|
|
|||
|
||||
Overview"A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts.This book is an excellent ""How To"" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant. * Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system. * Builds upon well-known, widely adopted concepts prevalent among security professionals. * Offers seasoned advice on the competitive bidding process as well as on legal issues involved in the selection of applied products." Full Product DetailsAuthor: Michael Khairallah (President, Security Design Solutions L.L.C., Covington LA, USA)Publisher: Elsevier Science & Technology Imprint: Butterworth-Heinemann Ltd Dimensions: Width: 15.20cm , Height: 1.90cm , Length: 22.90cm Weight: 0.570kg ISBN: 9780750678506ISBN 10: 075067850 Pages: 312 Publication Date: 21 November 2005 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Out of stock The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of Contents1 Introduction 2 The Physical Threat Assessment 3 Conducting the Vulnerability Study to Identify Physical Security Requirements 4 Creating the Preliminary System Design 5 Documenting the Preliminary System Design 6 Presenting the Solutions 7 System Acquisitions - Part 1, Technical Specifications 8 System Acquisitions - Part 2, The Business Plan 9 System ImplementationReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |