1 Introduction and Organization of the Book
Most integrated security systems installed today are designed to protect unknown vulnerabilities against unknown threats. They often use techniques and products that work well to the advantage of the vendor but not always so well to the advantage of the client, and they are often more expensive than is necessary. We can change that.
This book is about designing convergence-based integrated security systems and enterprise integrated security systems (which are also convergence based). These are security systems that have three major defining attributes: