This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • EMAGAZINE
    • eMagazine
    • Archive Issues
    • Monitoring Today
    • Contact
    • Advertise
    • Subscribe
  • PRODUCTS
  • NEWS
    • SDM Newswire
    • COVID-19 Coverage
  • EXCLUSIVES
    • SDM 100
    • Top Systems Integrator Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • Project of the Year
  • TOPICS
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • COLUMNS
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Integration Spotlight
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Technology Solutions & Skills
    • Marketing Madmen
    • Workforce Strategies
  • BLOG
  • EVENTS
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • MORE
    • Videos
    • Podcasts
    • Polls
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • BUYERS GUIDE
    • Buyers Guide
    • Take a Tour
    • SDM Buyers Guide eBook
  • INFOCENTERS
    • Helping Your Security Customers Rebound
Home » Store » Books » Integrated Security Systems Design, 2nd Edition - A Complete Reference for Building Enterprise-Wide Digital Security Systems
integrated.jpg

Integrated Security Systems Design, 2nd Edition - A Complete Reference for Building Enterprise-Wide Digital Security Systems

$64.95
Books

Product Details

Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible.

The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.

Key Features

  • Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
  • Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
  • Demonstrates how to maximize safety while reducing liability and operating costs.

Readership

Security directors, security managers, consultants, engineers, installation managers, security students, and other security professionals.

