Effective Physical Security,
Edition 5
Edited by Lawrence J. Fennelly

Publication Date: 14 Nov 2016
Description

Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard.

This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.

Key Features

  • Provides detailed coverage of physical security in an easily accessible format
  • Presents information that should be required reading for ASIS International’s Physical Security Professional (PSP) certification
  • Incorporates expert contributors in the field of physical security, while maintaining a consistent flow and style
  • Serves the needs of multiple audiences, as both a textbook and professional desk reference
  • Blends theory and practice, with a specific focus on today’s global business and societal environment, and the associated security, safety, and asset protection challenges
  • Includes useful information on the various and many aids appearing in the book
  • Features terminology, references, websites, appendices to chapters, and checklists
About the author
Edited by Lawrence J. Fennelly, Expert witness and consultant in security, Litigation Consultants Inc., Massachusetts, USA
Table of Contents
  • Dedication
  • Foreword
  • Preface
  • Chapter 1. Encompassing Effective CPTED Solutions in 2017 and Beyond: Concepts and Strategies
    • Introduction
    • Environment
    • Space
    • Target Hardening
    • CPTED Assessments
    • Questions to be Answered During an Assessment
    • CPTED Survey for Colleges and Universities: 30 Vulnerabilities Based on CPTED Assessments
    • CPTED Recommendations
    • Psychological Properties of Colors
    • CPTED Landscape Security Recommendation
    • Conclusion
  • Chapter 2. Introduction to Vulnerability Assessment
    • Risk Management and Vulnerability Assessment
    • Risk Assessment and the Vulnerability Assessment Process
    • Statistics and Quantitative Analysis
    • Vulnerability Assessment Process Overview
    • Planning the Vulnerability Assessment
    • Protection Objectives
    • Data Collection—Detection
    • Data Collection—Delay
    • Data Collection—Response
    • Analysis
    • Reporting and Using the Vulnerability Assessment
    • Systems Engineering and Vulnerability Assessment
    • System Requirements
    • System Design and Analysis
    • System Installation and Test
    • System Replacement
    • Summary
  • Chapter 3. Influence of Physical Design
    • Introduction
    • Defensible Space
    • Crime Prevention Through Environmental Design
    • Conclusion
  • Chapter 4. Approaches to Physical Security
    • Levels of Physical Security
    • The Value of Planning
    • Physical Barriers
    • Security Surveillance System (CCTV)
    • The Security or Master Plan and Countermeasures
    • Convincing Oneself That a Proposal Is Justified
    • Designing Security and Layout of Site
    • Summary
  • Chapter 5. Security Lighting
    • Introduction
    • Illumination
    • Types of Lamps
    • Twenty-Five Things You Need to Know About Lighting
    • Energy Management
    • Lighting Checklist
    • Lighting Definitions
  • Chapter 6. Electronics Elements: A Detailed Discussion
    • Introduction
    • Alarm/Access Control Systems
    • Server (and Business Continuity Server)
    • Workstations
    • Advanced Elements
    • CCTV and Digital Video Systems
    • How Digital Video Differs From Analog
    • Wireless Digital Video
    • Satellite
    • Wireless Architectures
    • Video Analytics
    • Lenses and Lighting
    • Security Communications
    • Analog Versus Digital
    • Command/Control and Communication Consoles
    • Workstation and Console Specifics
    • Guard Console Functions
    • Communication Systems
    • Summary
    • Questions and Answers
  • Chapter 7. Use of Locks in Physical Crime Prevention
    • Lock Terminology and Components
    • Key-Operated Mechanisms
    • Combination Locks
    • Lock Bodies
    • Door Lock Types
    • Strikes
    • Attacks and Countermeasures
    • Locks and the Systems Approach to Security
    • Appendix 7A: Key Control
    • New Standard Set for Exit Devices, Locks, and Alarms
    • Electrified Panic Hardware
    • Appendix 7B: Key Control and Lock Security Checklist
  • Chapter 8. Internal Threats and Countermeasures
    • Introduction
    • Internal Theft
    • Management Countermeasures
    • Physical Security Countermeasures
    • Security Officers
  • Chapter 9. External Threats and Countermeasures
    • Introduction
    • Methods of Unauthorized Entry
    • Countermeasures
  • Chapter 10. Biometrics in the Criminal Justice System and Society Today
    • Introduction
    • History of Biometrics and Fingerprinting in the United States
