective Equipment Security Guard Training Professional Security Certifications Personnel Issues Central Station Design Developing an Operation Design Requirements Secondary Amenities for an Operations Control Center Alarm Assessment Government Security SCIF Location Design Sound Masking TEMPEST Shielding Filtering Access Security Alarm Requirements Open Storage Closed Storage Dealing with Contractors Appendix A: Fixed Facility Checklist Financial Institutions and Banks Vaults Safes ATMs Night Depositories Teller Cash Recyclers Dye Packs Barriers Ambush Features Video Systems Holdup Alarms Bank Guards Data Center Protection Data Centers Fire Protection Fire Detection/Alerting Fire Suppression Total System Cost Determining Total System Cost System Design Cost System Installation Cost System Operational Cost IT-Related Cost Maintenance Cost Replacement Cost Cost-Benefit Analysis Cost of Loss Cost of Prevention Return on Investment Cost Factors Security Master Plan Security Master Plan Strategy Engaging the Stakeholders What Should Your Security Philosophies Be? Technology Migration Strategy Equipment Replacement Schedules Security Foresight Strategic Foresight Foresight Techniques Security Leadership What Is Leadership? Purpose of Leadership Effective Leadership Why Security Leaders Are Important Understanding the Basics Are Leaders Born or Made? Good Leadership Bad Leadership Going from Bad to Good Forging the Future New Definitions for Leaders in the Twenty-First Century Index pth Protection-in-Depth Concepts Protection Plans Evacuation Drills Incident Response Penetration Tests Access Control Violation Monitoring Perimeter Protection Crime Prevention through Environmental Design (CPTED) Protecting with CPTED Concepts Barriers Lighting Access Control Access Control Anti-Passback Access Control Head End Turnstiles and Mantraps Physical Protection Systems Doors Windows Interior Intrusion Detection Systems Perimeter Intrusion Detection Systems CCTV and IP Video The Essential Guide to Video Surveillance Video Surveillance Use Cases Video Surveillance System Classifications Image Capture Video Sources--Cameras Lenses Lighting HDTV Recording Systems Video Management Systems Video Control, Analysis, and Video Content Analysis Systems Using a Step-by-Step Approach to System Selection and Deployment Upgrade Path Manpower and Video Surveillance Privacy and Legal Considerations--Video Surveillance Checklist The Future of Video Surveillance Keys, Locks, and Safes Keys, Locks, and Safes Developing a Master Locking System Safes Vaults Containers Biometrics What Is Biometrics? Multibiometric Systems Deploying Biometrics Privacy Biometric Metrics Attacks on Biometric Systems and Their Remedies Security Guard Force Establishing a Security Guard Force Mission and Duties of the Security Guard Force Profile of the Facility to Be Protected Proprietary Security Guard Force Contract Security Guard Force Hybrid Force Security Guard Uniforms Security Guard Identification Security Guard as an Authority Figure Security Guard Protective Equipment Security Guard Training Professional Security Certifications Personnel Issues Central Station Design Developing an Operation Design Requirements Secondary Amenities for an Operations Control Center Alarm Assessment Government Security SCIF Location Design Sound Masking TEMPEST Shielding Filtering Access Security Alarm Requirements Open Storage Closed Storage Dealing with Contractors Appendix A: Fixed Facility Checklist Financial Institutions and Banks Vaults Safes ATMs Night Depositories Teller Cash Recyclers Dye Packs Barriers Ambush Features Video Systems Holdup Alarms Bank Guards Data Center Protection Data Centers Fire Protection Fire Detection/Alerting Fire Suppression Total System Cost Determining Total System Cost System Design Cost System Installation Cost System Operational Cost IT-Related Cost Maintenance Cost Replacement Cost Cost-Benefit Analysis Cost of Loss Cost of Prevention Return on Investment Cost Factors Security Master Plan Security Master Plan Strategy Engaging the Stakeholders What Should Your Security Philosophies Be? Technology Migration Strategy Equipment Replacement Schedules Security Foresight Strategic Foresight Foresight Techniques Security Leadership What Is Leadership? Purpose of Leadership Effective Leadership Why Security Leaders Are Important Understanding the Basics Are Leaders Born or Made? Good Leadership Bad Leadership Going from Bad to Good Forging the Future New Definitions for Leaders in the Twenty-First Century Index Sources--Cameras Lenses Lighting HDTV Recording Systems Video Management Systems Video Control, Analysis, and Video Content Analysis Systems Using a Step-by-Step Approach to System Selection and Deployment Upgrade Path Manpower and Video Surveillance Privacy and Legal Considerations--Video Surveillance Checklist The Future of Video Surveillance Keys, Locks, and Safes Keys, Locks, and Safes Developing a Master Locking System Safes Vaults Containers Biometrics What Is Biometrics? Multibiometric Systems Deploying Biometrics Privacy Biometric Metrics Attacks on Biometric Systems and Their Remedies Security Guard Force Establishing a Security Guard Force Mission and Duties of the Security Guard Force Profile of the Facility to Be Protected Proprietary Security Guard Force Contract Security Guard Force Hybrid Force Security Guard Uniforms Security Guard Identification Security Guard as an Authority Figure Security Guard Protective Equipment Security Guard Training Professional Security Certifications Personnel Issues Central Station Design Developing an Operation Design Requirements Secondary Amenities for an Operations Control Center Alarm Assessment Government Security.
The Complete Guide to Physical Security