Design and Evaluation of Physical Protection SystemsBy
- Mary Lynn Garcia
Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
Facilities managers, security managers focusing on intrusion detection, access control, electronic security device management and environmental design practices. Security engineering students of all levels.
Paperback, 370 Pages
Published: September 2007
Imprint: Butterworth Heinemann
"Personally, I consider the first edition of this book to be a classic. For anyone who really knows security, this book is the bible. It is just the way it has to be done."--Dennis Giever, PhD, Dept. of Criminology, University of Pennsylvania
- Part OneChapter 1 - Design and Evaluation of Physical Protection SystemsIntroductionSafety vs. SecurityDeterrenceProcess OverviewPhysical Protection System DesignPPS FunctionsDesign GoalsDesign CriteriaAnalysisPhysical Protection System Design and the Relationship to RiskSummaryChapter 2 - Facility CharacterizationIntroductionPhysical ConditionsFacility OperationsFacility Policies and ProceduresRegulatory RequirementsSafety ConsiderationsLegal IssuesCorporate Goals and ObjectivesOther InformationSummarySecurity PrincipleChapter 3 - Threat Definition [extensively updated]IntroductionSteps for Threat Definition List Threat Information Collect Threat Information Organize Threat Information Example Threat StatementsChapter 4 - Target IdentificationIntroductionUndesirable ConsequencesConsequence AnalysisTargetsTechniques for Target IdentificationVital Area IdentificationSummarySecurity PrinciplePart TwoChapter 5 - Physical Protection System DesignIntroductionPhysical Protection System DesignPPS FunctionsRelationship of PPS FunctionsCharacteristics of an Effective PPSDesign CriteriaAdditional Design ElementsSummarySecurity PrinciplesChapter 6 Exterior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyPerimeter Sensor Systems--Design Concepts and GoalsEffects of Physical and Environmental ConditionsIntegration with Video Assessment SystemIntegration with Barrier Delay SystemExterior Sensor Subsystem CharacteristicsProceduresSummarySecurity PrinciplesChapter 7 Interior Intrusion SensorsIntroductionPerformance CharacteristicsSensor ClassificationSensor TechnologyEffects of Environmental ConditionsSensor SelectionProceduresSystem IntegrationSummarySecurity PrinciplesChapter 8- Alarm AssessmentIntroductionAssessment vs. SurveillanceVideo Alarm Assessment SystemAlarm Assessment by Response ForceIntegration with Safety SystemsLegal issuesProceduresAcceptance TestingSummarySecurity PrinciplesChapter 9--Alarm Communication and DisplayIntroductionEvolution of Alarm Reporting SystemsAC&D AttributesAlarm Communication SubsystemAlarm Control and DisplayOffline SystemsAC&D System DesignSummarySecurity PrinciplesChapter 10-Entry ControlIntroductionPersonnel Entry ControlPersonnel Entry Control BypassContraband DetectionLocksSystem Integration and Installation IssuesProceduresAdministrative ProceduresSummarySecurity PrinciplesChapter 11- Access DelayIntroductionBarrier Types and PrinciplesSystem ConsiderationsAspects of PenetrationPerimeter BarriersStructural Barriers Dispensable BarriersProceduresSummarySecurity PrinciplesChapter 12 Response [extensively updated]IntroductionGeneral ConsiderationsContingency Planning Communication InterruptionProceduresSummarySecurity PrinciplesPart ThreeChapter 13 Analysis and EvaluationIntroductionAdversary PathsEffectiveness MeasuresQuantitative AnalysisCritical PathQualitative AnalysisSummarySecurity PrinciplesChapter 14 - EASI Computer Model for AnalysisIntroductionQuantitative Analysis Tools EASI Model Using the ModelAdversary Sequence DiagramsSummarySecurity PrincipleChapter 15 - Risk AssessmentIntroductionRisk Management ApproachesRisk EquationVulnerability Assessment ProcessRisk AssessmentPerformance TestingSummarySecurity PrincipleChapter 16-Transportation System application [New]Appendix A-Threat tablesAppendix B-EASI Model