Perimeter Security
Step 1. Download Adobe Digital Editions Both PC and Mac users will need to download Adobe Digital Editions to access their eBook. You can download Adobe Digital Editions at Adobe's website here.
Step 2. Register an Adobe ID if you do not already have one. (This step is optional, but allows you to open the file on multiple devices) Visit account.Adobe.com to register your Adobe account.
Step 3: Authorize Adobe Digital Editions using your Adobe ID. In Adobe Digital Editions, go to the Help menu. Choose “Authorize Computer.”
Step 4: Open your file with Adobe Digital Editions. Once you’ve linked your Adobe Digital Editions with your Adobe ID, you should be able to access your eBook on any device which supports Adobe Digital Editions and is authorized with your ID. If your eBook does not open in Adobe Digital Editions upon download, please contact customer service
Chapter 1: IntroductionChapter 2: Threat Assessment and Risk Analysis BasicsChapter 3: Perimeter FenceChapter 4: Protective BarriersChapter 5: Security LightingChapter 6: Electronic Access ControlChapter 7: Alarms (Intrusion Detection Systems)Chapter 8: Parking Lots and GaragesChapter 9: Closed Circuit Television (CCTV)Chapter 10: Locks and KeysChapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 3: Perimeter FenceChapter 4: Protective BarriersChapter 5: Security LightingChapter 6: Electronic Access ControlChapter 7: Alarms (Intrusion Detection Systems)Chapter 8: Parking Lots and GaragesChapter 9: Closed Circuit Television (CCTV)Chapter 10: Locks and KeysChapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 5: Security LightingChapter 6: Electronic Access ControlChapter 7: Alarms (Intrusion Detection Systems)Chapter 8: Parking Lots and GaragesChapter 9: Closed Circuit Television (CCTV)Chapter 10: Locks and KeysChapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 7: Alarms (Intrusion Detection Systems)Chapter 8: Parking Lots and GaragesChapter 9: Closed Circuit Television (CCTV)Chapter 10: Locks and KeysChapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 9: Closed Circuit Television (CCTV)Chapter 10: Locks and KeysChapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 11: Doors and WindowsChapter 12: Defense-in-DepthChapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 13: Secure Areas in a BuildingChapter 14: Security DesignChapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 15: Protection of Utilities (Electric, Phone, Water)Chapter 16: Blast ProtectionChapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 17: Fire ProtectionChapter 18: Sound ControlChapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
Chapter 19: Shipping and ReceivingChapter 20: Checklists and FormsINDEX
INDEX
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource focuses on designing, installing, and maintaining perimeter security for buildings.
- Audience includes architects, engineers, facility managers, and security consultants
- Includes checklists, survey forms, and questionnaires
- Shows how to plan and design fences, gates, and other barriers; design protective lighting; select the right intrusion detection systems; evaluate risk; and secure specific areas