    • Biometrics Usage Today
    • The Federal Bureau of Investigation’s Biometric Center of Excellence
    • Biometric Modalities and Technology
    • International Biometrics: India’s Private Usage of Biometrics on Society
    • Future Advancements of Biometrics
  • Chapter 11. Access Control Systems and Identification Badges
    • Access Control Systems and Protocols
    • Identification Badging System
  • Chapter 12. Chain-Link Fence Standards
    • Recommendations
    • Security Planning
    • Material Specifications
    • Design Features and Considerations
    • Typical Design Example
  • Chapter 13. Doors, Door Frames, and Signage
    • Introduction
    • Residential Buildings
    • Exterior Number Sizing
    • The Function of a Door
    • Terminology
    • Standards for Doors
  • Chapter 14. Glass and Windows
    • Introduction
    • Types of Glass
    • Glass and Security
    • Window Film
  • Chapter 15. The Legalization of Marijuana and the Security Industry
    • Marijuana—the Pros and Cons
    • Should Marijuana be Legal for Medicinal and/or Recreational Purposes?
    • The Short-Term Effects of Marijuana
    • The Long-Term Effects of Marijuana
    • Is Marijuana Addictive?
    • Security for Marijuana Farms and Dispensaries
  • Chapter 16. Designing Security and Working With Architects
    • Leadership in Energy and Environmental Design
    • Crime Prevention Through Environmental Design Planning and Design Review
    • Physical Security Systems
  • Chapter 17. Standards, Regulations, and Guidelines Compliance and Your Security Program, Including Global Resources
    • Introduction
    • Standards
    • Regulations
    • Guidelines
    • Managing Compliance
    • Resources
  • Chapter 18. Information Technology Systems Infrastructure
    • Introduction
    • Basics of Transport Control Protocol/Internet Protocol and Signal Communications
    • Transport Control Protocol/User Datagram Protocol/Real-Time Protocol
    • User Datagram Protocol
    • Networking Devices
    • Network Infrastructure Devices
    • Servers
    • Network Architecture
    • Network Configurations
    • Creating Network Efficiencies
    • Digital Video
    • Digital Resolution
    • Frame Rates
    • Display Issues
    • Managing Data Systems Throughput
    • System Architecture
    • Interfacing to Other Enterprise Information Technology Systems
    • Summary
  • Chapter 19. Security Officers and Equipment Monitoring
    • Introduction
    • Command Center
    • Best Locations for Closed-Caption Television
    • Introduction to Access Control and Biometrics
    • Designated Restricted Areas
    • Summary
  • Chapter 20. Video Technology Overview
    • Overview
    • Video System
    • Camera Function
    • Scene Illumination
    • Scene Characteristics
    • Lenses
    • Cameras
    • Transmission
    • Switchers
    • Quads and Multiplexers
    • Monitors
    • Recorders
    • Hard-Copy Video Printers
    • Ancillary Equipment
    • Summary
    • Glossary for CCTV
  • Chapter 21. Understanding Layers of Protection Analysis
    • Introduction
    • Conclusion
  • Chapter 22. Fire Development and Behavior
    • Introduction
    • Stages of Fire
    • How Fire Spreads
    • Four Ways to Put Out a Fire
    • Classifying Fire
    • UL Standard 217, 268 and NFPA 72
    • Water Supply for Sprinklers and Tanks
    • Appendix: A Fire Safety Inspection
    • Administrative and Planning Phase
    • General Physical Inspection Phase
    • Extinguisher Inspection Phase
    • Stand Pipe, Fire Hose, and Control Valve Inspection Phase
    • Sprinkler System Inspection Phase
    • Hazardous Materials Inspection Phase
    • Alarm System Inspection Phase
  • Chapter 23. Alarms Intrusion Detection Systems
    • Introduction
    • False Alarms
    • Components of Alarm Systems
    • Application
    • Alarm Equipment Overhaul
    • Additional Resources
    • Conclusion
    • Appendix 23A: Smoke Detectors
    • Appendix 23B: Alarm Certificate Services Glossary of Terms Certificate Types
    • Standards
    • Appendix 23C: Fire Classifications
    • Use of Fire Extinguishers
  • Appendix 1. Glossary of Terms
  • Index
Book details
ISBN: 9780128044629
Page Count: 458
Retail Price : £62.99
  • Cabric, Corporate Security Management, Butterworth-Heinemann, Apr 2015, 224 pages, 9780128029343, $49.95
  • Fischer, Halibozek and Walters, Introduction to Security, Butterworth-Heinemann, Sep 2012, 528 pages, 9780123850577, $69.95
  • Norman, Integrated Security Systems Design, Butterworth-Heinemann, Sep 2014, 390 pages, 9780128000229, $64.95
Audience

Physical and Information Corporate Security managers, supervisors, executives, and other practitioners; Security Management students