Physical Security Systems Handbook

The Design and Implementation of Electronic Security Systems


  • Michael Khairallah, President, Security Design Solutions L.L.C., Covington LA, USA

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent “How To” for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
View full description


PRIMARY MARKET: (audience)Physical security professionals, security managers, security students and professionalsSECONDARY MARKET: (audience)Those responsible for security and safety in the following professions: Correctional facilities, educational and medical institutions in addition to the military and law enforcement


Book information

  • Published: November 2005
  • ISBN: 978-0-7506-7850-6

Table of Contents

1 Introduction2 The Physical Threat Assessment3 Conducting the Vulnerability Study to Identify Physical Security Requirements4 Creating the Preliminary System Design5 Documenting the Preliminary System Design6 Presenting the Solutions7 System Acquisitions - Part 1, Technical Specifications8 System Acquisitions - Part 2, The Business Plan9 System Implementation