To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.
The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.
The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.
Table of Contents
Chapter 1 - Physical Security Planning
Chapter 2 - Vulnerability Assessments
Chapter 3 - Security Design and Planning
Chapter 4 - Security Construction Projects
Chapter 5 - Protection in Depth
Chapter 6 - Perimeter Protection
Chapter 7 - Access Control
Chapter 8 - Physical Protection Systems
Chapter 9 - CCTV and IP Video
Chapter 10 - Keys, Locks, and Safes
Chapter 11 - Biometrics
Chapter 12 - Security Guard Force
Chapter 13 - Central Station Design
Chapter 14 - Government Security
Chapter 15 - Financial Institutions and Banks
Chapter 16 - Data Center Protection
Chapter 17 - Total System Cost
Chapter 18 - Security Master Plan
Chapter 19 - Security Foresight
Chapter 20 - Security Leadership