You are previewing Integrated Security Systems Design.
O'Reilly logo
Integrated Security Systems Design

Book Description

Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in goverment and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money.

Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how it’s done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book.

* Centralize monitoring of security, of business processes and of adherence to policy
* Learn the what-not-to-do's of security design from an experienced practitioner
* Maximize your organization's safety while reducing liability and operating costs

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Preface
  6. Acknowledgments
  7. Table of Contents
  8. Section One: Introduction to Intregrated Security Systems
    1. Chapter 1: Introduction and Organization of the Book
      1. WHO SHOULD READ THIS BOOK
      2. A BRIEF BACKGROUND
      3. A FRAMEWORK FOR UNDERSTANDING THE DESIGN PROCESS
      4. GOALS OF THE BOOK
      5. ARRANGEMENT OF THE BOOK
    2. Chapter 2: Integrated Security System Design Benefits and Philosophy
      1. WHY INTEGRATE SYSTEMS?
      2. COST BENEFITS
      3. HOW INTEGRATION IS ACHIEVED
      4. SUMMARY
    3. Chapter 3: History of Electronic Security
      1. THE HISTORY OF INTEGRATED SECURITY SYSTEMS
      2. THE FIRST GENERATION
      3. THE SECOND GENERATION
      4. THE THIRD GENERATION
      5. THE FOURTH GENERATION
      6. FIFTH-GENERATION TECHNOLOGY
      7. AVOIDING OBSOLESCENCE
      8. SUMMARY
      9. CHAPTER NOTES
  9. Section Two: Security System Design
    1. Chapter 4: Security System Design Elements
      1. THE TOOLS
      2. THE PLACE OF ELECTRONICS IN THE OVERALL SECURITY PROCESS
      3. ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES
      4. TYPES OF DESIGN EFFORTS
      5. PROJECT DRIVERS
      6. SUMMARY
      7. CHAPTER NOTES
    2. Chapter 5: Electronics Elements (High-Level Discussion)
      1. ACCESS CONTROL ELEMENTS
      2. DETECTION ELEMENTS
      3. ASSESSMENT AND VERIFICATION ELEMENTS
      4. REACTION ELEMENTS
      5. SUMMARY
      6. CHAPTER NOTES
    3. Chapter 6: Electronics Elements (Detailed Discussion)
      1. ALARM/ACCESS CONTROL SYSTEMS
      2. SERVER (AND BUSINESS CONTINUITY SERVER)
      3. WORKSTATIONS
      4. ADVANCED ELEMENTS
      5. CCTV SYSTEMS
      6. HOW DIGITAL VIDEO DIFFERS FROM ANALOG
      7. WIRELESS DIGITAL VIDEO
      8. SECURITY COMMUNICATIONS
      9. ANALOG VS. DIGITAL
      10. COMMAND/COMMUNICATIONS CONSOLES
      11. GUARD CONSOLE FUNCTIONS
      12. COMMUNICATIONS SYSTEMS
      13. SUMMARY
      14. CHAPTER NOTES
    4. Chapter 7: Physical Security Elements
      1. BASIC PHYSICAL SECURITY
      2. BASIC PHYSICAL SECURITY SKILLS: KNOWLEDGE OF THE TOOLS
      3. DOOR TYPES
      4. ELECTRIFIED LOCKS
      5. CONCERNS ABOUT SPECIAL KNOWLEDGE
      6. SUMMARY
      7. CHAPTER NOTES
    5. Chapter 8: The Security Design Process
      1. ESTABLISH ELECTRONIC SECURITY PROGRAM OBJECTIVES
      2. DEFINE COUNTERMEASURES
      3. ESTABLISH SECURITY POLICIES RELATED TO ELECTRONIC SYSTEMS
      4. ESTABLISH THE BUDGET
      5. PHASES OF THE DESIGN AND CONSTRUCTION PROJECT
      6. SUMMARY
      7. CHAPTER NOTE
    6. Chapter 9: Preliminary Design Process Steps
      1. BASIS FOR DESIGN
      2. RESEARCH
      3. DEVELOPING DRAWING AND SPECIFICATION RESOURCES
      4. COORDINATING INTERFACES TO OTHER SYSTEMS
      5. LAYOUT DEVICES IN RESPONSE TO ELECTRONIC SECURITY SYSTEM OBJECTIVES AND BUDGET
      6. SELECT REQUIRED DEVICES
      7. ANALOG VS. DIGITAL VIDEO AND AUDIO SYSTEMS
      8. CHAPTER NOTES
    7. Chapter 10: Getting Down to the Actual Design
      1. MACROLEVEL DESIGN: THE PIECES OF THE BIG PICTURE
      2. MICROLEVEL DESIGN: THE THREADS THAT KNIT TOGETHER THE PIECES OF THE BIG PICTURE
      3. SUMMARY
      4. CHAPTER NOTE
  10. Section Three: Special Design Sections
    1. Chapter 11: Information Technology Systems Infrastructure
      1. INTRODUCTION
      2. BASICS OF TCP/IP AND SIGNAL COMMUNICATIONS
      3. NETWORKING DEVICES
      4. NETWORK INFRASTRUCTURE DEVICES
      5. SERVERS
      6. NETWORK ARCHITECTURE
      7. NETWORK CONFIGURATIONS
      8. CREATING NETWORK EFFICIENCIES
      9. DIGITAL VIDEO
      10. DIGITAL RESOLUTION
      11. FRAME RATES
      12. DISPLAY ISSUES
      13. MANAGING DATA SYSTEMS THROUGHPUT
      14. SYSTEM ARCHITECTURE
      15. INTERFACING TO OTHER ENTERPRISE INFORMATION TECHNOLOGY SYSTEMS
      16. SUMMARY
      17. CHAPTER NOTES
    2. Chapter 12: Radio Frequency Systems
      1. BASIC RADIO FREQUENCY THEORY
      2. FREQUENCIES AND TRANSMISSION SCHEMES
      3. COMPONENTS
      4. TRANSMISSION PHYSICS
      5. SUMMARY
    3. Chapter 13: Interfacing to Legacy Systems and Emerging Technologies
      1. THE CHALLENGE OF LEGACY SYSTEMS
      2. LEGACY ACCESS CONTROL SYSTEMS
      3. LEGACY VIDEO SYSTEMS
      4. LEGACY INTERCOM SYSTEMS
      5. DIRECT RING-DOWN INTERCOM SYSTEMS
      6. SWITCHED INTERCOM BUSS SYSTEMS
      7. EMERGING TECHNOLOGIES
      8. SUMMARY
    4. Chapter 14: Interfacing to Related Systems
      1. BUILDING SYSTEM INTERFACES
      2. MORE ON BUILDING SYSTEM INTERFACES
      3. ELEVATORS AND ESCALATORS
      4. BUILDING AUTOMATION SYSTEMS
      5. IRRIGATION
      6. DELUGE FIRE SPRINKLER CONTROL (ANOTHER REAPS TECHNOLOGY)
      7. PABX INTERFACES
      8. VOICE OVER IP SYSTEMS
      9. PUBLIC ADDRESS SYSTEMS
      10. PARKING CONTROL SYSTEMS
      11. FUEL MANAGEMENT SYSTEMS
      12. SUMMARY
    5. Chapter 15: Delaying Technologies and Response Technologies
      1. REACTIVE AUTOMATED PROTECTION SYSTEMS
      2. INTERCOMS
      3. DEPLOYABLE BARRIERS
      4. INTEGRATING THE ELEMENTS
      5. SUMMARY
      6. CHAPTER NOTES
    6. Chapter 16: Alarm Detection and Emerging Video Technologies
      1. ALARM DETECTION TECHNOLOGIES
      2. EMERGING VIDEO TECHNOLOGIES
      3. SUMMARY
      4. CHAPTER NOTES
    7. Chapter 17: Design Standards Development
      1. ENVIRONMENTAL ISSUES Temperature
      2. POWER ISSUES
      3. WIRING PRACTICES
      4. WIRE DRESSING
      5. MOUNTING DEVICES
      6. DRAWING STANDARDS
      7. SUMMARY
    8. Chapter 18: Finalizing the Installation
      1. FINALIZATION AND COMMISSIONING CHECKLIST
      2. SPECIAL IMPLEMENTATIONS
      3. CUSTOM SYSTEM REPORTS IMPLEMENTATION
      4. SECURING THE SECURITY SYSTEM
      5. ARCHIVED DATA SECURITY
      6. SUMMARY
      7. CHAPTER NOTES
    9. Chapter 19: System Implementation
      1. SYSTEM MAINTENANCE AND MANAGEMENT
      2. MANAGEMENT APPROACHES: TYPES OF SYSTEM IMPLEMENTATIONS
      3. SECURITY COMMAND CENTER OPERATIONAL IMPLEMENTATIONS AND ISSUES
      4. CLOSING OUT THE PROJECT
      5. DEALING WITH OFFENDERS WHO TRY TO CIRCUMVENT THE SYSTEM
      6. SUMMARY
      7. CHAPTER NOTE
  11. Index