Table of Contents

  • About the Author
  • Dedication
  • Preface
  • Section I: Introduction to Integrated Security Systems
    • 1. Introduction and Organization of the Book
      • Abstract
      • Who Should Read This Book
      • A Brief Background
      • A Framework for Understanding the Design Process
      • Goals of the Book
      • Arrangement of the Book
      • Questions and Answers
    • 2. Integrated Security System Design Benefits and Philosophy
      • Abstract
      • Introduction
      • Why Integrate Systems?
      • Cost Benefits
      • How Integration Is Achieved
      • Summary
      • Questions and Answers
    • 3. History of Electronic Security
      • Abstract
      • Introduction
      • The History of Integrated Security Systems
      • The First Generation
      • The Second Generation
      • The Third Generation
      • The Fourth Generation
      • Fifth-Generation Technology
      • Avoiding Obsolescence
      • Summary
      • Questions and Answers
  • Section II: Security System Design
    • 4. Security System Design Elements
      • Abstract
      • Introduction
      • The Tools
      • The Place of Electronics in the Overall Security Process
      • Establish Electronic Security Program Objectives
      • Types of Design Efforts
      • Project Drivers
      • Summary
      • Questions and Answers
    • 5. Electronics Elements (High-Level Discussion)
      • Abstract
      • Introduction
      • Security Functions
      • Access Control Elements
      • Detection Elements
      • Assessment and Verification Elements
      • Reaction Elements
      • Evidence Gathering
      • Added Bonus
      • Summary
      • Questions and Answers
    • 6. Electronics Elements (Detailed Discussion)
      • Abstract
      • Introduction
      • Alarm/Access Control Systems
      • Server (and Business Continuity Server)
      • Workstations
      • Advanced Elements
      • CCTV and Digital Video Systems
      • How Digital Video Differs from Analog
      • Wireless Digital Video
      • Security Communications
      • Analog Versus Digital
      • Command/Control and Communications Consoles
      • Guard Console Functions
      • Communications Systems
      • Summary
      • Questions and Answers
    • 7. Physical Security Elements
      • Abstract
      • Introduction
      • Basic Physical Security
      • Basic Physical Security Skills: Knowledge of the Tools
      • Door Types
      • Electrified Locks
      • Concerns About Special Knowledge
      • Summary
      • Questions and Answers
    • 8. The Security Design Process
      • Abstract
      • Introduction
      • Establishing Electronic Security Program Objectives
      • Defining Countermeasures
      • Establishing Security Policies Related to Electronic Systems
      • Establishing the Budget
      • Phases of the Design and Construction Project
      • Summary
      • Questions and Answers
    • 9. Preliminary Design Process Steps
      • Abstract
      • Introduction
      • Basis for Design
      • Research
      • Drawing and Specification Resources
      • Coordinating Interfaces to Other Systems
      • Layout Devices in Response to Electronic Security System Objectives and Budget
      • Select Required Devices
      • Analog Versus Digital Video and Audio Systems
      • Questions and Answers
    • 10. Getting Down to the Actual Design
      • Abstract
      • Introduction
      • Macro-Level Design: The Pieces of the Big Picture
      • Microlevel Design: The Threads That Knit Together the Pieces of the Big Picture
      • Summary
      • Questions and Answers
  • Section III: Special Design Sections
    • 11. Information Technology Systems Infrastructure
      • Abstract
      • Introduction
      • Basics of TCP/IP and Signal Communications
      • TCP/UDP/RTP
      • UDP
      • Networking Devices
      • Network Infrastructure Devices
      • Servers
      • Network Architecture
      • Network Configurations
      • Creating Network Efficiencies
      • Digital Video
      • Digital Resolution
      • Frame Rates
      • Display Issues
      • Managing Data Systems Throughput
      • System Architecture
      • Interfacing to Other Enterprise Information Technology Systems
      • Mass Storage Calculations
      • Summary
      • Questions and Answers
    • 12. Radio Frequency Systems
      • Abstract
      • Introduction
      • Basic Radio Frequency Theory
      • Frequencies and Transmission Schemes
      • Components
      • Transmission Physics
      • Summary
      • Questions and Answers
    • 13. Interfacing to Legacy Systems and Emerging Technologies
      • Abstract
      • Introduction
      • The Challenge of Legacy Systems
      • Legacy Access Control Systems
      • Legacy Video Systems
      • Legacy Intercom Systems
      • Direct Ring-Down Intercom Systems
      • Switched Intercom Bus Systems
      • Emerging Technologies
      • Summary
      • Questions and Answers
    • 14. Interfacing to Related Systems
      • Abstract
      • Introduction
      • Building System Interfaces and System Control
      • More on Building System Interfaces
      • Elevators and Escalators
      • Building Automation Systems
      • Irrigation
      • Deluge Fire Sprinkler Control (Another Reaps Technology)
      • PABX Interfaces
      • Voice Over IP Systems
      • Public Address Systems
      • Parking Control Systems
      • Fuel Management Systems
      • PSIM systems
      • Summary
      • Questions and Answers
    • 15. Delaying Technologies and Response Technologies
      • Abstract
      • Introduction
      • Reactive Automated Protection Systems
      • Deterrence Technologies
      • Deployable Barriers
      • Prejudiced Barriers and Aggressive Systems
      • Integrating the Elements
      • Summary
      • Questions and Answers
    • 16. Alarm Detection and Emerging Video Technologies
      • Abstract
      • Introduction
      • Alarm Detection Technologies
      • Emerging Video Technologies
      • Summary
      • Questions and Answers
    • 17. Design Standards Development
      • Abstract
      • Introduction
      • Environmental Issues
      • Power Issues
      • Wiring Practices
      • Wire Dressing
      • Mounting Devices
      • Drawing Standards
      • Summary
      • Questions and Answers
    • 18. Finalizing the Installation
      • Abstract
      • Introduction
      • Finalization and Commissioning Checklist
      • Special Implementations
      • Custom System Reports Implementation
      • Securing the Security System
      • Archived Data Security
      • Summary
      • Questions and Answers
    • 19. System Implementation
      • Abstract
      • Introduction
      • System Maintenance and Management
      • Management Approaches: Types of System Implementations
      • Security Command Center Operational Implementations and Issues
      • Closing Out the Project
      • Dealing with Offenders Who Try to Circumvent the System
      • Summary
      • Questions and Answers
  • Index

Details

No. of pages:
400
Copyright:
© Butterworth-Heinemann 2015
Published:
3rd September 2014
Hardcover ISBN:
9780128000229

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest security marketplace trends.

SUBSCRIBE TODAY!
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing